Warning: file_exists(): open_basedir restriction in effect. File(/srv/http/vhosts/aur.archlinux.org/public/web/locale//en/LC_MESSAGES/aurweb.mo) is not within the allowed path(s): (/srv/http/vhosts/aur-dev.archlinux.org/:/etc/aurweb/) in /srv/http/vhosts/aur-dev.archlinux.org/public/web/lib/streams.php on line 90
AUR (en) - secure-delete

Notice: Undefined variable: name in /srv/http/vhosts/aur-dev.archlinux.org/public/web/lib/pkgfuncs.inc.php on line 248

Package Details: secure-delete 3.1-6

Git Clone URL: https://aur-dev.archlinux.org/secure-delete.git (read-only)
Package Base: secure-delete
Description: Secure file, disk, swap, memory erasure utilities
Upstream URL: http://www.thc.org/
Licenses: GPL
Conflicts: srm
Submitter: GI_Jack
Maintainer: GI_Jack
Last Packager: GI_Jack
Votes: 19
Popularity: 0.314657
First Submitted: 2015-08-31 14:41
Last Updated: 2016-01-12 01:41

Latest Comments

1 2 Next › Last »

tesfabpel commented on 2016-11-04 07:32

Seems like the new version of extra/cfitsio (cfitsio-3.390-2) conflicts with this package (3.1-6):

error: file in conflict
cfitsio: /usr/bin/smem is already in the filesystem
(translated by me)

mercnet commented on 2016-10-07 13:43

@TheSqrtMinus1 Are there plans to update the package's source?

TheSqrtMinus1 commented on 2016-01-13 03:44

Source is offline while my website is down for renovations, sorry.

Dawa commented on 2016-01-12 01:05

The new source seems to be offline.

TheSqrtMinus1 commented on 2016-01-07 16:17

new source: https://mirrors.thesqrtminus1.com/repos/arch/secure_delete-3.1.tar.gz

TheSqrtMinus1 commented on 2015-12-25 18:27

maybe try https://www.thc.org/download.php?t=r&f=secure_delete-3.1.tar.gz

GI_Jack commented on 2015-12-25 04:22

Also, if anyone knows a good way to get in touch with the THC crew, let me know.

GI_Jack commented on 2015-12-19 04:42



TheSqrtMinus1 commented on 2015-12-09 17:24

This needs to be updated. The thc.org source is unreliable and likely not secure, so I'd recommend using a mirror,such as this one:

yhager commented on 2015-11-13 05:10

There's a redirect to HTTPS, which is signed by a RapidSSL certificate, that curl doesn't trust by default