Here The Best Solutions to Your Problems :

How to Keep Data on Your Laptop Secure

Share it Please
Naturally, the biggest fear most people have lost their laptops is not really focused on the laptop itself . The biggest fear is having sensitive information ending up in the wrong hands. Most can handle the loss, but all data in the hands of bad people is scary!

There is a solution that is safe, fairly easy , and best of all , free.

Of course , you can encrypt all data with various archiving tools that allow you to assign each file a password. The problem with this method is that these passwords are often easy to break and this process is a very big problem .

Instead , consider the source freeware , open TrueCrypt . This software provides encryption because it is very easy to use.

TrueCrypt can be used in many ways , but the two most common are :

• encryption of an entire disk as a floppy disk, USB drive or entire hard drive.

• Creating a virtual encrypted disk or "volume" .

The latter approach is easier to copy the entire container from machine to machine .

Simply mount TrueCrypt encrypted virtual disk to appear as an extra drive on your laptop. You enter the password once to mount the virtual drive and then read everything from there is decrypted and all written, it is automatically encrypted .

For example, you can have TrueCrypt generate a unit called C :/ windows / secritstuff . So if someone were to look at this file directly, which would be more than random gibberish because of encryption. Using TrueCrypt to mount the virtual drive (like selecting the letter "P" drive), while the unit - P: - it looks like any other drive on your machine. Each file in the drive is encrypted , so that encryption is as simple as moving your sensitive files on this disk.

While the encrypted drive is mounted, the content can be viewed in its unencrypted by any program you want to use to access the form .

The trick is to set the camera to automatically mount ever. As your unit virtual machine would not start anywhere . The file c :/ windows corresponding / secritstuff would be visible only as an encrypted gibberish. Someone trying to access files that are found .

The data is not accessible until the TrueCrypt software is used to select the file in c :/ windows / secritstuff , select the drive to be mounted as P: and enter the correct password .

TrueCrypt also supports a variety of encryption algorithms high power. TrueCrypt documentation is obviously tip excessively paranoid, including instructions on how to use " plausible deniability " if a thief forced you never give your password. Hopefully this is just an extreme low probability of most of us .

Here are some caveats:

• The password or a word is used will be the weakest link. Encryption is easily broken using a wrong password . If you choose a password that is easy or obvious , a dictionary attack can always mount your machine to unlock the encrypted volume quickly .
• Have an encrypted volume is useless if important files are also encrypted form on your machine elsewhere.
• Make sure you secure backups regularly updated . It is best to keep these non- encrypted , but of course , if you lose your encrypted volume or forgotten password . Without the password, the data can not be recovered.
• Understand that the files are not 100% sure . All encryption can theoretically be hacked. The reason for encryption is to make the effort and cost of piracy files , which is simply impossible astronomically .

Data encryption is a very important part of a comprehensive security strategy. Keep important files secure requires a lot of forethought and planning . With spyware and virus rampant , not to mention possible theft , there 's really no excuse not to take a little time and a lot of headaches will save the unthinkable should happen .

Get more free technical support and advice from Leo Notenboom by visiting http://ask-leo.com With over 30 years of industry experience , including a 18-year career as a software engineer with Microsoft, the Leo gives real answers to real questions from ordinary computer users at Ask Leo! Subscribe to our weekly newsletter for Leo now and receive a free ebook : " Internet Safety - Protect Your Computer on the Internet" , a collection of steps, tools and concepts you need to know to keep your computer and your information safely

Followers

Total Pageviews