Posts

Showing posts with the label encryption

Remember, extra security is required for wireless hotspots

Forbes reports on recent work that has identified many airport hotspots not being secure. This is a good reminder to all of us who use hotspots that we need extra security. First, if you can get on the hotspot, so can anyone else. With a little work and help from programs such as Cane and Abel, anyone can intercept everything you send and receive. Other people may just set up their laptop to look like a hotspot, so when you connect, you are actually connecting to their laptop. Again programs are readily available to make this work with relative ease. Your job, if you're going to use hotspots, is to only communicate with VPN on. VPN will encrypt data as it is sent and received between your laptop and the VPN server. If your company does not provide you with VPN or you need it for private use, try services such as PublicVPN or HotSpotVPN . For a small fee, these services will protect you . The same rule also applies to any public network that you physically connect to such as from ...

Encrypt sensitive files

Image
Do you have files that you do not want others to see? Perhaps you keep your tax returns archived on your hard drive. Or your employee's files at work. Using a very simple, free program you can protect those files from others accessing them using TrueCrypt . Version 5.1a was released March 17, 2008, so you know this isn't some beta software you're running. From the TrueCrypt website, here are its main features: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twof...