Articles in Category: Encryption
BitLocker might be turned on without your knowledge. That’s fine, but make sure you have the recovery keys stored somewhere should you ever need them.
Surprisingly, it’s possible for aspects of an https site to still not be secure, if the site is improperly designed. And it’s extremely difficult to tell.
Whole-disk encryption has only minimal impact on the performance of modern computers and hard drives. I’ll review why that’s the case and outline something more important: your ability to access the data when something goes wrong.
The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.
If your password is used to encrypt your hard disk, how can you change your password and still be able to decrypt your disk?
Headlines to the contrary, it’s BitLocker to the rescue to protect yourself from some vulnerabilities discovered in drives providing hardware-based encryption.
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
VeraCrypt provides a solution for encrypting sensitive data — everything from portable, mountable volumes to entire hard disks.
Protecting data on your computer is key. I’ll look at three common encryption methods.
You want more than a password, you want encryption. Encrypting an external drive can be done with the right software.
VeraCrypt makes is easy to encrypt whole drives, making it safer to travel with your data. Here’s how to safely encrypt and then access your data.
Should you want to use BitLocker on a machine or virtual machine that doesn’t support TPM, there’s a single hoop to jump through.
For many, it’s important to be able to encrypt a disk entirely. Particularly if a portable machine contains sensitive data, whole-disk encryption is key.
It’s not uncommon to want to encrypt a folder and all it contains. There are several techniques to encrypt a folder, each with pros and cons.
Since most encryption tools are designed to encrypt collections of files, the best approach to encrypt a file isn’t always obvious. I’ll look at a couple of alternatives.