Articles tagged: encryption
Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?
Https is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.
When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.
The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.
There are several approaches to password-protecting a flash drive, one of which might be designed for exactly the task at hand.
If your password is used to encrypt your hard disk, how can you change your password and still be able to decrypt your disk?
Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Cryptomator is a powerful tool to protect the data you place into cloud storage.
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
Government agencies are increasingly pushing for a “back door” to encryption. I’ll look at what that means, and why it’s such horrible idea.
When sending your computer out for repair, you’re handing over everything on it, including your data. Options to secure a hard drive are limited.
I recently switched Ask Leo! to SSL, partly as a statement and partly for fun. I’ll explain a little of what goes on behind the scenes.
A secure website means the site owner has jumped through the technical hoops necessary to qualify for https. Safety is another thing all together.
Once you are out of https pages you are out of encryption. But there is one good way to secure all your online activities.
If your computer is not physically secure, it is very possible for someone to install something unwanted on your machine even when you’re not logged in.
A stolen or lost computer can open the doors to all sorts of havoc if you’re not prepared. I’ll cover a few of the basics.
There is very little about your computer that can be transmitted over a WiFi connection… provided you know how to keep yourself safe on the internet.
Using a bunch of mathematical magic, a key pair is generated. But that’s just where the fun starts.
Email is ubiquitous and convenient, yet surprisingly not very secure. I’ll look at why that is and when you should worry.
TrueCrypt provides a solution for encrypting sensitive data – everything from portable, mountable volumes to entire hard disks.