Articles tagged: encryption

An image in an ancient Egyptian drawing style that depicts a giant, expressive eye with various internet cables and connections in the background. The artwork should mimic the aesthetic of ancient Egyptian art, characterized by profile views, flat figures, and bold outlines. The design should blend the theme of Internet Service Providers' potential to monitor internet activity with the distinctive art style of ancient Egypt, incorporating elements like hieroglyphics and traditional Egyptian color schemes.

Can My ISP Monitor My Internet Connection?

Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?

A padlocked folder.

Password Update Without Re-encrypting: How?

If your password is used to encrypt your hard disk, how can you change your password and still be able to decrypt your disk?

Asymmetric Encryption concept

What Is Public Key Cryptography?

Public key encryption is the workhorse of security online. I’ll review just what it is and how it’s used at a high level.

No more passwords?

What Is a Passkey?

Passkeys are a new form of authentication that promise to be both easier and more secure.

Encryption, conceptual

What Encryption Software Do You Recommend?

There are many different tools for encryption. The right one depends on what you’re attempting to accomplish.

The Cryptomator Model

Cryptomator: Encryption for Your Cloud Storage

Cryptomator is a powerful tool to protect the data you store in the cloud.

Encrypting a Folder

Tip of the Day: Encrypt a Folder in Windows

Locked Folder

How to Back Up Encrypted Data

Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.

A Hacker on TV

How Tech Mistakes in Media Harm Us All

Please don’t base your understanding of technology on what you see in TV and movies.

Bridge of Trust

Protecting Your Privacy: Points of Vulnerability

Tracing the privacy and security of the path from your fingertips through the services you use to your information’s final destination.

A metaphor: data in a container. (Image: canva.com)

How Do I Back Up an Encrypted Container?

Backing up is critical, but exactly how you back up your encrypted container data depends on how secure your backups are.

Peek a boo!

How Secure Is Email?

Email is ubiquitous and convenient, yet surprisingly, not particularly secure. I’ll look at why that is and when you should worry.

Padlocked Hard Drive

How Do I Secure a Hard Drive Before Sending It in for Repair?

When sending your computer out for repair, you’re handing over everything on it, including your data. Options to secure a hard drive are limited.

Encrypted Email

Can Someone See Encrypted Email?

Encrypted email cannot be sniffed, but chances are you aren’t using encrypted email. I’ll explain what I mean and what you might want to do.

Bitcoin

How Does Bitcoin Mining Work?

What does it mean to mine something that doesn’t physically exist? And why might it use so much electricity?

Locked Laptop

How Do I Protect My Laptop Data from Theft?

Laptops are portable, convenient, and easily lost. If lost, all your data could easily be available to the finder. Encryption is the answer.

Encrypted

Tip of the Day: Back Up Encrypted Data Properly

Are You Ready for Your Computer to be Stolen?

Are You Ready for Your Computer to be Stolen?

You might lose your hardware and any un-backed-up data on it, and possibly give a thief access to it all! I’ll cover a few of the basics. A stolen computer or lost computer can open the doors to all sorts of havoc if you’re not prepared.

Padlock in a chain.

Can Someone Install Something on My Computer When It’s Not Logged In?

If your computer is not physically secure, someone could install something even if you’re not logged in.

https

Are HTTPS Connections Really Safe?

HTTPS is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.

Bitlocker

Tip of the Day: An Encrypted Drive is Not Encrypted in the Cloud

Whole Disk Encryption

Does Whole-disk Encryption Impact Computer Performance?

Whole-disk encryption has only minimal impact on the performance of modern computers and hard drives. I’ll review why that’s the case and outline something more important: your ability to access the data when something goes wrong.

Computers at a library

How to Keep Information on a Shared Computer Private

When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.

What Happened to TrueCrypt and What Do I Use Instead?

What Happened to TrueCrypt and What Do I Use Instead?

The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.

Padlocked Flash Drive

How Do I Password-protect a Flash Drive?

There are several approaches to password-protecting a flash drive, one of which might be designed for exactly the task at hand.

BoxCryptor Storage Model

BoxCryptor: Secure Your Data in the Cloud

Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.

Encryption, Padlocks, and Back Doors

Encryption, Padlocks, and Back Doors

Government agencies are increasingly pushing for a “back door” to encryption. I’ll look at what that means, and why it’s such horrible idea.

https and ssl

Why SSL?

I recently switched Ask Leo! to SSL, partly as a statement and partly for fun. I’ll explain a little of what goes on behind the scenes.

HTTPS

What makes a site secure?

A secure website means the site owner has jumped through the technical hoops necessary to qualify for https. Safety is another thing all together.

HTTPS

If we login to a site securely will our other activities be secure?

Once you are out of https pages you are out of encryption. But there is one good way to secure all your online activities.

Someone's Peeking!

What Information Does a Laptop Leak on a Wireless Network?

There is very little about your computer that can be transmitted over a WiFi connection… provided you know how to keep yourself safe on the internet.

HTTPS

How does website or VPN encryption work?

Using a bunch of mathematical magic, a key pair is generated. But that’s just where the fun starts.

Peeking at a locked document

TrueCrypt – Free Open Source Industrial Strength Encryption

TrueCrypt provides a solution for encrypting sensitive data – everything from portable, mountable volumes to entire hard disks.