Articles tagged: encryption

Whole Disk Encryption

Does Whole-disk Encryption Impact Computer Performance?

Whole-disk encryption has only minimal impact on the performance of modern computers and hard drives. I’ll review why that’s the case and outline something more important: your ability to access the data when something goes wrong.

Are You Being Spied On?

Can My ISP Monitor My Internet Usage?

Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?

https

Are HTTPS Connections Really Safe?

Https is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.

Computers at a library

How to Keep Information on a Shared Computer Private

When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.

What Happened to TrueCrypt and What Do I Use Instead?

What Happened to TrueCrypt and What Do I Use Instead?

The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.

How Do I Password-protect a Flash Drive?

How Do I Password-protect a Flash Drive?

There are several approaches to password-protecting a flash drive, one of which might be designed for exactly the task at hand.

Your password unlocks the key, which unlocks the data

How Is it Possible to Change a Password Without Re-encrypting an Encrypted Disk?

If your password is used to encrypt your hard disk, how can you change your password and still be able to decrypt your disk?

Encrypting a Folder

Tip of the Day: Encrypt a Folder in Windows

BoxCryptor Storage Model

BoxCryptor: Secure Your Data in the Cloud

Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.

Cryptomator to the Cloud

Cryptomator: Encryption for Your Cloud Storage

Cryptomator is a powerful tool to protect the data you place into cloud storage.

Locked Folder

How to Best Back Up Your Encrypted Data

Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.

Encryption, Padlocks, and Back Doors

Encryption, Padlocks, and Back Doors

Government agencies are increasingly pushing for a “back door” to encryption. I’ll look at what that means, and why it’s such horrible idea.

Can you secure a hard drive?

How do I secure a hard drive before sending it in for repair?

When sending your computer out for repair, you’re handing over everything on it, including your data. Options to secure a hard drive are limited.

https and ssl

Why SSL?

I recently switched Ask Leo! to SSL, partly as a statement and partly for fun. I’ll explain a little of what goes on behind the scenes.

HTTPS

What makes a site secure?

A secure website means the site owner has jumped through the technical hoops necessary to qualify for https. Safety is another thing all together.

HTTPS

If we login to a site securely will our other activities be secure?

Once you are out of https pages you are out of encryption. But there is one good way to secure all your online activities.

Chained Laptop

Can Someone Install Something on My Computer When It’s Not Logged In?

If your computer is not physically secure, it is very possible for someone to install something unwanted on your machine even when you’re not logged in.

Thief!

Are you ready for your computer to be stolen?

A stolen or lost computer can open the doors to all sorts of havoc if you’re not prepared. I’ll cover a few of the basics.

Someone's Peeking!

What Information Does a Laptop Leak on a Wireless Network?

There is very little about your computer that can be transmitted over a WiFi connection… provided you know how to keep yourself safe on the internet.

HTTPS

How does website or VPN encryption work?

Using a bunch of mathematical magic, a key pair is generated. But that’s just where the fun starts.

Someone's Peeking!

Just How Secure Is Email, Anyway?

Email is ubiquitous and convenient, yet surprisingly not very secure. I’ll look at why that is and when you should worry.

Peeking at a locked document

TrueCrypt – Free Open Source Industrial Strength Encryption

TrueCrypt provides a solution for encrypting sensitive data – everything from portable, mountable volumes to entire hard disks.