Articles tagged: encryption
If your password is used to encrypt your hard disk, how can you change your password and still be able to decrypt your disk?
Public key encryption is the workhorse of security online. I’ll review just what it is and how it’s used at a high level.
Passkeys are a new form of authentication that promise to be both easier and more secure.
There are many different tools for encryption. The right one depends on what you’re attempting to accomplish.
Cryptomator is a powerful tool to protect the data you store in the cloud.
Encrypting your data is important for security, but it also adds risk that’s easy to overlook when backing up.
Please don’t base your understanding of technology on what you see in TV and movies.
Tracing the privacy and security of the path from your fingertips through the services you use to your information’s final destination.
Backing up is critical, but exactly how you back up your encrypted container data depends on how secure your backups are.
Email is ubiquitous and convenient, yet surprisingly, not particularly secure. I’ll look at why that is and when you should worry.
When sending your computer out for repair, you’re handing over everything on it, including your data. Options to secure a hard drive are limited.
Encrypted email cannot be sniffed, but chances are you aren’t using encrypted email. I’ll explain what I mean and what you might want to do.
What does it mean to mine something that doesn’t physically exist? And why might it use so much electricity?
Laptops are portable, convenient, and easily lost. If lost, all your data could easily be available to the finder. Encryption is the answer.
You might lose your hardware and any un-backed-up data on it, and possibly give a thief access to it all! I’ll cover a few of the basics. A stolen computer or lost computer can open the doors to all sorts of havoc if you’re not prepared.
If your computer is not physically secure, someone could install something even if you’re not logged in.
HTTPS is an important part of keeping your data safe, but it’s only a part. It’s important to understand what it does and doesn’t mean.
Whole-disk encryption has only minimal impact on the performance of modern computers and hard drives. I’ll review why that’s the case and outline something more important: your ability to access the data when something goes wrong.
Your ISP controls your internet connection, and it’s easy for them to monitor the data you send and receive. The question is, why would anyone monitor your internet?
When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.
The TrueCrypt project was suddenly and without warning shut down. I’ll look at a little of the history and what you should use instead.
There are several approaches to password-protecting a flash drive, one of which might be designed for exactly the task at hand.
Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Government agencies are increasingly pushing for a “back door” to encryption. I’ll look at what that means, and why it’s such horrible idea.
I recently switched Ask Leo! to SSL, partly as a statement and partly for fun. I’ll explain a little of what goes on behind the scenes.
A secure website means the site owner has jumped through the technical hoops necessary to qualify for https. Safety is another thing all together.
Once you are out of https pages you are out of encryption. But there is one good way to secure all your online activities.
There is very little about your computer that can be transmitted over a WiFi connection… provided you know how to keep yourself safe on the internet.
Using a bunch of mathematical magic, a key pair is generated. But that’s just where the fun starts.
TrueCrypt provides a solution for encrypting sensitive data – everything from portable, mountable volumes to entire hard disks.