Preparing Your Laptop Before You Go Abroad

Martin Brinkmann
Apr 2, 2012
Updated • Jun 9, 2013
Mobile Computing

I always take my laptop with me when I go on trips. It does not really matter if it is a weekend city tour, a business trip, or a long vacation abroad. Even on holiday, I need my laptop around as I need to be prepared to fix things that go wrong on my websites or servers the sites are running on.  And for that, I prepare my laptop before I go on the trip.

There are a number of things that you can do to improve your privacy, and the security of your data at the same time. This guide looks at some of the things that I do before I go on a trip.

The Why

You may ask yourself why you should go through all that. I have a number of reasons for you. First, your laptop can get stolen or lost. If you do not protect your data on it, then someone finding it may use it against you, sell it, or leak it on the Internet. While that may not be a big issue in some cases, it can be in others.

Another issue is data snooping. If you are staying in a hotel and using the hotel's infrastructure to connect to the Internet, other's may be able to record the data flow, and if things get really ugly, break into your laptop while you are connected to the network.

There is also the question whether you want airport security snooping through your data during check-in, or if you'd prefer them to not find a thing while they do that.


Encryption protects data from unauthorized eyes. If you use a strong password or phrase, it is more or less impossible to hack into encrypted storage right now, provided that the algorithm or program have no weaknesses.

When it comes to encryption, you have two options. Full encryption of the system, or encryption of part of the drive. Full encryption may look like the better option here, but it also may attract more attention. Partial encryption can't be easily spotted if done right, but may leak some data if the operating system itself is accessible directly.


If your Windows system supports it, you can use Bitlocker for that. Everyone else may use the Open Source software True Crypt instead. You can create an encrypted container easily on the drive and move all of your important data into it. Moving the container into a large directory, like Windows, and naming it in a way that does not reveal its purpose, can improve security furthermore. You may also consider removing True Crypt from the laptop again after you made the installation, to avoid giving clues to snooping airport personal.


If you are staying in a hotel and using the hotel's infrastructure to connect to the Internet, you should use a virtual private network on top of that to secure your connection. This basically encrypts your connection and protects it from snooping users in the same network.

The most effective way is to configure the VPN when you are at your destination, and not at home. It won't make a big difference if it is just your personal laptop that you are taking with you on the trip, but if it is a work laptop with important data, you may want to avoid drawing attention to that.

You add a VPN in the following way on Windows 7:

Click on the network icon in the system tray area, and select Open network and sharing center. If you do not have an icon in the system tray, click on start, enter network in the search form and select the control panel applet this way from the results listing.

Select Set up a new connection or network, and there the connect to a workplace option.

connect to a workplace

Select Use my Internet connection or dial directly, depending on how you want to connect to the VPN. If you select the first option, you are then asked to enter the Internet address of the virtual private network. This can be a domain name, or an IP. Enter the username and password on the next page, and the optional domain if required, and complete the set up process. To set up a VPN, you only need to remember the domain, username and password. I would not advise writing it down though, or storing it anywhere on the computer.

I personally use the VPN that comes with my Giganews account. If you are just starting to look for a VPN, you may enter a world of misinformation and spam. If you search for "best vpn", "cheap vpn" or "reliable vpn" you end up with lots of affiliate type sites that try to sell you the VPN they make the most commissions with. Prices range between $4 to $30 a month. Here are a few things that you need to consider:

  • Test the connection at home to make sure that it meets your requirements. Some VPN services offer trials which you can use for that.
  • Make sure you get enough bandwidth with the account
  • Supports a variety of protocols and strong encryption


If you store your accounts in your web browser, they become accessible by anyone who can start the browser on the system. You can get around this by storing your log ins in the encrypted space on your laptop. For that you can use programs like KeePass and place the program along with the password database in the encrypted storage there.


This ensures that no one who is taking a look at your laptop sees that you are using a password manager, and that your logins are protected if your laptop gets stolen. While it may not be as comfortable as using a built-in browser password manager, or a plugin like Last Pass, KeePass may be the better solution nevertheless as its existence can be hidden on the PC.


If you use Gmail, Yahoo Mail, Hotmail or any of the other email services on the Internet, you do not really need to do anything besides the steps outlined above. When you want to open your email account, you basically open the email provider's site in the web browser, and use the password manager to log in.

If you use a desktop email client, you need to take extra steps to protect the data from prying eyes. The best way to do that is to move the storage into the encrypted container on the drive.  You could combine that with a portable version of your favorite email client, e.g. Thunderbird portable, and put the program as well into the encrypted storage.

You can also use a program like Mailstore Home to remove excess messages that you do not longer need to reduce the size of the mailbox.

 Other programs

You may have other requirements, an sftp or scp client for instance, a messaging app, Skype or another voice over IP solution, or an Office suite.

Some programs may leak information when they are opened. Office for instance may display a list of recently opened documents. If one of those documents points to the encrypted storage, you may have some answering to do. Running a program like CCleaner before you take the trip, and before you make your return, is a good idea to remove those hints from the system.

You may also want to consider running Eraser to overwrite all free space on the laptop's hard drive to render file restoration software ineffective.

Other programs, like WinSCP for instance, can store remote server information so that connections can be made more easily. It is best to move those programs in the encrypted space on the drive to protect the data from being leaked.

The return

One of the easiest options here is to remove the system completely, and replace it with a default system. If you combine that with a program like Eraser (Linux users see here), you have got nothing to worry about when you pass airport security.

Have additional tips or recommendations? Then leave a comment below and join the discussion.


Tutorials & Tips

Previous Post: «
Next Post: «


  1. Rush said on August 28, 2023 at 9:50 pm

    If Nothing OS is nothing more that an overlay with Google still in the midst….then I ain’t interested.

    1. Seeprime said on September 12, 2023 at 4:12 pm

      Another unrelated comment older than the article. Pathetic.

      1. Robenroute said on September 13, 2023 at 9:06 am

        it is becoming mindbogglingly annoying indeed…

  2. ThisIsTheWayTheGhacksEnds said on September 13, 2023 at 9:09 am


    Apple was forced to add USB-C to a phone and the maccultists start talking about “revolution” and “paradigm shift” (as if USB phones had never come out before). It’s so ridiculous it’s reminiscent of comedians doing the “stepped on a water hose” stunt – that was at least somehow funny a hundred years ago.
    Reading this on a site that used to be a technical resource is especially ridiculous.
    How pathetic

  3. Anonymous said on September 14, 2023 at 4:28 pm

    “An iPhone 15 with a USB-C port will mean more than you think”

    That Apple can finally stop hindering progress if spanked hard enough ?

  4. Alex Hales said on September 21, 2023 at 12:51 am

    I’m thrilled to see Instagram taking steps to enhance the user experience with features like Live Activities. This update is a game-changer, especially for those who frequently upload content on the platform.

    The ability to track upload progress in the background is a simple yet incredibly useful addition. It not only keeps users informed about the status of their uploads but also allows for a more seamless experience on the platform. No more constantly checking if your post has successfully uploaded or worrying about interrupted uploads due to a weak signal.

    As an active Instagram user, this feature is a relief. It showcases Instagram’s commitment to improving user satisfaction and addressing common pain points. It’s all about making the platform more user-friendly, and this feature certainly accomplishes that.

    I can’t wait to try out Live Activities and enjoy a stress-free posting experience. Kudos to Instagram for continually innovating and making our social media lives easier!

    Keep up the great work, Instagram, and thanks to ghacks for keeping us in the loop with the latest tech updates!

    I am additionally add one more think if you want to watch instagram stories anonymously to visit site

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.