Encryption

When you only want to permit specific users access to files and content, you’ll need the encryption software to secure them. We’ll discuss the various protocols used by applications and review which options you can install for improved security.

wireless encryption

Types of Wi-Fi Encryption You Can Use

There are many types of Wi-Fi encryption you can use on modern Internet routers. So which one should you use? Many people don’t even use encryption, and those that do just pick […]

Bitlocker, a Guide for the Uninitiated

BitLocker, first introduced with Windows Vista, is a full drive encryption technology that works with hardware in compatible computers known as a Trusted Platform Module (TPM chip).  It offers enterprise-level data encryption […]

MultiObfuscator

MultiObfuscator, Advanced Cryptography Software

Sometimes you may want to protect some files or maybe even just one document from third party access. While you could use an encryption software like TrueCrypt to create a container to […]

truecrypt-71

TrueCrypt 7.1 Encryption Software Released

I have been using the encryption software TrueCrypt for a long, long time. Cannot really remember when I first started using it but it must have been around the time when Windows […]

Avoiding EFS Encryption Disasters in Windows

Our data is becoming more and more important to us as we're keeping ever more of our lives on our PCs, tablets, smartphones and in the cloud.  Currently there are precious few […]

scrambled egg encrypt mode

Text Encryption Made Easy With Scrambled Egg

As kids, we had our own secret codes and words that we used to communicate when outsiders were around. That was a basic from of cryptography. Computer users today have sophisticated tools […]

secret sync

SecretSync, Security Layer To Protect Sensitive Files On Dropbox

The popular file synchronization and hosting service Dropbox encrypts all uploaded files and folders automatically to protect network snooping and other forms of attack and unauthorized access to those files. Dropbox recently […]

create truecrypt volume

Storing Data In The Cloud With Dropbox And TrueCrypt

In Why You Need To Protect Your Data In The Cloud I have explained why it is important to protect data that you upload to the cloud. In this guide, I will […]

ADVERTISEMENT

Why You Need To Protect Your Data In The Cloud

Several events recently have shown some of the weaknesses, or dangers, of cloud based hosting, and the need for information and guides to aid users in protecting their data in the cloud. […]

toshiba self-encrypting drives

Toshiba Self-Encrypting Hard Drives With Host Authorization

The best way to protect data on one of your storage devices is to encrypt it. There are several free solutions out there, for instance by using the Open Source encryption software […]

hide true crypt volume

Disguising True Crypt Volumes In MP4 Videos

I have reviewed TCHunt yesterday, a free program to scan a computer system for unmounted True Crypt containers. The program can be used to prove the existence of an encrypted container on […]

tchunt

TCHunt, Search For TrueCrypt Volumes

TCHunt is a small portable application that can be used to find encrypted True Crypt volumes on the system. It has been specifically designed to demonstrate the possibility of finding True Crypt […]

encrypt pagefile

Encrypt Your Windows Pagefile To Improve Security

There is nothing better than encrypting the system partition and all other partitions if you want to protect your files from unauthorized access. There are still ways around this but they require […]

true crypt backup

How To Backup True Crypt Data To Be Prepared For Emergencies

I have been using the encryption software True Crypt for years and ran only once into a situation where I nearly lost all the data on one of the partitions. Back then […]

Solid State Drives And Encryption, A No-Go?

Modern Solid State Drives are faster than their platter-driven brethren. They do have additional advantages like being completely silent when operating and better shock proof. The disadvantages are the high price per […]

boxcryptor

BoxCryptor: Dropbox and Co Realtime Encryption

BoxCryptor is a encryption software that encrypts cloud storage files and folders to protect them from unauthorized third-party access. Update: Boxcryptor is still available as a free service that users may use […]

exctv

Resize TrueCrypt Volumes With Extcv

I have reviewed the open source tool Extcv back in July and came to the conclusion that it offered TrueCrypt users an elegant and unobtrusive option to resize the TrueCrypt volume on […]

trupax

TruPax, Create TrueCrypt Containers Without True Crypt

It is not that complicated to create a TrueCrypt container, but it does take some time. You need the TrueCrypt software obviously to do that, and someone with admin rights to install […]

true crypt backup header

Essential True Crypt Tips

I have been working with True-Crypt for several years now, and like the open source program a lot. That much, that I'm still using it and not Microsoft's Bitlocker which is an […]

extend true crypt volume

Increase Size Of True Crypt Container Instantly

Users of the encryption software True Crypt have the option to encrypt a full partition of a hard drive, or a container with a specific file size, say 20 Gigabytes. Problems arise […]

Encrypting email in Evolution

Evolution is an outstanding groupware suite with one of the finest email clients in all of Linux-land. For many users the standard email setup is great. It does everything they need: it […]

true crypt 7

True Crypt 7.0, Adds Hardware Acceleration, Auto-Mounting

A new version of the encryption software TrueCrypt 7.0 has been released yesterday, as usual for Windows, Mac and Linux systems. The jump from version 6.3a to 7.0 is more than justified […]

winguard pro

WinGuard Pro Free, Access Control And Encryption Software

WinGuard Pro is a security software with features such as program access control and data encryption. The free edition has a few limitations, more about that later in the review. The program […]

Password protect files and folders in Linux

Security sometimes equates to sanity. You have to keep sensitive information from prying eyes for various reasons. You might have a folder that needs to be given access only to certain people […]

usb stick watcher

How To Protect USB Sticks And The Data On Them

Carrying an USB-stick around with you can be beneficial in numerous situations. USB devices are for instance ideal to copy data without having to carry a larger device like a notebook or […]

password protect

Password Protect And Disguise Folders With PenyuLocker

Encryption is the only option you have if you are serious about protecting data from unauthorized access. Programs like True Crypt or Microsoft's Bitlocker ensure that data is protected by a secure […]

Incorrect Password Or Not A True Crypt Volume [Troubleshooting]

One of my True Crypt partitions failed to mount after a recent system crash. I entered the right password and received the message "Incorrect password or not a True Crypt volume". I […]

Bitlocker Encryption Not 100% Secure After All

Earlier this year a method to get access to data encrypted with the Open Source software True Crypt was published by security researchers. It involved physical access to the protected computer system. […]

Bitlocker Versus True Crypt Performance

Alexander over at 4Sysops ran a benchmark comparison test of the encryption software programs Bitlocker and True Crypt on netbooks. Bitlocker is the encryption software that ships with Windows 7 Ultimate and […]

BitLocker To Go Reader

Bitlocker To Go is a program for Windows XP and Windows Vista that allows you to mount FAT Bitlocker volumes in read-only mode. Bitlocker is a data encryption technology that Microsoft implemented […]

Disk Encryption Software TrueCrypt 6.3 Released

TrueCrypt is one of the most popular Open Source disk encryption software programs for the Windows operating system. It can be used to encrypt entire hard disks, partitions and to create encrypted […]

Add CryptKeeper for on-the-fly encrypted folders in Linux

You've more than likely read Martins' piece about the outstanding encryption tool Truecrypt "TrueCrypt 6.1 Released" and have used it to create easy to use, encrypted file systems on Windows machines. Of […]

Protect Data DVDs And CDs With Power Disk Lock

There are not many options to protect data on optical discs like CDs or DVDs. Probably the most common solution is to password protect or encrypt data so that it can only […]

How To Password Protect Data On CDs or DVDs

A recent comment here at Ghacks asked for help in finding a software program or solution to password protect CDs or DVDs. The following post explains how to password protect data on […]

Encrypting email in Claws Mail

YACMA (Yet Another Claws Mail Article). Recently you may have taken a look at my Claws Mail articles: "Claws Mail: The unsung powerhouse email client." and "Claws Mail: Must have plugins." Hopefully […]

Recursively encrypt directories with gpgdir

Recently I wrote an article about Encrypting and decrypting files with GnuPG. This article described how to encrypt single files in with the help of gpg. But what happens if you have […]

Linux tips: Encrypting and decrypting files from command line with gpg

Are you paranoid? Are you afraid that someone is going to get ahold of data they sholdn't have? I am. And because of that I often encrypt files with a gpg key […]

Enable Bitlocker On Unsupported Hardware

Bitlocker is an additional software component that got first distributed with Microsoft Windows Vista Ultimate and Enterprise, and with professional versions of newer Windows systems as well. It can be used to […]

Encrypting USB Devices Data With True Crypt

If you do not want to end like British government officials who lose USB devices with unencrypted data in front of pubs you might want to consider encrypting the data so that […]

My Encrypted Tunnel

My Encrypted Tunnel is a basic System Tray application that can be installed as a Windows Service to establish and maintain TCP SSH tunnels. Here is a short explanation of what SSH […]


SPREAD THE WORD

GHACKS NEWSLETTER SIGN UP

Please click on the following link to open the newsletter signup page: Ghacks Newsletter Sign up