Sometimes email contains sensitive data which must be encrypted. You can handle this two ways, manually encrypt the data or use an exceptional Thunderbird Extension called Enigmail. This extension uses gpg and […]
Putting an encrypted partition on an USB drive can be a great way to enhance the safety of data. Several software developers have created solutions to encrypt USB drives. True Crypt for […]
A bunch of researchers, among them the famous Bruce Schneier, have discovered that features like Recent Documents list may reveal information about files on an encrypted partition even when used in conjunction […]
Drag and Crypt is a tiny application for Windows NT and newer operating systems that provides the user with a dropzone on the desktop that encrypts and decrypts files and folders dropped […]
Most people think it takes lots of work to encrypt files. The freeware click crypt 2.6 allows to encrypt and decrypt files with just one click. It´s unfortunatly only available in german but that does not matter a lot because the interface is simple and easy. Click on Download Sofort ausführbares Setup which starts the download. After that install the software on your system and start it. This opens a configuration window which is named Verschlüsslungsmethoden. You select the encryption algorithm that you want to use, you have three options, those are: MD2 (128bit), MD5 (128bit) and SHA (160 bit).
I thought about encrypting my hard disks, or at least part of them that contain personal data, for at least one year. I never did it because I thought it would be a lot of work involved. I had to find a good program, one that would offer good encryption algorithms, would be free and easy to use.
Everyone is able to access data on normal usb sticks unless the data on the stick is encrypted with softwares like True Crypt for instance. Software based encryptions however require that the software to decrypt the data is actually installed on the system. It would not be possible to decrypt the data. The user also needs to know the password to decrypt the data, if the password is lost the data is lost unless a weak password was chosen during the encryption process.
Now this article over at tomshardware.com comes in handy. I told you yesterday how to encrypt your hard drives with the great true crypt freeware and recommended that everything would be encrypted and the system would be booted from usb.
I have updated the Malwarebytes Anti-Malware installation to version 2.0 during the beta trial that the company ran, and upgraded to the final version using my own license once it was released. […]
The Best Windows Software Toplist On this page, you find a listing of the best Windows software. Most of the applications listed here are free, with the occasional commercial program added to […]
If you carry a flash drive around with you at times, you may have added means to it to protect data in case it gets lost or stolen. Encryption programs like True […]
I was asked about my daily workflow in regards to this site and also about the services and programs that I use throughout the day. While I do not think that you […]
It is quite difficult to keep an overview of all the cloud hosting services that have launched in the last two years. This can be a problem for new services entering the […]
Sometimes you do not know what you are getting in to when a family member, friend or colleague asks you for PC help. It is therefore always good to come prepared, for […]
When Windows 7 came along, PC users had to pick one of the available editions that Microsoft made available to the public. The decision impacted the features the operating system shipped with, […]
If you want to hide files on a hard drive, you have quite the options at hand to do so. You can simply create a password protected archive, use True Crypt or […]
I always take my laptop with me when I go on trips. It does not really matter if it is a weekend city tour, a business trip, or a long vacation abroad. […]
Services like Dropbox, Microsoft OneDrive or Spideroak make life more comfortable for users who work on different devices regularly. They are file sync and online storage solutions that act as backup storage, […]
I know quite a few computer users who are regularly writing down what they have achieved or are currently doing. Some use applications like Notepad for this, or full blown applications designed […]
Users who use the file synchronization and hosting service Dropbox on their system need to take good care of the authentication files of the service. These files were generated during first authentication […]
The popular file synchronization and hosting service Dropbox encrypts all uploaded files and folders automatically to protect network snooping and other forms of attack and unauthorized access to those files. Dropbox recently […]
Several events recently have shown some of the weaknesses, or dangers, of cloud based hosting, and the need for information and guides to aid users in protecting their data in the cloud. […]
The article Dropbox authentication: insecure by design by Derek Newton got quite the press in the past week or so. So what exactly did he find out to come to this conclusion? […]
It sometimes may be important to hide folders on a multi-user system to avoid access to the files stored within. It makes sense for instance for important documents to prevent that other […]
Depending on how you use Windows Live Messenger, it may be beneficial to save the chat conversation history automatically as a backup in order to access it whenever information from the chat […]
I sometimes take a look at PCs of friends and family, usually because something is not working and they asked me to, and to a lesser extent when they bought a new […]
Hiding a hard drive or partition in Windows can be an effective way of preventing access to a drive's content. The method is not foolproof though, and users with enough time on […]
Password protection is not enabled by default in the email client Mozilla Thunderbird. Anyone with access to the computer system may open Thunderbird, read the emails and look at contacts and other […]
Solid State Drives (SSD) are becoming increasingly popular and it seems it is only a matter of time until they replace the conventional platter-driven hard drives in computer systems around the world. […]
Encryption is the only option you have if you are serious about protecting data from unauthorized access. Programs like True Crypt or Microsoft's Bitlocker ensure that data is protected by a secure […]
Web Versions is a free program for Microsoft Windows devices that helps you check whether program updates are available for local software applications. Some software programs make use of automated or manual […]
Yubikey is a hardware device that you plug in to the USB port of a computer to improve the security of authentication processes. Password theft is a common problem on the Internet […]
USB Agent is a free portable program for Microsoft Windows devices to run automatic actions when USB devices are plugged in or removed. It sometimes can be quite handy to start programs […]
Experienced computer users have a specific routine that they go through whenever they install a new operating system. This includes playing around with the default configuration of the operating system, but also […]
Bitlocker To Go is a program for Windows XP and Windows Vista that allows you to mount FAT Bitlocker volumes in read-only mode. Bitlocker is a data encryption technology that Microsoft implemented […]
A recent comment here at Ghacks asked for help in finding a software program or solution to password protect CDs or DVDs. The following post explains how to password protect data on […]
Computer software packages that can be loaded on an usb device seem to become more common these days. Many experienced computer users maintain a collection of computer troubleshooting and recovery tools on […]
Assassin SE is a software program for that will scan, identify and rate all running processes on a computer system running Windows NT, Windows 2000, Windows XP or Windows Vista. The program […]
Day 15 of the Ghacks Christmas Giveaway. We got 10 more software products for you for which we will hand out licenses. Today's software program is special as it is the first […]
If a company releases a product and a successor of that product a few years later and then a document comparing the features of both products; what would you expect from that […]
Please click on the following link to open the newsletter signup page: Ghacks Newsletter Sign up
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.