Saturday, March 29, 2008

How to keep files secure? Cryptography, file wiper, internet privacy

This is a well known fact that the deleted files in Windows will be returned. So anyone who has access to a computer will be able to recover a file, and the contents of the file. It seems to be the problem of top-secret organizations and institutions, but in fact, end users should also consider the problem.
Notebook computer can be stolen or lost. In this case, the most vulnerable information is that it seems that exclude, but actually to cover. Another problem is online activity. Any Internet browser left many traces, including links to sites visited, and sometimes used loggings password. This can lead to identity theft problem when someone can take a lot of information about you from your computer browser cookies.
If of trying to solve this problem, we must understand that, first, we must know what is a source of potential danger, and how we can manage these risks. I am sure that you are concerned about using credit cards online, but also simple rules will help to use your credit cards only on trusted Web sites, and your data will not be stolen. So you continue to use your credit card to obtain benefits from the acquisition online.
The first simple recommendation on the safety of stay is: " save your important files to a safe place & quot;. This is not difficult, as there is now a free and open source encryption systems such as TrueCript. Another approach is to use encryption system for end users, such as encryption proposed in the postal file format or speech files. Cryptology algorithms exist it is very difficult to crack (actually, someone will be able to find a password only with the help of brute force-analysis). If you send a sensitive file colleague, password protection, use of this file or put the file in the protected archive.
Communicating other is a serious aspect of security. If you use simple encryption system, then, before you have to communicate to exchange a password, it may not be that good, so it is an excellent idea to use a key cryptography.
The The second task is to make sure your data easily restored. Use a file shredder to ensure remove (delete file), a better idea is in the background, using a file shredder, which does not need your action to ensure that each exception. Schedule regular destroy free work place, it is not 100% security, but it will keep about 98% of the previously deleted data security. How to choose a file shredder to use? Download free or free-to-try to restore the software to check if the files are deleted from a file shredder can be recovered. There may be some other aspects of security (for example, temporary files), but for most users it is a fairly frequent enough.
The question - how many runs I need? Actually, the answer to this question 1 - pass the rewrite during purification enough. The idea of overwriting data, it was suggested several times Peter Gutmann in 1996. In cases where the hard drives were much slower, small in size and inferior in quality. Today drives this idea is not entirely applicable, and one-pass rewrite is enough.
Staying provide on the web. This is not a difficult task, try to install the latest version of the web browser FireFox great new software. Consider using a firewall, which is built in or available as an independent instrument. Do not send their data to web sites that you do not trust. Web sites that accept credit cards must be supported protocols for the purchase pages. With regard to identity theft problem, the idea is to learn more about the possible ways ahead steal your personal information, there are not many programs that could help with this.
Finally, my recommendation: Do not forget to save files in a safe place and make sure that it is not possible to find your files somewhere else, for example, to restore previously deleted files. It& 39;s simple, but this is a good way to stay secure.
If you are looking for a hard drive to destroy utility, try a new web site file security expert Sam Miller. babca jonah



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

No comments: