Thursday, May 4, 2017

Mobile Data Security - How Encrypted Volumes Can Keep Your Data Safe (and Out of the News)

Most of us are aware of recent high profile cases where highly confidential information made it into the public domain as a result of sloppy laptop security. These cases led to significant public embarrassment for the companies (or governments) involved and called into question a lack of internal procedures for operating a secure environment.

This problem of security (especially on laptops and removable media) is not just confined to the realm of commercial enterprise and anyone who travels with a personal laptop or netbook will be exposed to the same dangers.

Can you afford to have your confidential information make it into the hands of some anonymous third-party. What is the risk to you if your personal information is posted on an ID Theft sites for public consumption?

The consequences of such a scenario should be chilling for most people, but the good news is that there are things you can do to avoid this, just in case your data makes it into the hands of someone else.
In protecting your data there are three main options available to you;

[1]. Do not keep confidential information on your laptop.
[2]. Encrypt your entire hard drive.
[3]. Use "encrypted volumes" to secure your data.

Let's take a closer look at these options and consider the Pros and Cons of each.

Option 1: Do not keep any confidential information on your laptop.

So, I am hoping that most readers have realised that, while this is a very secure option, in reality it is pretty limiting. You may be able to apply this approach to sub-sets of your confidential information but most of us need to have access to certain snippets of data, which we class as confidential, throughout the working day.

Option 2: Encrypt your entire hard drive.

In recent years this has become far easier to achieve, especially as operating systems have become more advanced. Ten years ago you would simply not have been able to do this without specialist (read: expensive) third-party software.

Fortunately with most modern systems the option to encrypt a volume is readily available and gives you a seismic increase in system security.

Whole hard drive encryption works by making your system accessible only to the person with the appropriate passphrase or password. Once encrypted your operating system will handle the job of taking the encrypted data from your hard drive, authenticating and then decrypting "on-the-fly" and for the most part you won't have to get involved with the ugly details of how that works (once the system has been set-up).

Unfortunately, there are a couple of notable reasons why whole drive encryption can be problematic and these should be given some serious consideration before you start the set-up process.

Performance:

While modern machines are quite well specified, the process of encryption and decryption comes at a price and results in a performance hit. You may notice your machine runs a little slower because the computational processes involved are not insignificant - your machine is having to decrypt everything (including your applications as well as your data) before you can use them and then reverse the process (re-encrypt) once you have finished.

Recoverability:

Much of the security provided by whole drive encryption comes from the way the hard drive is cryptographically 'tied' to your system. It may use the passphrase or password to validate your access to the system, but it may also add a check that the computer's hardware 'footprint' has not changed, thereby suggesting that the hard drive has been removed and reinstalled in a different computer.

This process raises the question of what you will to do should your laptop become irretrievably damaged.

For sake of example, let us imagine that you drop your laptop and the screen cracks. You are unable to get it repaired because the model has been discontinued and a replacement screen (with all the associated repair costs) are so high that you decide you would rather put the money towards the cost of a new machine.

From experimenting with the broken machine you know that your hard drive still works and you decide to remove it and place it into an external USB drive. This way you can still recover your data from the drive. This seems like a sensible approach until you try to access the data only to find that the drive is inaccessible.

When you removed the hard drive from your laptop you broke the cryptographic link between the hard drive and the machine it was initially set-up on, thereby triggering the security inherent in an encrypted drive. This was the whole point of encrypting your hard drive in the first place, so that if it was stolen (either with or without the attached laptop) your confidential information would remain secure.

So using whole hard drive encryption is a great way to secure your data, but it comes at a price and has some pretty important drawbacks.

My recommendation is to use an encrypted volume that can be mounted as an extra hard drive while being entirely portable (meaning it can be carried on a hard drive or external media - such as USB sticks).

There are a number of software applications that offer this ability, but as always I like to highlight cross-platform, non-bloatware solutions. My chosen solution is called 'Truecrypt' and can be found at www.truecrypt.org.

Option 3: Use "encrypted volumes" to secure your data.

Application of Choice - Truecrypt

Truecrypt is a great encryption solution and ticks all the boxes.

Truecrypt is cross-platform so it will work on your PC, your Macintosh or your Linux distribution. It is an 'Open Source' product, so it is free to use and it has the most comprehensive functionality of any volume encryption solution I have worked with. The application does not care where you want to create your volume file so it is completely portable and (as it works on all popular operating systems) can be created on one system and then moved to another without any problems, your data will still be safe and secure.

Here is a very basic overview of how Truecrypt works.

The first stage in making a secure volume is to create the encrypted container. This is a single file that will act as the volume once mounted (all the parts needed to work this puzzle are included in the Truecrypt application).

Before making the encrypted container it is important to think about the password you will use each time you need to access your data. It will need to be complex in nature (i.e. a combination of alpha and numeric, it is also a good idea to include wildcard symbols), above all else, make sure you can remember your password because without it your data will be forever lost.

The other thing to decide in advance is the required size of your container. Too big and you will have long (very frustrating) periods while you wait for it to be copied from one place to another, too small and you will keep running out of space. I find the most likely deciding factor in the "How big?" question is how often I expect to move the container and what type of media I will use.

Like many people I tend to move data around on a USB stick and this is what governs the overall size of my container.

Once you have decided on the size of the container you next provide it with a name and then choose the "Encryption Algorithm" - this basically means "choose how secure you want it to be". What you choose for your Encryption Algorithm may be determined by legal requirements where you live and I can not advise you on that in this article. If in doubt leave it on the default setting of "AES".

You will have already decided how big your container should be and you will specify this next before preceding to enter your complex password. Remember, this is the password you will enter each time you want to access your encrypted volume. If you are worried about fumbling the password you can always check the "Display Password" option and check that you have it right before proceeding.

Before you can use your new container it must be formatted so it can be recognised by the operating system. If you do not format the container you will not be able to write or copy data. You need to be a little careful in choosing your format option if you want to ensure cross-platform operability. If you are in any doubt about which format option to use just leave the setting at the default "FAT" setting.

In the final format screen (Volume Format) you will be presented with a screen showing a series of random numbers, this is called the "Random Pool" and ensures that you are using a strong encryption key. Just move your mouse around in this screen for a while before formatting your volume, the longer you spend doing this the better your encryption keys will be.

One thing to note about this creation process is that, once complete, the creation screens will try to start the whole process over again. If you only need one container this may be a little confusing, but exiting the creation screen will put you back in the main Truecrypt screen. You are ready to mount your new container for the first time.

Use the "Select File" option to locate your new file and then highlight a free drive letter from the screen above. This is where your new volume will be mounted. Enter your password and click on "Mount" to complete the process, your new volume will now appear in the file browser (Windows Explorer, Macintosh Finder or the Linux equivalent) as a new local drive (look for the drive letter you selected earlier).

There are a few additional things about Truecrypt that make it a great application. Among these my favourites include the ability to have your file browser display the newly mounted volume, thereby saving you the trouble of going looking for it. I also like the ability to have Truecrypt auto shut down once there are no encrypted volumes mounted. This is important because it covers another important aspect of safeguarding your confidential data, that of visibility.

Out of sight, out of mind.

In 1984 David Lynch brought us his take on Frank Herbert's Sci-Fi novel "Dune". One of the most memorable lines for me was "knowing there is a trap is the first step in evading it."

Turn this on it's head and you get a basic premise of security - "if you are unaware a thing exists, you do not know to go looking for it".

If you make it obvious that something is important (or valuable) by calling it "private", or "important files", or perhaps "bank details" then it becomes a red flag to anyone looking for things of value on your computer.

TrueCrypt encrypted containers do not include a file extension so there is no default application association. Double-clicking on the file will simply generate confusion in your system while it tries to decide how to open the file. If you match this by giving the file a vague name then no casual review of your system is going to uncover your valuable data!

I hope that this article has highlighted how security does not have to be complicated and it can be extremely portable across different operating systems. You can further extend this by applying the same rules to USB sticks, CDROM and DVD data.

Brian McClue is an IT Professional with a special interest cross-platform functionality and a keen dislike of bloat-ware (software that takes up huge computer resource for very little tangible benefit).

Wednesday, November 30, 2016

Laptops - Live Life With Sophistication

Computer has become the Alma mater of a man. People are so badly dependent on these enormously capable artificial beasts that they do not find even a single second of their working hours to spend without them. They need it even when they are on the move and that's what has made way for the all new laptops. These devices have indeed taken the life of a man to a new and advanced spirit level.
Laptops are portable computers which are as powerful as the normal PCs but these come in a highly sophisticated form and light weight. These have an extremely sleek as well as compact body. They are also termed as notebook computer. It runs by a single battery which runs for a considerable time when fully charged. They can also run from an AC / DC adaptor that while supplying the power to the gadget keeps on charging as well. Laptops as well as the desktop computer share the same configurations. The only difference lies in their cabinet and their screens.
The laptops usually flaunt an LCD display. Most of these employ memory modules for their RAMs. The modern laptops feature 12 inch or further large display with an appreciable display resolution. These gadgets also come with PC cards or "ExpressCard expansion bay" for further memory expansions.
The laptops have 2.5 inches Hard disk drive which is one inch less than the conventional desktop computer's hard disk. There are numerous bug players who are out in the arena to make their product hit the market with a bang. These include Intel, AMD and VIA. These have some of their best class and standards of laptops out in the market. These days, owning a laptop is a child's play. Cheap laptops are gaining high public recognition these days. The cheap laptops under by big banners can be Easily Availed in the market.
Laptops are available in various sizes, shapes, designs and prices. The user is free to opt any out of them which best suits their needs and requirements. In this tech savvy world, everyone wishes to stay ahead in all the possible aspects. Companies like Apple, Acer, Dell and HP are playing hard for the attention of the user. The laptops are indeed engendering the computer dependency era.
Finding for where to buy laptop in singapore ,asus fonepad,laptop deals singapore, hp elitebook or best business laptop, come to laptopfactoryoutlet.com.sg or www.laptopoutlet.com.sg.

Laptops

Computer market is getting bigger and bigger everyday, as there are plenty of choices to make when considering buying a new computer.
Palmtops, desktop PCs, laptops and a wide variety of different pieces of state-of-the-art technology may confuse prospective buyers, as the massive amount of available offers may be overwhelming.
As an attempt to make some things clear, this article will highlight many different features of the two most widely used kinds of computers: desktop PCs and laptops.
Everybody knows what a desktop computer is. However, not everyone knows a laptop, and frequently people mistakenly think that laptops and notebooks are the same thing. Well, the truth is that although notebooks are a kind of laptop, not every laptop is a notebook.
This distinction is made for two reasons: weight and peripherals. While notebooks are lighter, usually about four or five pounds, they not always include disk drives such as floppy drives and CD-ROMs. Bulkier (six or seven pounds) laptops include these drives.
But let's go back to laptops vs. desktop computers; which one is the right one? Well, this should be decided by you, but if you need portability you should choose a laptop. With normal size of 8.5'' x 11'' (although some new models are bigger, to include 16'' screens), these beauties are ready to be packed and carried with you all day, giving you the possibility to work while you travel, take notes while taking classes, or just make annotations while in the library. They offer you the convenience of saving space.
However, if you will be using your computer only for 3D gaming or setting up a powerful workstation that will be on most of the time, then the best choice is probably a desktop PC. They are cheaper to buy too.
The reason of laptops being more expensive than desktop computers is not, as many people think, that desktop ones are better or more reliable (in fact the majority of computer failures have been reported to happen on desktops), but resides on the laptop's need to be manufactured with components that must be small to fit into a small case, and at the same time be resistant to high heat levels and reduce power consumption to a minimum.
Finally, I'd like to say I own both a laptop and a desktop computer, and although this last one was cheaper to buy and its nominal speed is bigger, it failed some times for apparently no reason, while my faithful laptop has never had any problem and is just as fast as my desktop PC with a lower CPU speed.
Sourcing for hp elitebook ,best business laptop,best budget tablet, hp elitebook or cheap tablet goto Laptop factory outlet or http://laptopoutlet.com.sg/.

Laptops For Sale

In recent times, individuals and business firms have opted to automate and mechanize the management of company activities. Constant innovation and the need for greater mobility have substituted the use of desktop computers with laptops. Laptops are portable computer systems that can be used anywhere and everywhere. Although the desktops may never be replaced completely, the demand for laptops is rapidly increasing. The constant demand has increased laptops sale all over the nation. Research has estimated that 53% of the computers bought in May 2005 were laptops.
Laptops are available for sale at computer outlets all over the country. A wide selection of laptops from various companies such as Dell, Toshiba, Apple, IBM and more are available at these outlets. Trading websites such as e-Bay and Amazon also offer laptops for sale. The price for basic laptops starts from $700. Advanced laptops used for 3D animation, graphic design, networking, and gaming may rang from $1,000 to $3,000. Some may also cost $5000 or more. Used laptops are also offered for sale at certain stores. Used laptops are generally cheaper than new ones. Some retail stores also offer discount prices for the sale of laptops. Companies that buy laptops on bulk basis are often given a hefty discount for their purchase.
Buyers are advised to evaluate the features of the potential laptop before making the purchase. Computer vendors offer laptops with different speeds of processing units, system storage, optical drives, network connectivity, and external slots. Vendors also offer laptops compliant with different operating software such as Microsoft Windows, Mac, and Linux. The buyer should also verify the authenticity of the brand the wish to procure.
Laptops offered for sale may have different warranty agreements. The warranty period offered might range from one year to two years. After-sales service, such as maintenance and repair, are also offered.
A plethora of websites offers a large database of information for purchasing laptops. Prices, customer ratings, and reviews should be evaluated before buying.
Sourcing for asus laptop singapore ,best business laptop,best budget tablet, hp probook or best business laptop, goto laptopfactoryoutlet.com.sg or www.laptopoutlet.com.sg.

The Features and Benefits of Laptop Computers

When we look around at all the people on their laptops typing away or simply using them to listen to music while we read we may find ourselves amazed at the technological revolution that is upon us. The days of mainframe computers are behind us and the day of mobile cloud computing is here. The laptop is the backbone of the new modern age.
There are so benefits of laptop computers that make them essential in this modern age. Some of those are, but are not limited too, syncing data to the cloud so that it is available anywhere and everywhere, the ability to access the all of the knowledge and information of the internet anyway and everywhere, and having a full service entertainment center capable of player mp3s, CDs, DVDs, Blu-rays, and the countless streaming movies and music sites. The availability of the information of the internet is available because of recent advances in the area of mobile broadband internet. What was pioneered in the cell phone industry has made its way to laptops and cemented itself as a must have for people who use their laptops on the go.
Syncing your information to your home computer, work computer, laptop, and the cloud is by far the best thing about the modern era of laptops. This means that if you are surfing the internet on one computer, then go home and want to be at the exact same page then you can do that. Also, you can use free software and websites such as Dropbox, SugarSync, Windows Live Mesh, and many others to have your data backed up to the web, which in this type of situation is also called "the cloud", and have it synced across all of your computers at the same time. Another benefit to these types of sites is they make sharing information with team or family members incredibly easy.
Being able to access the internet and feed your media fancy anywhere are the next two best things about laptops. Both of these features can be used while in areas with WiFi, a wireless networking signal provided by the location you are at, or be accessed by the use of a mobile broadband card. These cards can come built in to the computer or be purchased later and added internally or externally via a USB connection.
Laptops have freed people from the desk and allowed the information of the world to be at your finger tips no matter where you are in the world.
Looking for where to buy laptop in singapore ,hp probook,best budget tablet, asus padfone or best business laptop, visit laptopfactoryoutlet.com.sg or Laptop Outlet.

Saturday, April 9, 2016

backstage badger. And then the cast forgets to move their sets and you have no b...

backstage badger. And then the cast forgets to move their sets and you have no backstage crew to fill in

Sourcing for executive search, come to Recruit Plus, a Singapore company that focus in talent management. A viral marketing project for top executive search firms,executive search & corporate headhunters by www.scottsdigital.com.

Twitter / Search - luke hemmings

they both look like secret agents on a mission>>>when in reality they're just talking to each other

Seeking for math tuition, come to eimaths Singapore, a Singapore website that specialised on math tutor singapore. A viral marketing project for best maths tuition centre,best mathematics tuition centre & singapore tuition agency by Scotts Digital.