Steve Smith, host of your Technology Questions Answered, demonstrates how to protect your files through the careful use of encryption.
Episode #1-27 released on April 3, 2011
Today, we live in a world of prying eyes, criminals and black mailers. These people want your most secret documents, and personal information. This is why encryption has become a normal part of our everyday. Without knowing it, your already using encryption. It is everywhere, in one form, or another. However, there is a difference between using it, and being aware how to use it, and how it works. Today, I intend to show you all, once and for all, how to encrypt documents, and how to hide them in plain sight. You'll learn encryption, stenography, and about hidden partitions, in this episode of your Technology Questions Answered.
So, let's talk about what encryption is. Encryption, comes from the word encrypt, which shares it roots with cryptology. cryptology is the encoding of information in a matter unreadable to any prying eyes. You need a decoder index to decode encrypted information. This is useful when you need to protect documents that contain sensitive or classified information.
So what do you need to encrypt your documents and hard-drive in your computer? My suggestion, TrueCrypt. You may need a partition editor for the stenography portion of this show, but it is not required if you have Windows Vista or 7. I'll be running the demonstration in Windows XP. We will start with encrypting a file, then we will encrypt a parition. Note : Please consider defragmenting your hard-drive before attempting to create a new partition.
Want one good reason for why using a hidden partition is useful, plausible deniability. If someone, like a blackmailers, police agencies or courts forces you to reveal your password, you only need to give the password of the external encrypted container, the hidden partition will remain intact and hidden, and if they write to that partition, they will destroy any evidence along with it. This means you will not give any sensitive information that may incriminate you of crimes or actions you may have not done to begin with.
I just want to point one thing out, the stronger the password, the better the chances it survives brute force attacks, even from Government Organisations, because there is no backdoor. This also means, if you lose the password, you will lose the contents. Keep backups of files you need somewhere really safe. And, under no circumstance, reveal your password, not even to your loved ones. People are incapable of keeping secrets, but encrypted files don't utter a single word.
Have a great day, remember to subscribe to my show, either on Youtube, iTunes, Feedburner, or any other web-site your listening to me from, and support my show,if you want, by sending any amount you want to my paypal account, the account address is firstname.lastname@example.org. Thank you all in advance.
Host : Steve Smith | Music : Steve Smith | Editor : Steve Smith | Producer : Zed Axis Productions
Feel free to ask more questions, comment on the content, share other possible solutions, and suggestions. An account is required, please register, or login to leave your comment. Thank you for your input.
You play Takkar, and are part of a Wenja tribe, you are hunting a Woolly Mammoth baby, and successfully kill it, in order to survive, when a saber-toothed tiger attacks you killing everyone in your tribe, but yourself. Defenseless, you have to build new weapons for yourself using the resources available around you. These first weapons include bow and arrows, spears, and clubs. All of which can be lit on fire. You have to contend with day and night cycles, and survive in the wilderness along side woolly mammoths, dire wolves, cave bears, cave lions, woolly rhinos, irish elk, saber-toothed cats, brown bears, badgers, deer, etc.
Published on April 21st, 2018