Steve Smith, host of your Technology Questions Answered, demonstrates how to protect your files through the careful use of encryption.
Episode #1-27 released on April 3, 2011
Today, we live in a world of prying eyes, criminals and black mailers. These people want your most secret documents, and personal information. This is why encryption has become a normal part of our everyday. Without knowing it, your already using encryption. It is everywhere, in one form, or another. However, there is a difference between using it, and being aware how to use it, and how it works. Today, I intend to show you all, once and for all, how to encrypt documents, and how to hide them in plain sight. You'll learn encryption, stenography, and about hidden partitions, in this episode of your Technology Questions Answered.
So, let's talk about what encryption is. Encryption, comes from the word encrypt, which shares it roots with cryptology. cryptology is the encoding of information in a matter unreadable to any prying eyes. You need a decoder index to decode encrypted information. This is useful when you need to protect documents that contain sensitive or classified information.
So what do you need to encrypt your documents and hard-drive in your computer? My suggestion, TrueCrypt. You may need a partition editor for the stenography portion of this show, but it is not required if you have Windows Vista or 7. I'll be running the demonstration in Windows XP. We will start with encrypting a file, then we will encrypt a parition. Note : Please consider defragmenting your hard-drive before attempting to create a new partition.
Want one good reason for why using a hidden partition is useful, plausible deniability. If someone, like a blackmailers, police agencies or courts forces you to reveal your password, you only need to give the password of the external encrypted container, the hidden partition will remain intact and hidden, and if they write to that partition, they will destroy any evidence along with it. This means you will not give any sensitive information that may incriminate you of crimes or actions you may have not done to begin with.
I just want to point one thing out, the stronger the password, the better the chances it survives brute force attacks, even from Government Organisations, because there is no backdoor. This also means, if you lose the password, you will lose the contents. Keep backups of files you need somewhere really safe. And, under no circumstance, reveal your password, not even to your loved ones. People are incapable of keeping secrets, but encrypted files don't utter a single word.
Have a great day, remember to subscribe to my show, either on Youtube, iTunes, Feedburner, or any other web-site your listening to me from, and support my show,if you want, by sending any amount you want to my paypal account, the account address is email@example.com. Thank you all in advance.
Host : Steve Smith | Music : Steve Smith | Editor : Steve Smith | Producer : Zed Axis Productions
Feel free to ask more questions, comment on the content, share other possible solutions, and suggestions. An account is required, please register, or login to leave your comment. Thank you for your input.
War, the Red Horseman of the Apocalypse, is called to earth to maintain the balance and enforce the laws of The Charred Council, and intervene in conflicts, if necessary, however something happens, and the actions of War acting alone set him on a life threatening challenge to prove his innocence and find out the truth of what called him, and only him, and not his other brothers of the Apocalypse.
Published on June 11th, 2017