Now that we are living in the digital age where most people talk and transact via the internet, it’s not really impossible that our conversations with people, whether it be personal or professional, is not safe from digital peeping toms.
Securing personal data has always been an issue for many. Now that many people use their Smartphones, tablets, laptops and PC for their everyday use and much of their whereabouts and their activities can be found in it, everyone wants to stay safe.
There are cases where people were robbed, killed or had their personal data stolen because somebody broke through their security.
So how do we keep our files and ourselves safe from them?
Over the years, many I.T. companies have developed applications that will encrypt your files. Nobody is safe from data interference. But encrypting your files will keep it safe from them for a time. And if your security app is good, they may have decoded the lock way after you have implemented what’s in your encrypted files.
So how do you encrypt files? There are many types of software to choose from. Windows has its feature of encryption. It is a driver called EFS (Encryption File System), and this driver encrypts the files and makes them transparent from attackers who gain access to your system. The function of EFS is to apply lock your file with a symmetric key and this symmetric key is also known as the File Encryption Key that uses symmetric algorithm.
For some people, they simply set up passwords for their word documents then pass on another layer of security by archiving the file and setting up a password for the .Zip or .rar file. Then they put another layer of security via third-party software like true crypt, which I often use.
Now, that is securing your files itself.
Cyber-attacks can also be done through your internet connection. If ever you are using a wireless connection, you are also vulnerable to attackers. That’s why many sites used HTTPS connections so that passwords and other data coursed through it may be harder to intercept.
What are the best encryption tools?
Personally, I have been using just one application for security. What I use is true crypt. True crypt is used for encrypting the data being saved.
So how do you use true crypt?
First, you download the software itself and then install it. Now you are ready to use it
Second, launch the application. The main True Crypt window should appear. Click Create Volume
Next, The True Crypt Volume formation Wizard pane ought to show.
At this stage you must decide where you desire the True Crypt volume to be formed. A True Crypt volume can reside in a file, which is also called container, in a partition or drive. Most of the time, I choose the first option and create a True Crypt volume within a file.
After you have chosen one, click next.
Fourth step is you need to choose whether to create a standard or hidden True Crypt volume. I always choose the former option and create a standard True Crypt volume. This is easier for newbies.
As the option is selected by default, you can just click next.
In the Fifth step, you have to specify where you wish the True Crypt volume (file container) to be created. Note that a True Crypt container is just like any normal file. It can be, for example, moved or deleted as any normal file. It also needs a filename, which you will choose in the next step.
Click Select File.
The standard Windows file selector should appear (while the window of the TrueCrypt Volume Creation Wizard stays open at the back).
For the 6th step, you will create a file in a preferred location. You can make use of any file or folder in that case or your flash drive. Just bear in mind that true crypt will not encrypt accessible files. What you are making is a container hence if you give the container a name that is similar to something saved on it; you might by mistake overwrite it.
Type the preferred container filename in the File name box.
The file selector window ought to vanish.
Next step, you contact the container that you created. In the Volume Creation Wizard pane, click next.
Step 8: Here you can select a hash algorithm and an encryption algorithm for the volume. For your ease, you can make use of the inbuilt settings and click next
Step 9: You will specify what will be the size of your container. You may, of course, specify a different size. After you type the desired size in the input field, click next.
Step 10: You will at this instant set a code word on your container. Ensure you set a secret code that you will be capable of remembering however something that is protected. After you pick a good secret code, type it in the initial input field. After that re-type it in the input area below the first one and hit next.
Step 11: Move your mouse at random in the Volume Creation Wizard pane no less than about 30 seconds. The longer you shift the mouse, the better. This considerably boosts the cryptographic potency of the encryption keys (which boosts security).
Volume formation ought to start. True Crypt will at the moment build a file named My Volume in the directory D:\My Documents\ (as indicated in Step 6). This folder will be a True Crypt container (it will hold the encrypted True Crypt capacity). Depending on the magnitude of the volume, the volume formation may take an extended time. After it concludes, a dialog box will come out:
Then, click ok to shut the dialog box.
You have at this time effectively protected your file. Just do not fail to remember your secret code!
Keeping your private data is vital. So at all times remember, it might be painstaking to secure your data. However you might be saving your things and yourself from possible harm.
About the Author: