Tag Archives: folder

Beat Obama’s Bandits With TrueCrypt Free (Open-Source) Encryption

The so called “War on Terror” has long since lost its luster and should be appropriately reclassified as The War of Terror. The U.S. has been singularly impudent in terrorizing the terrorists but instead, it has managed to terrorize the rest of the world using a system of surveillance schemes that have gone off the board. Chalk one up for Al Qaeda – the only winners in this debacle.

In the meantime, Americans continue to live in fear – trading away freedoms for security in a war that is simple unwinnable. Obama, despite his assurances that he would “fight terrorism while maintaining our civil liberties” has been a principle mover in this assault on democracy.

And, the master of the reversal has more –

Obama, in a 2008 election sound bite, drew a sharp contrast with the Bush administration which he proclaimed, offered Americans “a false choice between the liberties we cherish and the security we demand.” And for good measure – for stooping “to spy on citizens who are not suspected of a crime.” It’s a surreal world we live in, is it not?

But why be satisfied with my ramblings? Here’s the video.

image

As America continues its slide into Fascism (eagerly joined in the venture by Canada, Australia, the U.K. and countless other self-advertised “democracies”), the justified expectation held by these governments is – you – yes, you – will take no active part in expressing your outrage at the escalating intrusions into your private life. Sadly, the undermining of democracy, or more to the point, democracy as we though we knew it, continues apace.

As a consequence (hardly the only consequence, of course), encryption technology is once again in the spotlight. And no, using encryption does not mean that one has something to hide.

Sophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Putting Obama and his bad boys aside, here are some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

It happens to us all: Just this past week, I lost not only my house keys (first time ever) – but the USB key attached to the keychain. If you guessed that the drive was encrypted – take a bow.   Smile

TrueCrypt:

TrueCrypt is an outstanding free open source software application for establishing and maintaining an on-the-fly-encrypted volume. On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved – without any user intervention. The program automatically and transparently encrypts in real time.

No data stored on an encrypted volume can be read (decrypted) without the correct password/key file or correct encryption keys. The entire file system is encrypted (i.e., file names, folder names, contents, free space, Meta data, etc.).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). When you turn off your computer, the volume will be dismounted and files stored in the volume will be inaccessible and encrypted. You may of course, manually dismount the volume.

TrueCrypt offers a number of options – you can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Installation is simple and straightforward – no gotchas here. Lots of steps – but easy steps.

image

image

image

image

image

If you choose “Keyfiles”, be sure you understand the ramifications. This is an extra security step which has limited application for a home user. You do not need to select this option.

image

image

image

image

image

And – Win 8’s File Explorer reports that the volume has been setup successfully. If you expand the graphic below (click), you’ll also notice my first TrueCrypt volume on this HD from May 9, 2006.

image

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

I’ve been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Win 8, Win 7, Vista, XP, Mac OS X, and Linux.

Download at: TrueCrypt

14 Comments

Filed under downloads, Encryption Software, Freeware, Interconnectivity, Open Source, Software, Utilities

TrueCrypt – Free Encryption To The Max

imageSophisticated and  aware computer users know, that financial data and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost, or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have been using for years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or on a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Encryption, Encryption Software, Encryption Software Alternatives, flash drive, Freeware, Open Source, Software, USB, Utilities, Windows Tips and Tools

EncryptOnClick – Encrypt and Decrypt Files and Folders With A Few Clicks

The article I posted a few days ago – Free Secret Disk – Keep Your Secret Computer Files “Secret”, led to a more than a few reader questions on additional free encryption applications.

So, I’ve retested the updated versions of a number of free encryption applications I’ve recommended in the past few years, and I’ll post on these in the coming days – starting today with EncryptOnClick

EncryptOnClick ( last updated March 08, 2011), is a free program that lets you securely encrypt and decrypt files/folders. The program is very simple to use, and features military grade 256-bit AES encryption.

After you have launched the application, simply select the target file/folder you want to encrypt.

Following the easy interface, type a password for that file/folder which will then be encrypted. To open the encrypted file/folder at a later date, you must type the correct password.

In the following example I’ve chosen to encrypt a folder by clicking on the Folder button…

image

which prompted me to browse and select the target folder.

image

The application took approximately one minute to encrypt this 220 MB folder and its sub folders.

In the following graphic you can see that the file I’ve highlighted, within the encrypted folder, can only be accessed through EncryptOnClick.

Click on graphic to expand to original size.

image

Decrypting the selected folder is just as simple and straightforward.

image

In the following graphic  you can see that the file I’ve highlighted within the folder (following  decrypting), can now be accessed normally.

Click on graphic to expand to original size.

image

Fast facts:

A very secure encryption and decryption method is used (256-bit AES encryption)

Files are both compressed & encrypted, which results in a smaller file

Password protected

Will encrypt single files or all files in a folder

Very simple to use interface

Can be used on a USB key

Fully Unicode enabled so filenames in any language can be encrypted

Will encrypt, decrypt, compress, and uncompress files which can also be opened and decrypted using third party programs like WinZip 9 – provided the correct password is used

Will detect if you’re decrypting a file that is in a temporary folder, and if so, will prompt you to see if you would like to decrypt it into a different folder

Command line parameters can be used

Complete help file

Tip: Run on a Flash Drive by copying the files EncryptOnClick.exe, EncryptOnClick.exe manifest, ExceedZip.dll to a named folder on the Flash Drive.

System Requirements: Windows XP, Vista, Win 7 and NT.

Download at: Download.com

Tomorrow: Free Encrypt Stick reviewed.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, Privacy, Software, Utilities, Windows Tips and Tools

LimeWire Is Dead – Long Live FrostWire!

If you visit the official LimeWire website, you will, no doubt, be surprised to see the following message –  “This is an official notice that LimeWire is under a court-ordered injunction to stop distributing and supporting its file-sharing software. Downloading or sharing copyrighted content without authorization is illegal.”

The Recording Industry Association of America which represents the recording industry distributors in the United States, has struck once again in its aggressive battle to combat what it defines as copyright infringement. While I’m not a supporter of copyright infringement, I do consider RIIA’s tactics not far removed from those that were once employed by the Spanish Inquisition. Heavy handed – to say the least.

image

Unfortunately, if you were a LimeWire user you’ve noticed that searching, downloading, uploading, file sharing and so on, are no longer available. But, don’t despair – there are other solutions. Maybe now is the time to take a close look at a LimeWire alternative – FrostWire.

FrostWire (newest version: 4.21), released September 29, 2010, is a free, open source Peer to Peer application which incorporates all of the now dead LimeWire’s functionality, as well as a number of the features of the old LimeWire Pro – including multi-threading downloads, and Turbo-Charged connections.

To insure broad appeal, FrostWire is a multi platform program running on Windows 7, Vista, XP, 2000, NT, Mac OS X 10.4 or later, Linux, and some flavors of Unix.

image

Fast facts:

Open-source

Firewall-to-firewall transfers

Built-in community chat

Connects to more sources

Creative commons license support

Broadband network connection

Junk result filters

Turbo-Charged download speeds

iTunes integration

Gnutella support

BitTorrent support

Proxy Support

If P2P file sharing is one of your interests, then you’ll find that this program, with its highly intuitive interface, should meet all of your needs. With almost 30 Million downloads on CNET alone, calling this application “very popular” is a bit of an understatement.

System requirements: Windows 7, Windows 2000, Windows Vista, Windows NT, Windows XP, Mac OS X 10.5 or later, Linux, Unix such as Solaris.

Additional requirements: Java Runtime Environment 1.6

Download at: FrostWire.com

Note: Consider the trade-offs, and the very real risks involved in Peer to Peer file sharing.

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, (Susan Naulls), and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, FrostWire, Interconnectivity, Open Source, Peer to Peer, Software, Ubuntu, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download TrueCrypt – TrueCrypt Beats The FBI Decryption Team!

image

When the subject of file/disk encryption comes up, when talking with my non-technical friends, I often get the oddest looks and the strangest comments. These comments generally revolve around the fact (my friends’ facts), that only someone with something to hide would need to encrypt files.

They’re right of course, but not for the reasons they set forth.

In the real world, aware computer users know that financial data, and other confidential information, can easily be subject to intrusive viewing by those not authorized to do so.

Some examples of how this might occur:

Internet malware attack: Increasingly, statistics reinforce the fact that financial data continues to be targeted by hackers/information thieves, for the purpose of identity theft.

Contrast that reality with these facts; there is no such thing as a totally secure Internet connected computer. All Internet connected computers are subject to attack and compromise.

Lost or stolen Laptop: How often have we read the following – 200,00 (insert your own number here), bank account numbers, Social Insurance Numbers, names, addresses and dates of birth were on a laptop stolen/lost earlier this week.

In too many of these cases, negligently, the data is unencrypted. Certainly Laptop theft or loss is not restricted to organizations; it can just as easily happen to you.

Lost or stolen USB drive: Since USB flash drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two), or stolen.

To reduce or eliminate the security threat of sensitive data exposure then, the most prudent course of action is data encryption. Essentially, data encryption is a secure process for keeping your sensitive and confidential information private. It’s a process by which bits of data are mathematically jumbled with a password-key. The Encryption process makes the data unreadable unless, or until, decrypted.

TrueCrypt is an outstanding free open source software application (one I have using for the last several years), for establishing and maintaining an on-the-fly-encrypted volumes.

On-the-fly encryption simply means that data are automatically encrypted, or decrypted, just before they are loaded or saved, without any user intervention.

image

image

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or in this latest release (November 23, 2009), a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Indicative of this application’s popularity is the fact that it is downloaded tens of thousands of times each day, across the Internet.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified (volumes cannot be distinguished from random data)

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

Pipelined operations increasing read/write speed by up to 100% (Windows)

Mac OS X version

Graphical user interface for the Linux version of TrueCrypt

XTS mode of operation – XTS is faster and more secure than LRW

As I said earlier, I have been using TrueCrypt for a number of years, and I have developed a lot of confidence in this outstanding application. If you determine that encryption of your sensitive data is a priority, I highly recommend that you give TrueCrypt a try.

How effective is TrueCrypt? If you have any doubts as to how effective TrueCrypt really is, then read this article. FBI hackers fail to crack TrueCrypt:

The FBI has admitted defeat in attempts to break the open source encryption used to secure hard drives seized by Brazilian police during a 2008 investigation.

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under cybercrime, Don't Get Hacked, downloads, Encryption, Encryption Software, Freeware, Linux, Mac, Open Source, Portable Applications, Software, Spyware - Adware Protection, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Access Denied in Windows 7? – Download Free TOwnership (Take Ownership)

I love Windows 7, since it was built with more security in mind than previous Windows operating systems. No, I’m not saying that it’s perfect, but Windows 7 is a significant improvement.

I’m all for enhanced security but, I get plenty ticked off when I need access to a specific file, or folder, and I find out Windows 7 won’t allow it. It doesn’t even trust ME, and I have administrator privileges!

Here’s an example of operating system paranoia, when I requested access to MY local settings folder.

image

Now, wait a minute – that’s just wrong! I’m the one in control here – not some bloody computer operating system. Computers will do as I command; not the other way around.

I understand, up to a point, why Microsoft programmers decided that some users shouldn’t have access to certain files, or folders, in order to prevent unintentional, or intentional, file or folder modification. Microsoft’s habit of “hiding”system files, by default, is one example of this “safety first” thinking.

Frankly though, I don’t allow any files or folders, on any of my systems, to remain hidden, or inaccessible. I want to know what’s there, who put it there, and most importantly – what it does.

It’s easy enough to change the default setting in Windows Explorer so that system files are no longer hidden. And, I highly recommend that you do so; since malware is notorious for sitting in these files, and attacking/changing them.

Here’s what to do, so that you can at least see these files:

On the Tools menu in Windows Explorer, click Folder Options.

Click the View tab.

Under Hidden files and folders, click Show hidden files and folders.

However, doing this will not change restricted access to certain of these files, and folders. Microsoft does provide a solution though – if you want to work through an 11 step process. I kid you not – 11 steps!

A much easier solution to this aggravation, comes in the form of a neat little free application – TOwnership.

Take Ownership is a Shell extension which adds a Windows Explorer context menu option – “Take Ownership” to all folders and files, which will allow you to take ownership of a file, or folder, thereby gaining access.

Following installation you will see the new “Take Ownership”, command in Windows Explorer context menu (right click menu), as the following screen capture shows.

image

When you take ownership of a file, or folder, you will see a screen similar to the following screen capture, as the application goes through its machinations.

image

Remember the “access denied” warning at the top of this article? After installing and launching TOwnership, it has been replaced with the following, which indicates I now have complete access to my local setting folder. So take that Windows 7!

image

This is a great free application that can save a user a ton of steps when taking ownership of a file, or folder, is necessary. I highly recommend it.

Download at: Softpedia

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

28 Comments

Filed under Don't Get Scammed, Don't Get Hacked, downloads, Freeware, Geek Software and Tools, Software, System Utilities, Utilities, Windows 7, Windows Tips and Tools, Windows Vista

Download Free USB Safeguard – Simple USB Data Encryption

USB Stick 2 Since USB drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two – both encrypted), or stolen.

If you should lose a USB drive, through happenstance or theft, you need to be sure that any confidential information on the drive cannot be read, and the way to do that is to encrypt your data.

If you’re unfamiliar with data encryption; simply put, it is a process by which bits of data are mathematically jumbled with a password-key. The process makes the data unreadable unless, or until, decrypted by you.

Here’s a very cool free encryption application, USB Safeguard, which will encrypt your USB data in an easy, follow the bouncing ball manner – you can’t get much easier than “Drag and Drop”. Simply download this free application and run it from your USB drive.

The following screen captures illustrate just how easy encryption can be using USB Safeguard. Clicking on any graphic will open a new window to display the graphic in 640x – format.

Launch the application on your USB drive and construct a password.

USB Safeguard 1

You will be queried as to whether you want to save your password on your Home PC.

USB Safeguard 2

Drag and Drop the files on the USB Drive you want to encrypt into the applications interface window. The free application restricts encryption to a maximum of 2 GB.

USB Safeguard 3

Following successful encryption you will have the option of further protecting your files (in the event of loss), by overwriting or deleting the encrypted files. I particularly like this feature, since it adds another layer of security.

USB Safeguard 4

USB Safeguard 5

Decrypting the files is every bit as easy. Simply launch the application (remember, the application is on the USB drive), enter you’re password and voila!

USB Safeguard 7

Fast facts:

Runs with any usb pen drive

No installation required

256-bit AES encryption

Easy drag & drop file adding

Built in file shredder

Secure your data if drive is lost

Supports FAT16, FAT32 and NTFS file system

Without a doubt, this is encryption taken to a new level of simplicity. Ideal for average users, who have little interest in dealing with the finer points of encrypting data.

System requirements: Windows XP/Vista/Seven

Download at: Developer’s Site (USB Safeguard Software)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

14 Comments

Filed under downloads, Encryption, Encryption Software, Freeware, Privacy, Software, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Two Free Apps to Encrypt Your USB Drive

encryption 1You can call it a Flash Drive, a USB Key, a USB drive, a Keychain drive, or a USB stick. Whatever you call it, you are referring to a small plastic case which contains a circuit board and a USB connector.

Instead of the now obsolete floppy disk (new machines generally don’t have a floppy drive), USB flash drives have become the standard for transporting applications, personal files, documents, pictures, videos, music and so on.

Since USB drives are so portable, you can take a drive virtually anywhere. Just like most items that are portable and that you carry with you, this type of drive can be lost (I’ve personally lost two), or stolen.

If you should lose a USB drive, through happenstance or theft, you need to be sure that any confidential information on the drive cannot be read, and the way to do that is to encrypt your data.

Here are a number of free encryption applications that will encrypt your data, and are suitable for a USB flash drive.

EncryptOnClick

image

EncryptOnClick is a free program that lets you securely encrypt and decrypt files. The program is very simple to use, and features military grade 256-bit AES encryption.

After you have launched the application, simply select the target file/folder you want to encrypt.

Following the easy interface, type a password for that file/folder which will then be encrypted. To open the encrypted file/folder at a later date, you must type the correct password.

Fast facts:

A very secure encryption and decryption method is used (256-bit AES encryption)

Files are both compressed & encrypted, which results in a smaller file

Password protected

Will encrypt single files or all files in a folder

Very simple to use interface

Can be used on a USB key

Fully Unicode enabled so filenames in any language can be encrypted

Will encrypt, decrypt, compress, and uncompress files which can also be opened and decrypted using third party programs like WinZip 9 – provided the correct password is used

Will detect if you’re decrypting a file that is in a temporary folder, and if so, will prompt you to see if you would like to decrypt it into a different folder

Command line parameters can be used

Complete help file

Free technical support, online forums, knowledge base, and FAQs at 2BrightSparks

Tip: Use on a USB key by copying the files EncryptOnClick.exe, EncryptOnClick.exe manifest, ExceedZip.dll to a named folder on the USB key.

System Requirements: Windows 98/ME/2000/XP/2003/Vista (64 bit)

Download at: SnapFiles

TrueCrypt

image

TrueCrypt (updated November 23, 2009), is an outstanding free open source software system, (one I have using for the last several years) for establishing and maintaining an on-the-fly-encrypted volume.

On-the-fly encryption simply means that data are automatically encrypted or decrypted just before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/correct encryption keys.

TrueCrypt uses 11 algorithms for encrypting private files in a password-protected volume. You can store your encrypted data in files, partitions, or a portable storage device such as a USB flash drive.

Once your encrypted files are mounted to a local drive with your password or key, you can manipulate those files, i.e. you can open, copy, delete, or modify them. When you have completed working on those files, you then dismount the volume and the files are then safely secured from unauthorized access.

Fast Facts:

Creates a virtual encrypted disk within a file and mounts it as a real disk

Encrypts an entire hard disk partition or a storage device such as USB flash drive

Encryption is automatic, real-time (on-the-fly) and transparent

Provides two levels of plausible deniability, in case an adversary forces you to reveal the password – Hidden volume – No TrueCrypt volume can be identified – volumes cannot be distinguished from random data

Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts

System Requirements: Windows 7/Vista/XP (64 bit), Mac OS X, and Linux

Download at: TrueCrypt

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

11 Comments

Filed under downloads, Encryption, Encryption Software, flash drive, Freeware, Privacy, Software, USB, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Free FrostWire P2P – Not Just LimeWire Pro in Disguise

imageFrostWire (newest version: 4.18.5), released December 11, 2009, is a free, open source Peer to Peer application.

To insure broad appeal, FrostWire is a multi platform program running on Windows 7, Vista, XP, 2000, NT, Mac OS X 10.4 or later, Linux, and some flavors of Unix.

FrostWire includes all of the free LimeWire version’s functionality as well as a number of the features of LimeWire Pro – including multi-threading downloads, and Turbo-Charged connections. An added benefit in using FrostWire; you won’t have to put up with LimeWire’s nag screen or ads.

image

Fast facts:

· Open-source

· Firewall-to-firewall transfers

· Built-in community chat

· Connects to more sources

· Creative commons license support

· Broadband network connection

· Junk result filters

· Turbo-Charged download speeds

· iTunes integration

· Gnutella support

· BitTorrent support

· Proxy Support

If P2P file sharing is one of your interests, then you’ll find that this program, with its highly intuitive interface, should meet all of your needs.

With over 26 Million downloads on CNET alone (200,000 in the past week), calling this application “very popular” is a bit of an understatement.

System requirements: Windows Me/2000/XP/Vista/7

Additional requirements: Java Runtime Environment 1.6

Download at: Download.com

If P2P file sharing is one of your interests then you should consider the trade-offs and the very real risks involved in Peer to Peer file sharing.

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

9 Comments

Filed under Don't Get Scammed, Don't Get Hacked, downloads, Freeware, Interconnectivity, Networking, Peer to Peer, Software, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Peer to Peer File Sharing, Very Cool But…

You should consider the trade-offs and the very real risks involved in Peer to Peer file sharing.

Peer to Peer file sharing sounds promising, right? Maybe, but make sure that you consider the trade-offs and the very real risks involved. The number of times I have been called upon to rescue a friend’s computer because of system damage caused by peer to peer downloading, has convinced me to give this form of file sharing an automatic “thumbs down”.

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

1 Comment

Filed under Don't Get Scammed, Don't Get Hacked, Internet Safety, Online Safety, Peer to Peer, Windows Tips and Tools