31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.jpgHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

Data encryption is the first step in deterring anyone from collecting your data. Now if you were able to hide it, thats even better. You can do this by using a open-source program known as TrueCrypt. The first step in using TrueCrypt is downloading and installing it.

With TrueCrypt, you can literally hide and encrypt data within an encrypted volume. Confused by this yet? Basically what this means is you can create an encrypted volume (outer volume) that requires a password to access and then you can create a hidden volume (inner volume) within it, that requires an additional password. The difference between the two volumes, is that the inner volume just looks like a bunch of random data that to anyone that gains access to the outer volume would think was insignificant.

If by chance you become a victim of extortion or blackmail by someone that need the password to access that file (let's say it's named Bank Credentials) you can put a bunch of phony information within the outer volume while having the actual information encrypted and hidden as an inner volume.

Creating a hidden volume is simple, but first you want to create your outer volume. Do this by opening up TrueCrypt and clicking the Create Volume button. Then choose Create an encrypted file container. A volume-creation wizard will open that will walk you through the steps to creating the volume. In order to create a hidden volume within it, click Create Volume in TrueCrypt and then select Create a hidden TrueCrypt volume. A wizard will open up and walk you through the process of creating the hidden volume within your other volume.

If you want to access the information in either of the files, open TrueCrypt and click Select File, and choose the outer volume file. Then click Mount. At this point you have 2 options, in order to gain access to the hidden volume enter the password you created for the hidden volume. To access the information in the outer (phony) volume, enter the password you created for the outer volume. What this allows you to do is provide the password of the outer volume to any extortionist that may have overcome you in their endeavor. This only grants them access to the phony information without being all the wiser to the hidden information.

Truecrypt is a great option to protect your personal data, but for a company network you may want a lot more protection than that. This solution is recommended for encrypting files on personal computers. To learn more about securing your network contact XFER at 734-927-6666 / 800-GET-XFER.

Know the Risks of the Internet before Logging On
Save Hardware Expenses with Desktop Virtualization
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Friday, 22 November 2024

Captcha Image

Customer Login


Cybersecurity Risk Assessment

cybersecurity-audit

Our risk assessment will reveal hidden problems, security vulnerabilities, and other issues lurking on your network.

Request Yours Today!

Contact Us

Learn more about what XFER can do for your business.

XFER Communications, Inc.
31478 Industrial Road Suite 200
Livonia, Michigan 48150