Laptop File Security - 3 Rules To Follow
- Date: 2007-04-02 - Word Count: 550
Share This!
Every time I purchase a new laptop with updated OS, more hard disk space, more RAM, nice-looking design I think about possible security problems I might face.
It's not a desk PC, which is placed at home or office where the access is limited, laptop is a portable device, which is easier to lost and it can be stolen. So, it's a good idea to think about proactive security measures that can be performed to prevent security accidents.
First, I prefer to keep important data on encrypted disks, there are a number of software programs that helps to do it. The most well-know tools are PGP and TrueCrypt. The last is open source product and can be used for free.
Second, if I delete some file I want it to be irrecoverable, that's why I'm running file shredder which stays in background and wipes all files that I delete. Also, as additional measure I managed to run wipe free space in the end of every week.
Third, password and login information. It is probably the most valuable one, so I prefer not to use auto fill option in browser and type the passwords every time I need to log in, it's a simple rule and I don't waste a lot of time doing this.
So here are my tree rules, there are some minor ones. For instance, the probability that someone will steal your laptop is much lower that probability of data lost due to system crash, so it's really important to do a backup every time you fill it's necessary. It's a good idea to do a backup every month or every two weeks.
There are some kind of software, that will monitor the health of your system. It's worth paying attention to SMART hard drive technology, it gathers the valuable information about your hard disk health and share it with you, giving you an estimates about how long you will be able to use your hard disk. I'm sure your laptop already have some software that will represent you this information, but there are also, some nice third-party tools.
Pay attention to your firewall and web-browser. Installing a good firewall software or just configuring firewall software suggested by latest version of Windows, will help you to protect laptop against spyware software. Don't forget to clear browser history and cache from time to time, as it also might contain a valuable information about your traces online.
Some other security measures, that might work. Flash drivers can be used now as a keys to your laptop. For instance, you will not be able to log into the Windows unless your flash drive is inserted. Well, this is for sure, a kind of protection, but there are a number of ways to get information without starting Windows, so you need a real protection, then USB flash drive key should contain not the password for a Windows login, but the key which is used to encrypted the whole data on your hard disk.
But again, before using strong protection consider checking the possibility of corruption of encrypted volume. It's much more harder to recover corrupted encrypted volume, than just a hard disk with non-encrypted FAT system. So, the main rule about security is to do enough to protect yourself and not to try to do more.
It's not a desk PC, which is placed at home or office where the access is limited, laptop is a portable device, which is easier to lost and it can be stolen. So, it's a good idea to think about proactive security measures that can be performed to prevent security accidents.
First, I prefer to keep important data on encrypted disks, there are a number of software programs that helps to do it. The most well-know tools are PGP and TrueCrypt. The last is open source product and can be used for free.
Second, if I delete some file I want it to be irrecoverable, that's why I'm running file shredder which stays in background and wipes all files that I delete. Also, as additional measure I managed to run wipe free space in the end of every week.
Third, password and login information. It is probably the most valuable one, so I prefer not to use auto fill option in browser and type the passwords every time I need to log in, it's a simple rule and I don't waste a lot of time doing this.
So here are my tree rules, there are some minor ones. For instance, the probability that someone will steal your laptop is much lower that probability of data lost due to system crash, so it's really important to do a backup every time you fill it's necessary. It's a good idea to do a backup every month or every two weeks.
There are some kind of software, that will monitor the health of your system. It's worth paying attention to SMART hard drive technology, it gathers the valuable information about your hard disk health and share it with you, giving you an estimates about how long you will be able to use your hard disk. I'm sure your laptop already have some software that will represent you this information, but there are also, some nice third-party tools.
Pay attention to your firewall and web-browser. Installing a good firewall software or just configuring firewall software suggested by latest version of Windows, will help you to protect laptop against spyware software. Don't forget to clear browser history and cache from time to time, as it also might contain a valuable information about your traces online.
Some other security measures, that might work. Flash drivers can be used now as a keys to your laptop. For instance, you will not be able to log into the Windows unless your flash drive is inserted. Well, this is for sure, a kind of protection, but there are a number of ways to get information without starting Windows, so you need a real protection, then USB flash drive key should contain not the password for a Windows login, but the key which is used to encrypted the whole data on your hard disk.
But again, before using strong protection consider checking the possibility of corruption of encrypted volume. It's much more harder to recover corrupted encrypted volume, than just a hard disk with non-encrypted FAT system. So, the main rule about security is to do enough to protect yourself and not to try to do more.
Related Tags: encryption, file shredder
If you are interested in file shedder, check Sam Miller new web-site. Your Article Search Directory : Find in Articles
Recent articles in this category:
- Improper Way Of Marketing Reflects Poorly On A Company.
New business, product or service everything requires visibility, awareness in order to come into the - Replacing Paper Prints With Online Versions
Nowadays saving out on resources and being additionally informative are both aspects that are in. In - Stop Smoking Effectively
If I told you of a way that you could stop smoking harmful tobacco would you believe it? Most people - What Is Runtime Error 182? And How To Fix It
Are you finding an effective way to fix runtime error 182? Do you think fixing runtime error 182 is - Do You Know How To Fix Runtime Error 87 In Minutes?
Are you finding an effective way to fix runtime error 87? Do you think fixing runtime error 87 is to - Knowledge About Avi, Avi Player, Avi Converter On Mac
Knowledge about AVI, AVI player, AVI Converter on MacWhat is an AVI?AVI, an acronym for Audio Video - Buy Your Highly Successful Email Survey Software Today
Email Survey Software- Boost Your Business and Increase ProfitsAn email survey software could be one - Xrm - The Anything Relationship Management Solution
I recently attended the Microsoft Dynamics West Region FY11 Sales Planning Retreat. This year's meet - What Are The Benefits Of Working With Electronic Medical Records
Recording medical information is a vital part of health care services. These records are necessary f - Basic Factor To Make Website Business Oriented
Internet is home for millions of websites. The online business is becoming more and more competitive
Most viewed articles in this category:
- Parental Control Software
Parental control software is software that can help parents protect their children when they are onl - Digital Asset Management Software
Managing and organizing your organization's documents is a critical component to your business's suc - AdobeRGB vs. sRGB
Understanding color spaces I'll try to explain it very simplified, but understandable for everyone - Confessions of a Prankster
I wanted to get a jump on April Fool's Day, partially because of the long, cold winter blues, and pa - Malicious Thoughts About The Spyware Ills Of My PC
Who would think I was capable of such revengeful thoughts about the parties responsible for inflicti - Recover File and Recover Deleted File Tools
Data recovery software is a very effective way of retrieving data from a worn or damaged hard disk d - Life without Windows
Ubuntu, a user-friendly version of Linux, has been running so nicely on my home PC that I decided to - What Benefit Does an Online Software Download Site Offer You?
Are you having a problem that where you find a good softeware when you consider to have a try or wan - Maintaining A Website
There was an era when people were talking about how to create a website using html coding or some ea - Benefits Of Proper Time Tracking
Have you ever written down time when you have started and finished your work? Maybe you have had mul