Posts Tagged ‘encryption’

Encrypting File System

Encrypting File System (EFS) allows you to encrypt and decrypt files and directories transparently. Like its predecessor, Windows 7 supports EFS and it is very simple to apply. By just marking a directory to use EFS, any file created in that directory is encrypted. Read more…

Share

Be the first to comment - What do you think?  Posted by George - July 19, 2012 at 7:03 am

Categories: Security   Tags: , , , , , ,

Enabling Indexing of Encrypted Files

If your search for content in encrypted files is failing then you may need to enable the Index Encrypted Files option available in Windows 7. Windows uses the index to perform very fast searches on your computer. Unlike the previous versions of Windows, Windows 7 supports indexing the contents of encrypted files. This makes searching encrypted content as easy as searching unencrypted content.  By default, non-encrypted content (even non-encrypted properties of encrypted files) are always indexed. Indexing of encrypted files is possible on local file systems and an index rebuilt is required when you enable or disable this function. Read more…

Be the first to comment - What do you think?  Posted by George - March 8, 2012 at 8:21 am

Categories: Performance   Tags: , , , , , , , ,

Secure and Free Online Backup Procedure

Using BitLocker in Windows 7 Enterprise and Ultimate editions to encrypt your data and then uploading it to the cloud (such as, Windows Live SkyDrive, Dropbox, etc.) can provide you with a secure online backup solution at no costs. The only caveat is that you need to perform some manual tasks before uploading the encrypted data to cloud storage. If you simply upload encrypted data from an active drive protected with BitLocker to cloud storage, it will be stored in the cloud in unencrypted form, which means it could be read by whoever has administrative access to the cloud where data is stored. In order to retain encryption of your uploaded data, the encrypted drive has to be dismounted and uploaded as a raw file. You could achieve this by creating a virtual hard drive, copy your sensitive files, encrypt it using BitLocker, and upload the vhd file to the cloud as described below:

Read more…

Be the first to comment - What do you think?  Posted by George - January 3, 2012 at 3:05 am

Categories: Backup & Restore   Tags: , , , , , , , , , , ,

Enabling BitLocker

To enable BitLocker on your computer you need administrator privileges and your computer has to have the appropriate TPM hardware or the appropriate Group Policy if TPM is not present. A check is performed after you enable BitLocker and an error is displayed in case your computer does not support BitLocker. Go here for more information.

Read more…

Be the first to comment - What do you think?  Posted by George - September 25, 2011 at 11:36 am

Categories: Security, Utilities   Tags: , , , , ,

BitLocker Security Modes

BitLocker can function in different modes which provide different levels of security. Which mode you choose depends on whether you have a Trusted Platform Module (TPM) on your computer and the level of security you want to achieve. The TPM is a secure device built into the hardware of the computer to store cryptographic (encryption) keys. Different security modes can combine the usage of a TPM, a PIN number and a startup key. A startup key is a cryptographic file that is stored on a separate USB file. Go here for more info about the security levels of BitLocker.

Read more…

Be the first to comment - What do you think?  Posted by George - September 21, 2011 at 4:46 am

Categories: Security   Tags: , , , , , ,

Protect your computer with BitLocker

BitLocker is a full volume encryption and system protection feature that is available on computers running the Enterprise and Ultimate editions of Windows 7. It protects data on your hard drive if this is connected to a foreign system or when your system is booted off an alternate operating system in an attempt to steal data. Remember, that without the BitLocker encryption key, the data stored on the volume is inaccessible.

Read more…

1 comment - What do you think?  Posted by George - August 17, 2011 at 4:04 am

Categories: Security   Tags: , , , , , , , ,