Gimnicher Computer Services
  • Home
  • About
  • Testimonials
  • Technology Blog
  • Newsletters prior to 2015
  • Remote Support
  • Contact
  • Search this Site

Whole Disk Encryption

5/11/2015

1 Comment

 
Picture
If you travel around with a laptop or worry that someone could break into your home or business and steal your computer, then you should strongly consider whole disk encryption.  Encryption is a method of protecting data from people you don’t want to see it.  You have probably heard about it in the context of making credit card purchases over the Internet or storing information in “the cloud”.   

Login passwords are certainly good and important to use wisely, but if someone has physical access to your computer and knows what they are doing, they are easily bypassed.  Whole disk encryption when used properly cannot be bypassed.  It is truly the best approach for completely protecting all the data stored on your computer.
 
Whole disk encryption makes all the data on your computer completely unreadable without knowledge of the proper decryption key.   This decryption key must be carefully guarded just as you would a key to a vault or safe deposit box.  If the key is lost, there is really no way to access the data (that after all is the point of whole disk encryption).  This key is not a physical key, but is rather a string of characters, much like a password, only a lot longer.
 
If you have a Mac and are running OS X 10.7 (Lion) or later, you have a built-in encryption tool called FileVault.

If you have Windows Vista or 7 Ultimate or Enterprise or Windows 8.1, then you also have a built-in encryption tool called BitLocker.

If you have other operating system versions, TrueCrypt used to be my free go-to encryption software of choice, but about a year ago the developers stopped supporting it, plus there were some other issues discovered about it.  A new group of developers started with the same source code, addressed the issues, and created VeraCrypt, which is now pretty much recognized as the successor to TrueCrypt.  There are many other choices available as well, both free and not free.

The process of encrypting your whole disk takes many hours and must be done very deliberately and carefully.  You should begin by creating a system image of your current disk should the encryption fail and you need to recover your original system.  Next, you will install (if not already on your system) the encryption software and then launch it.  It will in general take you through a set of steps involving assigning or asking you for a decryption key, creating a recovery cd or usb key, and encrypting your entire disk.  After this process is successfully completed, whenever you boot your computer, you will be asked for the decryption key.  Do not be concerned about performance impact to the operation of your encrypted computer – it is negligible.
1 Comment
liana link
12/21/2022 05:39:04 am

thanks for info

Reply



Leave a Reply.

    Author

    Hi!  This is Steve. I've created this blog to share technology information relevant to you: the home or small business user of computers and mobile devices.

    Archives

    January 2023
    November 2022
    June 2022
    October 2021
    June 2021
    November 2020
    September 2020
    August 2020
    June 2020
    May 2020
    March 2020
    February 2020
    January 2020
    December 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    January 2019
    November 2018
    October 2018
    September 2018
    June 2018
    May 2018
    April 2018
    March 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015

    Categories

    All

    RSS Feed

    Subscribe to our mailing list

    * indicates required

This site follows Gimnicher Computer Services’ standard Privacy Policy and Terms of Use.
​Redwood City Business License Tax # 48438

Copyright © 2015