News1 min ago
encryption
9 Answers
word of warning i used a prog called cryptainer which makes a partion on your hard drive to store your important files obviously password protected all was well for 6 weeks then without any input from me it dissapeard, when i clicked on the desktop short cut i got install now ! the lot had gone no retrieval at all, good job i had all my important files up to a week before backed up on disc,i would not recommend this to anyone with out a back up
Answers
Best Answer
No best answer has yet been selected by deggers316. Once a best answer has been selected, it will be shown here.
For more on marking an answer as the "Best Answer", please visit our FAQ."i would not recommend this to anyone with out a back up"
but wouldn't that kind of defeat the object - all you files securely encrypted in one place, but stored unencrypted in another? Bit like putting a burglar-proof lock on the front door, but leaving the back door open in case you lose your keys...
but wouldn't that kind of defeat the object - all you files securely encrypted in one place, but stored unencrypted in another? Bit like putting a burglar-proof lock on the front door, but leaving the back door open in case you lose your keys...
Is it this:
http://www.cypherix.com/cryptainerle/
If so, I would never, ever use it.
All security products that encrypt data should be open source. If not, then unless you know and personally trust the people that make it, you cannot trust the product. Thus, you shouldn't use it.
Rojash is correct though -- while a backup is good, and it's a good job you did it this time, it really does defeat the object of using encryption in the first place, unless you store the backup in a place with as good or better security than the data you lost.
If you still want to do this -- and it's a good idea to -- then use TrueCrypt. Free software (and thus open source), tried and tested, including by many security experts in the industry.
http://www.truecrypt.org/
http://www.cypherix.com/cryptainerle/
If so, I would never, ever use it.
All security products that encrypt data should be open source. If not, then unless you know and personally trust the people that make it, you cannot trust the product. Thus, you shouldn't use it.
Rojash is correct though -- while a backup is good, and it's a good job you did it this time, it really does defeat the object of using encryption in the first place, unless you store the backup in a place with as good or better security than the data you lost.
If you still want to do this -- and it's a good idea to -- then use TrueCrypt. Free software (and thus open source), tried and tested, including by many security experts in the industry.
http://www.truecrypt.org/
I'd go with fo3nix's (or 3iPods as I now think of him ;-)
second suggestion ... truecrypt
I've used it for ages ... oh and I back my files up regularly (why would is be stupid to do so?)
with truecrypt ... create a virtual disc thats 4.6Gb in size ... and fill it up with files .... from time to time backup the container to DVD - safe and sound .... and I include the truecrypt install (which is quite happy working stand alone)
so the risk is minimal and access to the files just requires my password
btw ... who's rogan? ... do you mean ROgan JaSH (my fave indian)?
as for giving credit ... well you lost the files ... not him ....
second suggestion ... truecrypt
I've used it for ages ... oh and I back my files up regularly (why would is be stupid to do so?)
with truecrypt ... create a virtual disc thats 4.6Gb in size ... and fill it up with files .... from time to time backup the container to DVD - safe and sound .... and I include the truecrypt install (which is quite happy working stand alone)
so the risk is minimal and access to the files just requires my password
btw ... who's rogan? ... do you mean ROgan JaSH (my fave indian)?
as for giving credit ... well you lost the files ... not him ....
As for why it's included with the magazine: simple. Whoever decided to add it doesn't understand security.
If you can't check for yourself that something's secure, or trust someone else that tells you it is, then it's not secure.
TrueCrypt does a few things: make a special file on your drive that acts as a virtual partition, to put files in. Rest of drive is not encrypted. Or, encrypt an entire partition. Or, for Windows-only right now (difficulties with GNU/Linux and Mac OS X partitions so far -- Windows is their main market), you can encrypt the entire drive.
The latter is the newest function, but has been well tested seems to work very well.
If you can't check for yourself that something's secure, or trust someone else that tells you it is, then it's not secure.
TrueCrypt does a few things: make a special file on your drive that acts as a virtual partition, to put files in. Rest of drive is not encrypted. Or, encrypt an entire partition. Or, for Windows-only right now (difficulties with GNU/Linux and Mac OS X partitions so far -- Windows is their main market), you can encrypt the entire drive.
The latter is the newest function, but has been well tested seems to work very well.