Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Its Time to Sing the Encryption Song - Again! > NetSparsh - Viral Content you Love & Share

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Then couple that with all the recent hacker activity, new reports from the GAO (that's the Government Accounting Office) that the government can't protect it's own computers and data much less the data WE send them, reports that computer theft is on the rise and news that the FBI is now developing a new computer "worm" (read virus) to spy on citizens, I decided to sing the encryption song again. This time I'll sing a verse about personal data encryption.

So what do I mean by personal data encryption? I mean ANY data on ANY storage medium that relates to you, your family or your business. Encryption is the process of scrambling electronic data in such a way that it's unreadable to all but the owner.

For the purposes of this article I'll cover two different ways to encrypt data and the pros and cons of each.

The first way is file/folder encryption. This is the process by which someone identifies what data they want to protect on a file by file or folder basis and then encodes each file or folder using some kind of software encryption tool.

What are the pros of this style of encryption? First, each file or folder can be assigned its own "encryption key". Then, even if one key gets "cracked" open, all the other files or folders will still be safe. Next, only those files and folders you identify and select will be encrypted. This allows for a "gnat's behind" level of detail that some folks need to feel secure.

What are the cons of file or folder level encryption? Well, at this level of detail, tracking of all the different encryption keys and file locations would be an administrative nightmare! So, unless you have days to spend identifying files and folders and encrypting them or if you are really, really into details, file level encryption just isn't practical for most people.

The second way to protect personal data is drive encryption. Unlike file encryption, drive level encryption allows a user to create a reserved area on the hard drive called a container. Once created, this container can be "mounted" or set to act like another fully functional hard drive on a computer. It will appear in the file manager just like any other drive.

What are the pros for drive encryption? This space can be "mounted" using a single encryption key and the key only needs to be entered once. After it's mounted, this virtual drive can contain any data and / or program, just like any regular drive. But when it's dismounted, the virtual drive is no longer visible and the container looks like any other file, the contents of which are completely inaccessible without the encryption key.

What's the down side to drive encryption? If you forget your key, all the data and / or program information in the container is lost. Also, all the information is only protected by a single key. So if your key is compromised, all your information is available to prying eyes.

What's my recommendation? Drive encryption. Drive encryption is far more efficient than file encryption especially if you need to access your data frequently. Drive encryption also allows for the complete encryption of programs, something virtually impossible to do with file level encryption. (Well not impossible but certainly problematic and time consuming!) And by creating an encryption key of sufficient size and complexity, the single key issue becomes almost moot.

One site I visited recently stated that it would take one million computers performing one million operations per second approximately 11 trillion years to crack a 128 bit encryption key! So, by using an encryption key of about 64 random characters, a hacker would need multiple life times to crack open your files.

There are several programs available online for both file and drive encryption. All these programs differ in functionality, price, encryption algorithms and interfaces. The best way to proceed is to do a search from your favorite search engine on encryption tools and read about the options available.

Don't wait! The day will come when your system gets compromised by some hacker or thief or FBI agent and then you'll wish you had protected your data.

Privacy is your right! Exercise it!

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

New York Times

Billionaire Backer of Maria Butina Had Russian Security Ties
New York Times
An oligarch who helped finance a Russian gun rights activist accused of infiltrating American conservative circles has been a discreet source of funds for business ventures useful to the Russian military and security services, according to documents ...
US Jail Transfers Russian National Butina to Minimum Security RegimeSputnik International

all 19 news articles »


Homeland Security Orders FEMA Boss To Pay For Personal Use Of Government Vehicles
Homeland Security Secretary Kirstjen Nielsen has ordered Federal Emergency Management Agency Administrator Brock Long to reimburse the government for improper personal use of official vehicles, which was uncovered in an investigation. But he won't ...
US homeland security secretary says disaster management chief won't lose job over investigation into vehicle usageThe Japan Times

all 671 news articles »

Council on Foreign Relations (blog)

CFR Digital Interactive Explores Women's Contributions to Peace and Security
Council on Foreign Relations (blog)
While recurrent armed conflicts, expanded extremist networks, and record levels of displacement remain defining features of global security, standard peacemaking methods continue to overlook a proven strategy to reduce conflict and advance stability ...

and more »


Security camera catches repairman sniffing, stealing child's underwear
A California man is warning other parents after the security camera in his young daughters' bedroom caught a repairman rifling through the children's clothes hamper, sniffing what appeared to be a pair of underwear and stashing another pair in his pocket.
Home security video shows repairman examining child's underwearKABC-TV
Nanny Cam Catches Repairman In Disturbing Act Involving UnderwearCBS Los Angeles
Playa Vista Father Shares Video of Repairman Sniffing His Young Daughters' UnderwearKTLA

all 68 news articles »


Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny
"Election officials have been doing a ton around election security, but if that same thing isn't going on at the vendor level, then that creates a really big potential vulnerability for the entire system," said Edgardo Cortéz, an election security ...
Tensions Flare as Hackers Root Out Flaws in Voting MachinesWall Street Journal
Indictment - Department of JusticeDepartment of Justice
Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 ElectionThe Intercept
Center for Internet Security -YouTube
all 115 news articles »

Woman accused of hitting security guard with fanny pack filled with pigeon
The security guard noticed 56-year-old Laurie Weaver, of New York, yelling at employees inside the Social Security Administration Office in Fairfax County, according to WDCW. When the security guard approached, Weaver hit him in the head with her fanny ...
Woman pulls knife on security guard, then hits him with bag that had pigeon insideThe Independent
Woman hits security guard with fanny pack containing pigeon, police sayAtlanta Journal Constitution
Woman pulls knife on security guard, hits him with fanny pack that had pigeon insideWashington Post
Boing Boing (blog)
all 76 news articles »


Clouldflare and Google Will Help Sync the Internet's Clocks—and Make You Safer
The internet's decentralized nature means that the clocks behind every web browser and web application can actually have major discrepancies, which in turn can undermine security protections. In a step toward addressing these inconsistencies, the ...

and more »

Dark Reading

6 Security Training Hacks to Increase Cyber IQ Org-Wide
Dark Reading
Some of security's toughest nuts to crack are the vulnerabilities introduced by the human element. Users are duped by phishers every day. IT operations staff configure infrastructure insecurely over and over again. Developers repeatedly write code in ...

Data Manipulation: How Security Pros Can Respond to an Emerging Threat
Dark Reading
The flaw, if not proactively found, would have allowed hackers to run malicious code on its systems and manipulate data. It's the latest example of an emerging threat that has industry leaders scrambling and requires new thinking from security ...


Trump administration a threat to international peace and security: Iran's Zarif
“It is true that there is a real threat to our region and to international peace and security: That threat is the Trump Administration's sense of entitlement to destabilize the world along with rogue accomplices in our region,” Zarif said. “The US must ...

and more »
Google News

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero Superhero watches your computer for changes,... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More