tailieunhanh - Laptops All-in-One Desk Reference For Dummies- P69

Laptops All-in-One Desk Reference For Dummies- P69: Okay, I’ll admit it: I’ve got a strange biography. I’ve been a writer all my life. My first semi-pro job was sports editor of my high school newspaper. (Go Commodores!) After college I was a political reporter for daily newspapers in Ohio and New York (I covered four national nominating conventions and two Presidential campaigns) and a correspondent for The Associated Press. And then, in 1983, I gave in to my inner geek and became the first Executive Editor of PC Magazine, back in the days when most people asked, “What is a PC?”. | 654 Encrypting the Disk discs and external drives. See Figure 1-3. The LE version creates multiple 25MB encrypted containers on your hard disk that you can load and unload as needed. You can view modify and hide all types of files with a single password. The product works with all current versions of Windows including 95 and 98 as well as XP and Vista . Consult www. cryptainerle for more information about the free version. Hardware-based disk encryption Most laptops include in their setup BIOS a means to set a password before you can access an installed hard drive however a number of hacker tools allow someone to determine this password and once someone has bypassed it she can read everything on the drive. Full disk encryption Seagate s Full Disk Encryption FDE system introduced to consumers with its Momentus line of hard disks and similar concepts are different in that the encryption key the code that decrypts the data isn t stored on the drive or in the BIOS. No amount of physical attack on the machine by a hacker is going to locate a decryption key because it isn t on the laptop. Figure 1-3 The Cryptainer control window allows creation of hidden volumes with complex passwords. Encrypting the Disk 655 Under FDE you ve no need to initialize a new disk or to encrypt the full contents of a large drive when the software is added to an existing disk. All data is encrypted as it records and according to Seagate the process occurs at full interface speed. In other words no overhead is involved. Under software encryption schemes if the key to the encryption software is compromised you must change it. This usually involves completely decrypting and re-encrypting the entire drive. Since the key to an FDE drive is locked into the hardware it can t be corrupted. Book IX Chapter 1 Traveling with a Laptop RemoVable flash memory key Another option is to use a removable flash memory key that holds the decoding key for an encrypted disk. One such product is the PCKey

TỪ KHÓA LIÊN QUAN