If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Rate Thread | Display Modes |
#1
|
|||
|
|||
password-protecting a file or folder
I've Googled password-protecting files and folders; and according to
what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? -- Thank you, Jo-Anne |
Ads |
#2
|
|||
|
|||
password-protecting a file or folder
On 18/07/2018 21:43, Jo-Anne wrote:
I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? 7-zip -- With over 950 million devices now running Windows 10, customer satisfaction is higher than any previous version of windows. |
#3
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 1:43 PM, Jo-Anne wrote:
I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? I use PGP 10.1.2. There are later versions. However, I think this is the last version for which the source was made available to the public for inspection to make sure there were no backdoors. |
#4
|
|||
|
|||
password-protecting a file or folder
In message , David E. Ross
writes: On 7/18/2018 1:43 PM, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? I use PGP 10.1.2. There are later versions. However, I think this is the last version for which the source was made available to the public for inspection to make sure there were no backdoors. What, in your mind (Jo-Anne I mean), is the difference between password-protection and encryption? If you mean by password-protection that the raw files reside on the disc but access to them is controlled somehow, then I'd ask what you are thinking about using such a facility (if it exists) for; if the raw files are on the disc, then someone might be able to bypass the access controls, unless they're part of the drive itself rather than the operating system (e. g. by reading the drive in another computer). -- J. P. Gilliver. UMRA: 1960/1985 MB++G()AL-IS-Ch++(p)Ar@T+H+Sh0!:`)DNAf "I hate the guys that criticize the enterprise of other guys whose enterprise has made them rise above the guys who criticize!" (W9BRD, former editor of "How's DX?" column in "QST") |
#5
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 4:27 PM, David E. Ross wrote:
On 7/18/2018 1:43 PM, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? I use PGP 10.1.2. There are later versions. However, I think this is the last version for which the source was made available to the public for inspection to make sure there were no backdoors. Thank you, David. I'll take a look at it. -- Jo-Anne |
#6
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 5:31 PM, J. P. Gilliver (John) wrote:
In message , David E. Ross writes: On 7/18/2018 1:43 PM, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? I use PGP 10.1.2. There are later versions. However, I think this is the last version for which the source was made available to the public for inspection to make sure there were no backdoors. What, in your mind (Jo-Anne I mean), is the difference between password-protection and encryption? If you mean by password-protection that the raw files reside on the disc but access to them is controlled somehow, then I'd ask what you are thinking about using such a facility (if it exists) for; if the raw files are on the disc, then someone might be able to bypass the access controls, unless they're part of the drive itself rather than the operating system (e. g. by reading the drive in another computer). I guess what I'm thinking is that I'd like to make it somewhat difficult for someone who steals my computer or gains access to it through malware to read the data in certain folders and/or files. From what I've been told, nothing is guaranteed to protect data--but thought that maybe just adding a layer would help. I suppose a better approach might be to remove the folders/files from the computer and keep them only on a safely stored flash drive, but then my access would be difficult too. -- Jo-Anne |
#7
|
|||
|
|||
password-protecting a file or folder
In message , Jo-Anne
writes: On 7/18/2018 5:31 PM, J. P. Gilliver (John) wrote: In message , David E. Ross writes: On 7/18/2018 1:43 PM, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? I use PGP 10.1.2. There are later versions. However, I think this is the last version for which the source was made available to the public for inspection to make sure there were no backdoors. What, in your mind (Jo-Anne I mean), is the difference between password-protection and encryption? If you mean by password-protection that the raw files reside on the disc but access to them is controlled somehow, then I'd ask what you are thinking about using such a facility (if it exists) for; if the raw files are on the disc, then someone might be able to bypass the access controls, unless they're part of the drive itself rather than the operating system (e. g. by reading the drive in another computer). I guess what I'm thinking is that I'd like to make it somewhat difficult for someone who steals my computer or gains access to it through malware to read the data in certain folders and/or files. From what I've been told, nothing is guaranteed to protect data--but thought that maybe just adding a layer would help. I suppose a better approach might be to remove the folders/files from the computer and keep them only on a safely stored flash drive, but then my access would be difficult too. In which case I think you want encryption, not just access control. For practical purposes, I don't think there'd be much difference from the user's (your) point of view, at least for small to medium files; if you want to encrypt large files like video it might take longer, but I can't imagine you wanting to. You'd also need to change your way of working slightly to make sure the unencrypted versions of the files (they have to be unencrypted for you to actually use them!) spend as little time on the computer as possible, and are overwritten with something; they're to be found in page files, hibernate files, and various buffers. This isn't my field - this is just what I've picked up over the years. I've never actually implemented anything. Depending how far you want to go, there are things that will conceal even the _existence_ of the files you want to hide. (And these can be nested too!) If going along those routes, (a) you still have to take care of the buffers etc. I mention above, (b) if the potential thief or hacker finds you've got the software to do this hiding (or unhiding so you can actually get at the files!) on your machine, they'll know to go looking. The external flash drive (kept _away_ from your computer!) is probably easier! (Though the buffer matter still needs attention.) -- J. P. Gilliver. UMRA: 1960/1985 MB++G()AL-IS-Ch++(p)Ar@T+H+Sh0!:`)DNAf The motto of the Royal Society is: 'Take nobody's word for it'. Scepticism has value. - Brian Cox, RT 2015/3/14-20 |
#8
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 6:15 PM, J. P. Gilliver (John) wrote:
In message , Jo-Anne writes: On 7/18/2018 5:31 PM, J. P. Gilliver (John) wrote: In message , David E. Ross writes: On 7/18/2018 1:43 PM, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? I use PGP 10.1.2. There are later versions. However, I think this is the last version for which the source was made available to the public for inspection to make sure there were no backdoors. What, in your mind (Jo-Anne I mean), is the difference between password-protection and encryption? If you mean by password-protection that the raw files reside on the disc but access to them is controlled somehow, then I'd ask what you are thinking about using such a facility (if it exists) for; if the raw files are on the disc, then someone might be able to bypass the access controls, unless they're part of the drive itself rather than the operating system (e. g. by reading the drive in another computer). I guess what I'm thinking is that I'd like to make it somewhat difficult for someone who steals my computer or gains access to it through malware to read the data in certain folders and/or files. From what I've been told, nothing is guaranteed to protect data--but thought that maybe just adding a layer would help. I suppose a better approach might be to remove the folders/files from the computer and keep them only on a safely stored flash drive, but then my access would be difficult too. In which case I think you want encryption, not just access control. For practical purposes, I don't think there'd be much difference from the user's (your) point of view, at least for small to medium files; if you want to encrypt large files like video it might take longer, but I can't imagine you wanting to. You'd also need to change your way of working slightly to make sure the unencrypted versions of the files (they have to be unencrypted for you to actually use them!) spend as little time on the computer as possible, and are overwritten with something; they're to be found in page files, hibernate files, and various buffers. This isn't my field - this is just what I've picked up over the years. I've never actually implemented anything. Depending how far you want to go, there are things that will conceal even the _existence_ of the files you want to hide. (And these can be nested too!) If going along those routes, (a) you still have to take care of the buffers etc. I mention above, (b) if the potential thief or hacker finds you've got the software to do this hiding (or unhiding so you can actually get at the files!) on your machine, they'll know to go looking. The external flash drive (kept _away_ from your computer!) is probably easier! (Though the buffer matter still needs attention.) Thank you, John. I'll have to think about this. (It may not be worth trying.) -- Jo-Anne |
#9
|
|||
|
|||
password-protecting a file or folder
Jo-Anne wrote:
I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? W7 (Windows 7) does not state which *edition* you have of that OS. The Professional and Enterprise editions come with EFS (Encrypting File System). If you use it, make damn sure to setup a recovery agent. https://en.wikipedia.org/wiki/Encrypting_File_System (Requires NTFS file system. You didn't say what you use.) https://msdn.microsoft.com/en-us/library/cc875821.aspx EFS is something you need to self-educate yourself before committing to using it. So enjoy reading several articles about it, like: https://www.nextofwindows.com/things...a-in-windows-7 and https://www.google.com/search?q=windows+7+efs As I recall, EFS was tied to your Windows logon - so you'll need one (instead of blank credentials). That means no sharing of EFS-protected folders with other Windows accounts under the same or different instances of Windows. You can't dole out a shared password. With 3rd party tools that utilize a password, anyone with it can get inside. I've been twice burned by EFS. I went to TrueCrypt to secrete files within a mountable container (becomes a drive letter when mounted). You need to use version 7.1a since the latest version was deliberately crippled for read-only mode when the authors scurried away (there is speculation by their behavior that they got a National Security Letter which legally bars them from revealing getting one, refused to add a backdoor for the NSA or FBI, and left the last version crippled as a warrant canary). There are variations of TrueCrypt since it used open source code, like VeraCrypt. Any superficial software that bans access to the file or folders using permissions, ACLs, stacked file drivers, etc will not work when the OS is not loaded along with that software/drivers. Booting using a different OS, like from a CD or USB drive, or toting the drive to another computer running a different instance of Windows will permit access to all those files and folders. Permissions are enforced per Windows instance, not across all of them. Using any other OS, whether it be Windows or Linux, will let you get at the files. While the container is mounted, you can immediate access to everything inside. You need to unmount the container (drive) to re-protect its contents. Logging out or shutting down Windows will also unmount the container. There are some folder protect tools but they run as stacked file drivers. That's why I mention they are easily avoided by using a different OS to read the disk. In another instance of Windows or by using Linux, the drivers and permissions won't be enforced. Only if that 3rd party folder protect tool encrypts the folder would its contents remain safe when using a different booted OS to access the drive. No 3rd party software needed if you have the Pro or Enterprise edition of Windows 7 where you can use EFS. While TrueCrypt can also be used to encrypt an entire volume, like the partition on the hard disk, even for the OS, I wouldn't suggest it. Development on TrueCrypt ended before UEFI became ubiquitous in new PC builds. Use TrueCrypt's whole-disk encryption only in MBR setups. VeraCrypt is supposed to have been updated to support UEFI. However, like Bitlocker, if you forget your login credentials, the entire volume (partition) becomes unusable. You won't even be able to boot the OS because it is within the encrypted volume. Some users are very paranoid and use whole-disk encryption. You don't need to secrete the OS or app code since it isn't your property anyway and anyone can get that code by simply getting the same OS or app. You really only need to protect your own data files (unless you're into programming and working on a new project on your computer and want to make sure espionage can't be used to get at your gem of new code). Back in TrueCrypt's hey day, there were some alternative but not all were free, like TrueCrypt (or provided source code for inspection and instead were closed and proprietary). There have been 2 audits of TrueCrypt's code: no backdoors were found and the defects were piddly. BestCrypt had a free version but closed called Traveller. It was far more basic than TrueCrypt but then not all users want all the features of TrueCrypt. |
#10
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 7:00 PM, VanguardLH wrote:
Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? W7 (Windows 7) does not state which *edition* you have of that OS. The Professional and Enterprise editions come with EFS (Encrypting File System). If you use it, make damn sure to setup a recovery agent. https://en.wikipedia.org/wiki/Encrypting_File_System (Requires NTFS file system. You didn't say what you use.) https://msdn.microsoft.com/en-us/library/cc875821.aspx EFS is something you need to self-educate yourself before committing to using it. So enjoy reading several articles about it, like: https://www.nextofwindows.com/things...a-in-windows-7 and https://www.google.com/search?q=windows+7+efs As I recall, EFS was tied to your Windows logon - so you'll need one (instead of blank credentials). That means no sharing of EFS-protected folders with other Windows accounts under the same or different instances of Windows. You can't dole out a shared password. With 3rd party tools that utilize a password, anyone with it can get inside. I've been twice burned by EFS. I went to TrueCrypt to secrete files within a mountable container (becomes a drive letter when mounted). You need to use version 7.1a since the latest version was deliberately crippled for read-only mode when the authors scurried away (there is speculation by their behavior that they got a National Security Letter which legally bars them from revealing getting one, refused to add a backdoor for the NSA or FBI, and left the last version crippled as a warrant canary). There are variations of TrueCrypt since it used open source code, like VeraCrypt. Any superficial software that bans access to the file or folders using permissions, ACLs, stacked file drivers, etc will not work when the OS is not loaded along with that software/drivers. Booting using a different OS, like from a CD or USB drive, or toting the drive to another computer running a different instance of Windows will permit access to all those files and folders. Permissions are enforced per Windows instance, not across all of them. Using any other OS, whether it be Windows or Linux, will let you get at the files. While the container is mounted, you can immediate access to everything inside. You need to unmount the container (drive) to re-protect its contents. Logging out or shutting down Windows will also unmount the container. There are some folder protect tools but they run as stacked file drivers. That's why I mention they are easily avoided by using a different OS to read the disk. In another instance of Windows or by using Linux, the drivers and permissions won't be enforced. Only if that 3rd party folder protect tool encrypts the folder would its contents remain safe when using a different booted OS to access the drive. No 3rd party software needed if you have the Pro or Enterprise edition of Windows 7 where you can use EFS. While TrueCrypt can also be used to encrypt an entire volume, like the partition on the hard disk, even for the OS, I wouldn't suggest it. Development on TrueCrypt ended before UEFI became ubiquitous in new PC builds. Use TrueCrypt's whole-disk encryption only in MBR setups. VeraCrypt is supposed to have been updated to support UEFI. However, like Bitlocker, if you forget your login credentials, the entire volume (partition) becomes unusable. You won't even be able to boot the OS because it is within the encrypted volume. Some users are very paranoid and use whole-disk encryption. You don't need to secrete the OS or app code since it isn't your property anyway and anyone can get that code by simply getting the same OS or app. You really only need to protect your own data files (unless you're into programming and working on a new project on your computer and want to make sure espionage can't be used to get at your gem of new code). Back in TrueCrypt's hey day, there were some alternative but not all were free, like TrueCrypt (or provided source code for inspection and instead were closed and proprietary). There have been 2 audits of TrueCrypt's code: no backdoors were found and the defects were piddly. BestCrypt had a free version but closed called Traveller. It was far more basic than TrueCrypt but then not all users want all the features of TrueCrypt. It's Windows 7 Professional 64-bit NTFS. All this sounds, however, like more than I want to get involved in. Maybe I should forget the whole thing... -- Jo-Anne |
#11
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 5:23 PM, 😉 Good Guy 😉 wrote:
On 18/07/2018 21:43, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? 7-zip 7_zip is free and easy to use and can be run in a batch. -- Zaidy036 |
#12
|
|||
|
|||
password-protecting a file or folder
Jo-Anne wrote:
On 7/18/2018 7:00 PM, VanguardLH wrote: Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? W7 (Windows 7) does not state which *edition* you have of that OS. The Professional and Enterprise editions come with EFS (Encrypting File System). If you use it, make damn sure to setup a recovery agent. https://en.wikipedia.org/wiki/Encrypting_File_System (Requires NTFS file system. You didn't say what you use.) https://msdn.microsoft.com/en-us/library/cc875821.aspx EFS is something you need to self-educate yourself before committing to using it. So enjoy reading several articles about it, like: https://www.nextofwindows.com/things...a-in-windows-7 and https://www.google.com/search?q=windows+7+efs As I recall, EFS was tied to your Windows logon - so you'll need one (instead of blank credentials). That means no sharing of EFS-protected folders with other Windows accounts under the same or different instances of Windows. You can't dole out a shared password. With 3rd party tools that utilize a password, anyone with it can get inside. I've been twice burned by EFS. I went to TrueCrypt to secrete files within a mountable container (becomes a drive letter when mounted). You need to use version 7.1a since the latest version was deliberately crippled for read-only mode when the authors scurried away (there is speculation by their behavior that they got a National Security Letter which legally bars them from revealing getting one, refused to add a backdoor for the NSA or FBI, and left the last version crippled as a warrant canary). There are variations of TrueCrypt since it used open source code, like VeraCrypt. Any superficial software that bans access to the file or folders using permissions, ACLs, stacked file drivers, etc will not work when the OS is not loaded along with that software/drivers. Booting using a different OS, like from a CD or USB drive, or toting the drive to another computer running a different instance of Windows will permit access to all those files and folders. Permissions are enforced per Windows instance, not across all of them. Using any other OS, whether it be Windows or Linux, will let you get at the files. While the container is mounted, you can immediate access to everything inside. You need to unmount the container (drive) to re-protect its contents. Logging out or shutting down Windows will also unmount the container. There are some folder protect tools but they run as stacked file drivers. That's why I mention they are easily avoided by using a different OS to read the disk. In another instance of Windows or by using Linux, the drivers and permissions won't be enforced. Only if that 3rd party folder protect tool encrypts the folder would its contents remain safe when using a different booted OS to access the drive. No 3rd party software needed if you have the Pro or Enterprise edition of Windows 7 where you can use EFS. While TrueCrypt can also be used to encrypt an entire volume, like the partition on the hard disk, even for the OS, I wouldn't suggest it. Development on TrueCrypt ended before UEFI became ubiquitous in new PC builds. Use TrueCrypt's whole-disk encryption only in MBR setups. VeraCrypt is supposed to have been updated to support UEFI. However, like Bitlocker, if you forget your login credentials, the entire volume (partition) becomes unusable. You won't even be able to boot the OS because it is within the encrypted volume. Some users are very paranoid and use whole-disk encryption. You don't need to secrete the OS or app code since it isn't your property anyway and anyone can get that code by simply getting the same OS or app. You really only need to protect your own data files (unless you're into programming and working on a new project on your computer and want to make sure espionage can't be used to get at your gem of new code). Back in TrueCrypt's hey day, there were some alternative but not all were free, like TrueCrypt (or provided source code for inspection and instead were closed and proprietary). There have been 2 audits of TrueCrypt's code: no backdoors were found and the defects were piddly. BestCrypt had a free version but closed called Traveller. It was far more basic than TrueCrypt but then not all users want all the features of TrueCrypt. It's Windows 7 Professional 64-bit NTFS. All this sounds, however, like more than I want to get involved in. Maybe I should forget the whole thing... Learning a word processor takes effort, too, as does just about any software you install. |
#13
|
|||
|
|||
password-protecting a file or folder
On 7/18/2018 8:39 PM, Zaidy036 wrote:
On 7/18/2018 5:23 PM, 😉 Good Guy 😉 wrote: On 18/07/2018 21:43, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? 7-zip 7_zip is free and easy to use and can be run in a batch. Thank you. I assume you mean that I can password-protect the zipped files? -- Jo-Anne |
#14
|
|||
|
|||
password-protecting a file or folder
In message , Jo-Anne
writes: On 7/18/2018 8:39 PM, Zaidy036 wrote: On 7/18/2018 5:23 PM, 0 On 18/07/2018 21:43, Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? 7-zip 7_zip is free and easy to use and can be run in a batch. Thank you. I assume you mean that I can password-protect the zipped files? Yes, and that might be a good compromise. I think even the built-in .zip handler can handle passwords, though I'm not sure about that. How robust the protection available is is arguable, but as you've conceded nothing is bulletproof; if all you want is that when thief/hacker tries to access a file s/he is prompted for a password, this would be a good first step (perhaps along with not using obvious filenames). Note that (I think) you can see the _names_ of the files inside a password-protected .zip file just by looking at it - you only need the password to actually extract them. Play with it a bit to see if it'd suit you (and read up on whether the ease of cracking it would suit your needs). -- J. P. Gilliver. UMRA: 1960/1985 MB++G()AL-IS-Ch++(p)Ar@T+H+Sh0!:`)DNAf Try to tell me to watch something because it's brilliant and everyone says so and therefore I will love it, too, and you lose me for ever. - Alison Graham, RT 2016/2/6-12 |
#15
|
|||
|
|||
password-protecting a file or folder
On Wed, 18 Jul 2018 20:58:29 -0500, VanguardLH wrote:
Jo-Anne wrote: On 7/18/2018 7:00 PM, VanguardLH wrote: Jo-Anne wrote: I've Googled password-protecting files and folders; and according to what I've read, one needs third-party software to do this in W7; or one can encrypt the files/folders instead. Any suggestions for third-party software? W7 (Windows 7) does not state which *edition* you have of that OS. The Professional and Enterprise editions come with EFS (Encrypting File System). If you use it, make damn sure to setup a recovery agent. https://en.wikipedia.org/wiki/Encrypting_File_System (Requires NTFS file system. You didn't say what you use.) https://msdn.microsoft.com/en-us/library/cc875821.aspx EFS is something you need to self-educate yourself before committing to using it. So enjoy reading several articles about it, like: https://www.nextofwindows.com/things...a-in-windows-7 and https://www.google.com/search?q=windows+7+efs As I recall, EFS was tied to your Windows logon - so you'll need one (instead of blank credentials). That means no sharing of EFS-protected folders with other Windows accounts under the same or different instances of Windows. You can't dole out a shared password. With 3rd party tools that utilize a password, anyone with it can get inside. I've been twice burned by EFS. I went to TrueCrypt to secrete files within a mountable container (becomes a drive letter when mounted). You need to use version 7.1a since the latest version was deliberately crippled for read-only mode when the authors scurried away (there is speculation by their behavior that they got a National Security Letter which legally bars them from revealing getting one, refused to add a backdoor for the NSA or FBI, and left the last version crippled as a warrant canary). There are variations of TrueCrypt since it used open source code, like VeraCrypt. Any superficial software that bans access to the file or folders using permissions, ACLs, stacked file drivers, etc will not work when the OS is not loaded along with that software/drivers. Booting using a different OS, like from a CD or USB drive, or toting the drive to another computer running a different instance of Windows will permit access to all those files and folders. Permissions are enforced per Windows instance, not across all of them. Using any other OS, whether it be Windows or Linux, will let you get at the files. While the container is mounted, you can immediate access to everything inside. You need to unmount the container (drive) to re-protect its contents. Logging out or shutting down Windows will also unmount the container. There are some folder protect tools but they run as stacked file drivers. That's why I mention they are easily avoided by using a different OS to read the disk. In another instance of Windows or by using Linux, the drivers and permissions won't be enforced. Only if that 3rd party folder protect tool encrypts the folder would its contents remain safe when using a different booted OS to access the drive. No 3rd party software needed if you have the Pro or Enterprise edition of Windows 7 where you can use EFS. While TrueCrypt can also be used to encrypt an entire volume, like the partition on the hard disk, even for the OS, I wouldn't suggest it. Development on TrueCrypt ended before UEFI became ubiquitous in new PC builds. Use TrueCrypt's whole-disk encryption only in MBR setups. VeraCrypt is supposed to have been updated to support UEFI. However, like Bitlocker, if you forget your login credentials, the entire volume (partition) becomes unusable. You won't even be able to boot the OS because it is within the encrypted volume. Some users are very paranoid and use whole-disk encryption. You don't need to secrete the OS or app code since it isn't your property anyway and anyone can get that code by simply getting the same OS or app. You really only need to protect your own data files (unless you're into programming and working on a new project on your computer and want to make sure espionage can't be used to get at your gem of new code). Back in TrueCrypt's hey day, there were some alternative but not all were free, like TrueCrypt (or provided source code for inspection and instead were closed and proprietary). There have been 2 audits of TrueCrypt's code: no backdoors were found and the defects were piddly. BestCrypt had a free version but closed called Traveller. It was far more basic than TrueCrypt but then not all users want all the features of TrueCrypt. It's Windows 7 Professional 64-bit NTFS. All this sounds, however, like more than I want to get involved in. Maybe I should forget the whole thing... Learning a word processor takes effort, too, as does just about any software you install. I've used BestCript for many years. They advertise 'no back doors', but who knows if this is true. It's pricey at $100 now. I was shocked when I put Win7 on that my copy no longer works. You have to 'renew' it every so often or it ages out. I wasn't aware. Since I've used image backup for years I've managed to keep a working copy. It's a fairly easy learning curve. It creates 'containers' that are encrypted throughout and open as drives. A password lets you in. |
Thread Tools | |
Display Modes | Rate This Thread |
|
|