Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Trying to figure out how to use encryption software

SherryStewarSherryStewar Member Posts: 3

Do laptop encryption programs like ZoneAlarm Datalock, really protect the data and files on your laptop from a thief being able to access the data and use it for id thief or put it on the web for all to download?



 



I am traveling more, and if my laptop gets stolen, I don’t want my data to be readable. I think ZoneAlarms Datalock laptop data encryption software, looks like it does that.



 



http://www.zonealarm.com/security/en-us/zonealarm-data-lock.htm



 



It does a pre-boot authentication with a password, to prevent access to boot anything. This seems to be a general deterrent for non-technical users, correct?



 



Still, Datalock encrypts all the data going on the hard drive, so it they can read the drive, they can’t decode the encryption, correct?



 



What kind of encryption does Datalock use? Is it strong or maybe unbreakable is a better word?



 If anyone out there can help, I will exchange favors...  Just sayin.

 

sher

Comments

  • DameonkDameonk Member UncommonPosts: 1,914

    Originally posted by SherryStewar

    Do laptop encryption programs like ZoneAlarm Datalock, really protect the data and files on your laptop from a thief being able to access the data and use it for id thief or put it on the web for all to download?



      Yes they really work.  DataLock is one of the better full hard drive encryption options out there.



    I am traveling more, and if my laptop gets stolen, I don’t want my data to be readable. I think ZoneAlarms Datalock laptop data encryption software, looks like it does that.


     

    Yep, that's what it's for.

     

    It does a pre-boot authentication with a password, to prevent access to boot anything. This seems to be a general deterrent for non-technical users, correct?

    It's a deterrent for anyone actually.  As long as your password isn't a simple word and contains both numbers and letters (upper + lower case) no one is getting in there unless they have access to government level software.



    Still, Datalock encrypts all the data going on the hard drive, so it they can read the drive, they can’t decode the encryption, correct?

    Correct.  That's the whole point of the software.  For an unencrypted drive you can simply boot from a CD or put the drive into another computer to read the data.  For a drive that's using something like DataLock this is impossible to do without decrypting the drive first.   Which is impossible to do.  Or at least with current computer technology would take hundreds of years.

    The more likely scenario is that they would brute force your password.  That is, try every possible combination of the keyboard characters until they figure out your password.  That's why it's important to use a very strong password, because the encryption software isn't going to protect anything if you make your password "password".



    What kind of encryption does Datalock use? Is it strong or maybe unbreakable is a better word?

    DataLock uses 256-bit AES encryption.  Virtually unbreakable.



     If anyone out there can help, I will exchange favors...  Just sayin.

    With DataLock installed on your laptop and a strong password you wouldn't really have to worry about someone accessing your data.  Truth be told, even if your laptop was stolen without being encrypted you probably don't have much to worry about.  The thief was most likely just looking to score a new laptop, not steal your identity. 

    Identity thieves have a lot easier means to get people's info than stealing their laptops.

    "There is as yet insufficient data for a meaningful answer."

  • tuzalovtuzalov Member Posts: 183


    Files to Delete

    Not everybody travels with forensically clean laptops provided by their firms. If this describes you, consider the following list of file types to remove from computers you take across borders.

    Documents

    Look for all the usual suspects like .doc, .xls, .ppt, .pdf and so forth.

    Mac owners: since the Mac does not need to save files with file name extensions, you might miss file types by searching for extensions. Make sure the Mac shows all file name extensions before you search.

    E-mail and PIM information

    Carefully review your email for messages you can delete.

    Personal information managers store calendars, tasks, contact lists, notes and other information – check this as well.

    Temporary files and folders

    Various programs keep copies of documents and other information in temporary folders, and do not always delete them once you quit the program.

    Temp files can reside in several places: a global search on the word “temp” will help find them, as will consultation of the software’s documentation.

    Photos

    Look for files with extensions like .jpg, .png, .gif and so forth, as well as information inside image handling software you use (e.g. Adobe Photoshop, Apple iPhoto).

    Certain digital cameras produce RAW photos, some in proprietary formats with esoteric file name extensions. Check your camera manual for specifics.

    Virtual memory

    To supplement the RAM, the operating system may use a part of your hard drive as “virtual RAM.”

    Windows allows you to turn virtual memory off. If you can’t live with the performance hit, make sure your entire hard drive is encrypted.

    Browser data

    Whenever you surf the Web, your browser records your wake in its history of pages visited, a cache containing downloaded pages, the cookies any sites might write to your hard drive, the names of any files you downloaded and so forth.

    The default settings in most browsers allow a certain amount of this information to build up on your hard drive. Change those options so that the browser promptly deletes all such information once you shut down the browser, or soon after. Recommendation: Mozilla Firefox can automatically delete all surfing traces each time you shut down the browser.

     

    I use PGP myself http://www.symantec.com/business/theme.jsp?themeid=pgp



    Key Features


    • Protect any device or any media–Software-based encryption for any removable storage device or optical media. Patent-pending extension to validated and trusted AES 256-bit PGP Virtual Disk technology.

    • Share, distribute, collaborate–Access encrypted data on both Microsoft Windows and Apple Mac OS X without installing additional software. Provides in-place viewing and editing without altering the native user experience.

    • Integrates easily with enterprise workflow–Provides support for automation and provisioning. Passphrase management and corporate access to data enable security and compliance without disrupting user productivity.

     




    Key Benefits


    • Helps organizations reduce the risk from data loss on the multitudes of storage devices in use in the enterprise.

    • Provides safety and convenience to users. Work on files straight from the drive, no copying to the host computer necessary.

    • Works in conjunction with an endpoint protection and device control strategy to ensure usage of only approved, protected devices.





  • RidelynnRidelynn Member EpicPosts: 7,383

    If your running Windows 7, it has built-in encryption if you choose to use it. This covers the entire hard drive. I've never tried using it though, but if your just playing with options, this one is free to try.

    http://technet.microsoft.com/en-us/library/dd835565(WS.10).aspx

    PGP is pretty good (har har). I've not seen the whole drive encryption suite, but I've known a lot of people who use the per-file and email encryption and trust it, and it's available for most all platforms, which is a bonus.

Sign In or Register to comment.