It looks like you're new here. If you want to get involved, click one of these buttons!
Do laptop encryption programs like ZoneAlarm Datalock, really protect the data and files on your laptop from a thief being able to access the data and use it for id thief or put it on the web for all to download?
I am traveling more, and if my laptop gets stolen, I don’t want my data to be readable. I think ZoneAlarms Datalock laptop data encryption software, looks like it does that.
http://www.zonealarm.com/security/en-us/zonealarm-data-lock.htm
It does a pre-boot authentication with a password, to prevent access to boot anything. This seems to be a general deterrent for non-technical users, correct?
Still, Datalock encrypts all the data going on the hard drive, so it they can read the drive, they can’t decode the encryption, correct?
What kind of encryption does Datalock use? Is it strong or maybe unbreakable is a better word?
If anyone out there can help, I will exchange favors... Just sayin.
sher
Comments
"There is as yet insufficient data for a meaningful answer."
Files to Delete
Not everybody travels with forensically clean laptops provided by their firms. If this describes you, consider the following list of file types to remove from computers you take across borders.
Documents
Look for all the usual suspects like .doc, .xls, .ppt, .pdf and so forth.
Mac owners: since the Mac does not need to save files with file name extensions, you might miss file types by searching for extensions. Make sure the Mac shows all file name extensions before you search.
E-mail and PIM information
Carefully review your email for messages you can delete.
Personal information managers store calendars, tasks, contact lists, notes and other information – check this as well.
Temporary files and folders
Various programs keep copies of documents and other information in temporary folders, and do not always delete them once you quit the program.
Temp files can reside in several places: a global search on the word “temp” will help find them, as will consultation of the software’s documentation.
Photos
Look for files with extensions like .jpg, .png, .gif and so forth, as well as information inside image handling software you use (e.g. Adobe Photoshop, Apple iPhoto).
Certain digital cameras produce RAW photos, some in proprietary formats with esoteric file name extensions. Check your camera manual for specifics.
Virtual memory
To supplement the RAM, the operating system may use a part of your hard drive as “virtual RAM.”
Windows allows you to turn virtual memory off. If you can’t live with the performance hit, make sure your entire hard drive is encrypted.
Browser data
Whenever you surf the Web, your browser records your wake in its history of pages visited, a cache containing downloaded pages, the cookies any sites might write to your hard drive, the names of any files you downloaded and so forth.
The default settings in most browsers allow a certain amount of this information to build up on your hard drive. Change those options so that the browser promptly deletes all such information once you shut down the browser, or soon after. Recommendation: Mozilla Firefox can automatically delete all surfing traces each time you shut down the browser.
I use PGP myself http://www.symantec.com/business/theme.jsp?themeid=pgp
Key Features
Protect any device or any media–Software-based encryption for any removable storage device or optical media. Patent-pending extension to validated and trusted AES 256-bit PGP Virtual Disk technology.
Share, distribute, collaborate–Access encrypted data on both Microsoft Windows and Apple Mac OS X without installing additional software. Provides in-place viewing and editing without altering the native user experience.
Integrates easily with enterprise workflow–Provides support for automation and provisioning. Passphrase management and corporate access to data enable security and compliance without disrupting user productivity.
Key Benefits
Helps organizations reduce the risk from data loss on the multitudes of storage devices in use in the enterprise.
Provides safety and convenience to users. Work on files straight from the drive, no copying to the host computer necessary.
Works in conjunction with an endpoint protection and device control strategy to ensure usage of only approved, protected devices.
If your running Windows 7, it has built-in encryption if you choose to use it. This covers the entire hard drive. I've never tried using it though, but if your just playing with options, this one is free to try.
http://technet.microsoft.com/en-us/library/dd835565(WS.10).aspx
PGP is pretty good (har har). I've not seen the whole drive encryption suite, but I've known a lot of people who use the per-file and email encryption and trust it, and it's available for most all platforms, which is a bonus.