Welcome to YLOAN.COM
yloan.com » Home-Securtiy » Basics of Information Security
Family Home Improvement Kids & Children Parenting baby Babies-Toddler Crafts-Hobbies Elder-Care Holidays Home-Securtiy Interior-Decorating Landscaping-Gardening bedroom lake apartments hardwood shower generation generator contractors patio roofing locksmith bleach housing jaw appliance domestic

Basics of Information Security

Basics of Information Security

Basics of Information Security

Accessing information stored in a computer ordinarily will implicate the owner's reasonable expectation of privacy in the information. See United States v. Barth, 26 F. Supp. 2d 929, 936-37 (W.D. Tex. 1998) (finding reasonable expectation of privacy in files stored on hard drive of personal computer) The below are a few examples to insure your private information remains private.

1. Encrypt the file/folder; Have a passphrase, do NOT use a word due to software that can do dictionary attacks in multiple languages, but you must utilize a passphrase with numbers and characters. DO NOT write it down. If you are a corporation, remember, industrial espionage is rampant. Ex-KGB, and other out of work intelligence officers make a living applying their trade to the highest bidder these days. I prefer PGP, or Blowfish encryption.

2. Use a wiping utility, CyberScrub, Evidence-Eliminator, etc. that wipes the cache area of your computer; this is where passwords are sometimes stored, and the software also has features that allow you to destroy web browsing history, photographs, etc.

3. Trust your computer to no one. Software and hardware devices are cost as little as $30 and will record each character you type and e-mail it to the person who wants to know your passphrase, bank account info, etc. Of course, do NOT open e-mail you do not know who it is from since their is spyware you can be e-mailed, and it will install once opened.

4. If you want to put the icing on the computer security cake, use a proxy that does not keep logs of their users activity, and has a rotating IP which makes hacking your computer next to impossible.
Bluetooth Security - Useful Info Kinds Of Security Methods Types Of Security Techniques How to Delete Security Tool - Removal Guide How To Un-install Security Tool Easily Maintaining the Security of the Smart Grid Systems Removal of Security Tool - Easy Removal Remove Total XP Security - How to Remove Total XP Security Completely Remove AV Security Suite - How to Remove AV Security Suite Completely Remove Security Master AV - How to Remove Security Master AV Completely The Social Security Revolt of 2011 Ways To Earn A Residual Income And Build Financial Security My Security Shield Removal Guide - Uninstall/Remove My Security Shield virus From PC!
print
www.yloan.com guest:  register | login | search IP(216.73.216.125) California / Anaheim Processed in 0.037448 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 11 , 1767, 221,
Basics of Information Security Anaheim