mardi 15 janvier 2013

Save confidentiality of sensitive data


Since it's an intruder able to interact with the computer either remotely or through physical contact, it can simply watch your photos, or read your messages are stored on the computer etc. ..And from here the masking process one of the most important points may be evidence that Internet users should think about it online, unfortunately according to my humble in the field of information security, few Internet users pay attention to this point, which is very important.
Therefore, the only effective way to defend is to encrypt the data or concealment
And I mean encryption (encryption) is to make sensitive evidence read become illegible to anyone except those with special knowledge by your own key on your own here is a leading software package such as
truecrypt
But unfortunately again, often encryption programs and the absence of wide by zaria used on how to work it out but find himself has caused him problems, either the loss of evidence completely or partially, this had better log sensitive data on CDs is stored in a hidden place that targeted the hands through physical contact as well as the absence of anything is his relationship to you or your family computer in case God forbid and been compromised.

0 commentaires:

Enregistrer un commentaire