Hyper Crypt | Portable Encryption Software

January 5, 2017

Looking for a method to protect sensitive files and folders?  If so, Hyper Crypt may be of interest to you (see source link below). Hyper Crypt consists of a standalone (portable) executable file, a pdf manual and an updater that can be run on any Windows computer (Vista and higher)…

hyper-crypt

One thing I noticed that when you encrypt a folder, the files in the folder will appear as they normally would and no copy of the original is left behind. If you attempt to open any of the files, they will not open, due to the encyption. Don’t know if that is good or not, but works for me…

By default if you encrypt a single file, a copy of the original file is left behind; however, there is an option to change that.

Hyper Crypt uses the military-grade AES-256 algorithm for file and folder encryption, along with automatic integrity validation.

With Hyper Crypt, you can easily encrypt any kind of file, from documents, to pictures and videos.

Source: Hyper Crypt | Portable Encryption Software


A Solution To Auto-Encrypt Files That You Store In The Cloud

June 7, 2016

At times I think we are getting to comfortable with storing our personal files in the cloud; whether be Dropbox, GDrive, OneDrive, etc… Once those files leave your PC they are out there and in essence will always be out there (even if you delete them).  A level of protection to look at that I found at I Love Free Software is Cryptomator.

I Love Free Software provides a very nice (and brief) tutorial on how to set up Cryptomator to ultimately encrypt the files you are syncing with Dropbox; however, as pointed out, this process will work with many of the online cloud drive providers.

HOW TO AUTO ENCRYPT FILES
BEFORE UPLOADING THEM TO DROPBOX

 


Shut Down Windows 8 With Shutdown8

June 11, 2014

[FEATURED GEEK SQUEAK] Shut Down Windows 8 With Shutdown8 – After the release of Windows 8.1 Update, Microsoft did make things better for people to navigate around; however, shutting down the PC is still a hidden component (when you are on the desktop side of Windows 8).

To remedy this issue on my Windows 8 computer, I installed a little program called Shutdown8.

Shutdown8

Shutdown8 is available as an install file or a portable app. I went for the portable app version. Once you get it installed, pin the Shutdown8 executable file to your taskbar making it very handy to shutdown your PC.

Not only does Shutdown8 provide convenience in shutting down your PC, it also has the following features:

  • Shuts down/powers off computers at a specified time
  • Users can set the timer with the [+][-] keys or the mouse wheel button
  • Hibernate Mode: Saves the contents from the RAM to a hard disk and shuts down
  • Sleep Mode: Saves the state of the computer to RAM and enters a low-power mode
  • Works well with Windows XP, Vista, 7 and 8

[ COMMENTS ARE WELCOME – CLICK HERE ]

Learn a byte at a time, at What’s On My PC, with Geek Squeaks’ — featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it… I just plain love tech!


MORE GEEK SQUEAKS

[REMOTE DESKTOP] A New Perspective on Remote Desktop – AnyDesk is the fastest remote desktop software on the market. It allows for new usage scenarios and applications that have not been possible with current remote desktop software… @AnyDesk

[GOOGLE CHROME EXTENSION] OneNote Clipper – the easiest way to save anything on the web to OneNote in just one click – One-click to save any webpage with the extension toolbar OneNote button… @Chrome Web Store

[ANDROID] SwiftKey goes free on Android – One of the most popular third party keyboards on Android has just shed its price tag. In announcing a major update with new features, SwiftKey has also dropped the bombshell that it will now be available free of charge, but will still hold on to in-app purchases via a new add-on store… @Slash Gear

[SECURITY] Steganos LockNote will change the way you work with confidential notes – Hide your serial numbers, passwords, phone numbers and everyday notes in a safe place. Your informations will be encrypted using a password and most modern AES 256bit encryption technology… @steganos

[WINDOWS APP] Windows 8 Magazine App To Read Millions Of Free Magazines – Issuu is a free magazine app for Windows 8 which lets you read free magazines. This app has millions of free magazines in its collection. You can read any magazine either by searching for it using the built-in search box or by going through each magazine… @I Love Free Software

[CLOUD COMPUTING] Remove backgrounds from images – Free online tool automatically removes the background from images. Make your image backgrounds white or transparent. Even removes white backgrounds from images or photos… @Background Burner

[NOTEBOOK COMPUTER] 2-in-1 Ultraportable Notebook With A 10″ Detachable Tablet – The all-new Transformer Book T100 transforms your mobile lifestyle with a 2-in-1 ultraportable design and an amazing 11 hours battery life that will never tie you down. On one hand, it is a performance notebook with an Intel Atom Bay Trail-T Z3740 Quad Core processor and Microsoft Office 2013 Home & Student preinstalled for great productivity. On the other hand, it is a 10.1″ HD touchscreen display that works as a standalone Windows 8.1 tablet for all your entertainment needs… @Amazon

ASUS Transformer Book T100TA-C1-GR 10.1″ Detachable 2-in-1 Touchscreen Laptop, 64GB

ASUS Transformer Book


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com


Today’s Geek Squeaks – August 2, 2013

August 2, 2013

A summary of Today’s Geek Squeaks:

  • A very cool and easy way to keep your data secure and safe on your USB Flash Drive (or computer);
  • I love weather apps and I truly think I found the mother of all weather apps that is not only beautiful, but very practical;
  • Curiosity the Mars Rover has been on Mars for a year. I encourage you to watch this video, 12 Months In Twelve Minutes; Curiosity’s First Year On Mars; AND,
  • The Google Chromebook has caught my eye and is a good example of what direction computing is heading !

[ CLICK HERE TO LEAVE A COMMENT ]

Plan on seeing  a lot more of Geek Squeaks’, featuring a round-up of tech products, news, software, apps, wallpapers, articles, you name it;  from my favorite tech web sites… I just plain love tech!


A Free Program To Keep Your Data Secure and Safe On Your USB Flash Drive

image

It is very easy to encrypt your files and folders using a free program and to keep your data secure and safe on USB Pen Drive. You can also open this on any computer running Windows 2000/XP/Vista/7 and you don’t even have to install anything on the computer… READ MORE


Beautiful Weather Graphs and Maps

@ WeatherSpark

image

  • A rich, interactive map with the current conditions from thousands of locations worldwide.
  • Incredibly smooth radar playback for the last two hours – or any period in the last five years. US only, extended playback is subscription only
  • Pan and zoom through a graphical forecast, seamlessly transitioning to averages and historical data.
  • Compare the weather across locations for any time period.
  • Multiple forecasts shown in seventeen graphs – get precisely the data you want.

GET IT HERE


Twelve Months in Two Minutes;
Curiosity’s First Year on Mars


Curiosity

Here is a rover’s eye view of driving, scooping and drilling during Curiosity’s first year on Mars, August 2012 through July 2013.


Chromebook – The NEW Computer From Google

image

The Chromebook is a new computer from Google that’s simple, lightweight and easy to use. Starts in seconds, backs-up your stuff in the cloud and keeps it safe with built-in virus protection. It’s the ideal device for getting stuff done everywhere you go… READ MORE


Be Sure To Visit Bookmarks4Techs.com

Bookmarks4Techs.com


Hide Your Serial Numbers, Passwords, Phone Numbers and Everyday Notes In A Safe Place

May 7, 2013

A program that I use on a regular basis to protect and hide my personal text based notes is called Steganos LockNote.  In a sense it is like notepad with an encryption option.

Steganos LockNote

Store your most valuable notes as a LockNote
Hide your serial numbers, passwords, phone numbers and everyday notes in a safe place. Your informations will be encrypted using a password and most modern AES 256bit encryption technology.

Secure, yet simple
Just double-click a LockNote and enter your password to access your text files as usual.

No installation required
Move LockNotes wherever you want, as often as you want. A LockNote document does not require much more hard drive space than an unencrypted document.

Encrypt existing text files in no time at all
Simply drag and drop existing text files on a LockNote window: they will be encrypted automatically.

Open and free
LockNote is open source and is based upon open source technologies, e.g. the certified CryptoPP program library for strong encryption.

GEEK BONUS AREA

Visit Bookmarks4Techs.com

Bookmarks4Techs.com

Move your Blog from Blogger To WordPress without losing traffic

PS4 sharing button: Now developers can disable share button

Tech Thoughts Daily Net News – May 7, 2013


World’s 1st Touch Screen Wireless N Router
+ Range Extender

World's 1st Touch Screen Wireless N Router  + Range Extender

For the first time users can setup & maintain their router easily from its highly intuitive touch screen. You can avoid the cumbersome PC/Mac based setup that is common with other routers. Its dual purpose — You can use it either as a Wireless Router or a Range Extender

Subscribe by RSS

Get What's On My PC by Email

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Hide, Lock and Protect Your Files With This Unique Software

September 5, 2012

Carrying files on a flash drive is an easy method of transporting files to and from the office; BUT, did you ever stop and think; what the consequences would be if you lost the drive. Would you be exposing sensitive files and data to someone that found the drive that ultimately could come back to haunt you? Portable flash drives are small and can very easily lost or misplaced.

There are numerous methods available to encrypt files but most of the those methods can be time consuming, still can expose or give hints to the nature of the file data, and in most instances cannot be fully used on other PC’s due to limited access rights. As always, prior to transporting data to/from your home PC to another site (e.g. work), make sure you have permission to do so (e.g. consult with your network administrator).

I have experimented with many software utilities that will encrypt data on a drive to deter and prevent exposure of the data. If you do not know what encryption is, do not let the term scare you.

encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. [ source: WikiPedia ]

An utility that I recently started to use and have been quite impressed with is called FREE SafeHouse Explorer.  FREE Safehouse Explorer is a FREE (never expires) product that is offered by a company called PCDynamics, Inc. to promote their other commercial products and to promote the importance of data privacy.

SafeHouse

FREE SafeHouse Explorer is initially installed on your PC, BUT there is a menu option in SafeHouse to copy the program to your flash drive or any external media. Once on your flash drive you will be prompted to create a volume storage area.  The volume storage area can be any size up to 2000 Gigabytes… In my case I have an 8 Gig flash drive and I created a 2 Gig volume area to store my sensitive files. Once your volume has been created, the actual program on the flash drive, called “SafeHouse Explorer” is the program that you use to move, copy, and delete files in the protected volume; thus, it makes no difference if you have administrative access rights on the PC or not. Basically, in summary, the  files that you intend on protecting are hidden inside this volume file that gives no hint of what the data may or could be. You can also backup these volume files; and to open them, you only need the “SafeHouse Explorer” program.  SafeHouse Explorer is very similar to Windows Explorer in appearance and operation. There are many features to this program, requires a minimal learning curve, and in the end I feel comfortable with the protection if offers in the event my drive is lost or stolen.

SafeHouse Explorer In Action

Main Features:

SafeHouse Explorer makes your secret files invisible and hides them from snoopers, intruders and anyone else who doesn’t have your permission to view them.

SafeHouse Explorer uses passwords and maximum-strength 256-bit advanced encryption to completely hide and defend your sensitive files, including photos, videos, spreadsheets, databases and just about any other kind of file that you might have.

SafeHouse Explorer can protect files residing on any drive, including memory sticks, external USB drives, network servers, CD/DVDs and even iPods. Supports U3 Smart Drives.

SafeHouse Explorer creates hidden private storage areas on your local hard drive or external media to hold your confidential files. Your files are completely invisible until you enter your password. After you enter your secret password, you access your files using SafeHouse Explorer’s familiar drag-and-drop Explorer-like interface.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE… FEATURING Today’s Best Selling External Hard Drives

Control your PC’s ‘loudness’ with Sound Lock

Choosing The Right Web Browser for Your PC

The GoFlex Satellite Mobile Wireless Storage Device

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


A Small FREE Application For Keeping Securely Encrypted Notes

August 9, 2012

Looking for a way to store encrypted (password protected) notes?  If so, then take a look at fSekrit.

There is nothing fancy about fSekrit other than it is a program that is designed to store sensitive information in a text based note file.  For example, I use this program at work to store various login codes to a door security system which I am tasked with monitoring. Instead of trying to remember all of the codes, I simply entered them into fSekrit, set a password, and I’m good to go. I only have to remember the one password. This program has worked without fail for me and is so small it can be carried on your flash drive. As a matter of fact, it is only 50K+ in program size plus the size of your encrypted text.

The easiest way to learn and use fSekrit is to simply run fSekrit, enter some text and then hit the close button for the fSekrit window.  At this point you will be prompted to save your note to file.

fSekrit

The file name that you give it will be saved as an executable. For example, I saved the note as “Rick”…  When I saved the note I was then prompted to enter a passphrase (or password), then hit “OK” after the passphrase as been entered two times. As indicated, do not forget the password.

fSekrit

The next time I want to pull the note up called “Rick”, I simply click on the “Rick” file, enter my passphrase and voila’ my note is once again available for viewing and editing.

fSekrit is a small application for keeping securely encrypted notes. These notes are truly stand-alone; the editor program and your note are merged together into a tiny self-contained program file, bypassing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives.

fSekrit uses very strong encryption to ensure that your data is never at risk. Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize.

fSekrit runs across the entire windows range: 9x/NT/2K/XP/Vista/Win7, 32-bit as well as 64-bit x86 editions.

——————————————-

GEEK BONUS AREA

Technology News, Software, Apps, Wallpapers, Tech Products and MORE…

How to Disable Office 2013 Start Screen

Beware Malware On Olympics-Related Apps

Pulse.me – News reimagined by Internet Explorer 10

Bookmarks4Techs

Gold Box: New Deals. Every Day.

——————————————-

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


A Safe and Easy Way to Keep Your Data Under Lock and Key.

October 3, 2011

I have to question the safety of my file data when I save that data to an online file service. I know that these online services tell us that they would never do anything to compromise our data and that our data is safe in their hands. If you are like me, when it comes to any sensitive files that I store online, I will take a few moments to encrypt those sensitive files to practically eliminate any possibility of those files from ever being compromised.  This gives me some sense of satisfaction that my files are safe; plus, I am taking advantage of backing up those files off site (away from my main computer).

The encryption utility that I use, that can be installed on your PC or used as a portable application is called EncryptOnClick.

EncryptOnClick

EncryptOnClick is like hiring your own highly experienced data security guard who ensures the files you want to keep safe and out of view from others, stay that way.

I think what sells me on this application is its’ simplicity, that it uses a very secure encryption and decryption method (256-bit AES encryption), that it can encrypt multiple files in a batch, that it has file compression built in to reduce the file size during the encryption, that I can carry it around on my flash drive and that it is FREE!

——————————————-

[CLICK HERE]
Gold Box: New Deals. Every Day.

Best Sellers in Electronics
Best Sellers

Computers & Accessories Index

Over 600 Bookmarked Tech Sites

——————————————-

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Lock Down and Encrypt those Important Notes

August 20, 2010

 Today I present to you a small (portable) software application, called fSekrit, that gives you the ability to safely store confidential (text file) notes on your computer. You ask, “Why would I need such an application?”.

fSekrit

I have found that as I continue to mature toward my demise, I have accumulated, over the course of my lifetime, an abundance of private and confidential information. Most of this information is in the form of numbers, passcodes, etc… For example; driver’s license number, car tag #, car access code, house access code, security alarm code, bank account number, work access codes, etc… I found that I needed something where I could safely store this information and this is where fSekrit came to the rescue. fSekrit is a very small application (less than 50K) that basically becomes an encrypted container that will securely store your notes.

Simply download the application and run  fSekrit and start typing your note. After you have completed entering your confidential information, click on “File”, select “Save As”, give the note a name, enter a passphrase, and you are done. Your note in essence becomes a secure self contained program that will require a password each time you open it. fSekrit uses very strong encryption to ensure that your data is never at risk.

Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize.

Another advantage of using fSekrit is that your un-encrypted data is never stored on your harddisk. With a traditional encryption utility you would have to decrypt your file to disk, view or edit it, and then re-encrypt it.

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Protecting Sensitive Files on your Computer with AxCrypt

March 19, 2010

As we and our computers continue to evolve in this wonderful world of computer technology, it is necessary that our awareness is heightened when it comes to protecting sensitive files on our computer.  When I say “sensitive files”, I am referring to files that can shed a light about your identity, your financial status, your health, your tax forms, etc…  These are files that we hold close to us or should be holding close to us.  I have found that most people that use a computer do not take the necessary precautions to manage and protect these files and often forget about the files altogether (which is a really bad thing).

In today’s world, document processing, handling and management is predominantly in electronic formats, in combination with the hardcopy paper formats. What occurs is that we will take the hardcopy paper formats of sensitive documents and we’ll lock them up, often off site (in case the house burns down). Where we fail is when we let the electronic copies out there on our computers. For example, I recently purchased a home; and with any home purchase you are exposed to and presented with sensitive documents that reference the property transfer (i.e. settlement, contracts, etc…).  Nearly every document I was presented with was sent electronically to me via email (which is not really a good thing in itself).  Eventually I would “print & copy” and end up with a “hard paper copy” for my records; which I ultimately locked up for my eyes to see only.  Where I could have failed is if I did not take the necessary precautions to “lock down” those files on my PC.  Really, what’s the sense of locking up the “paper hard copies” when the electronic copies are laying there on your PC for anyone to see.  This is especially problematic if your PC is victim to an internet malware attack and your sensitive files are now being literally stolen.

Some things to consider:

1.)  If you maintain sensitive files on your PC, keep them in one folder on your PC.  You can call that folder “Lock Box”.  Under the “Lock Box” folder you can have sub-folders that contain the sensitive documents.  For example, you may have a folder called “Tax Forms”.  The reason for the “one folder” concept is that this makes management of the files easy (and in one place).

2.)  Routinely copy your lockbox folder to a flash drive or CD/DVD.  Take that copy and lock it up (preferably off site away from your house). If you use an online file storage option, I strongly encourage to use encryption software (as reflected in step 3).

3.)  Now the most important part.  Encrypt your “Lock Box” folder on your PC using encryption software.  There are numerous third party options out there.

What do I use for this purpose? Recently a fellow blogger at the “Crazy World of G” exposed an open source “FREE” encryption program, called AxCrypt that will get the job done.  I have used AxCrypt for years and it has not let me down yet.  The one really “cool factor” that I like about AxCrypt is that I can encrypt my folders and files and convert them to an “exe” (executable) file format.  Files encrypted and converted into the “exe” format allows me to take the file anywhere; however, to open the file requires a password.  I thank the “Crazy World of G” for motivating me to write about protecting our senstive files and using AxCrypt to get-r-done!

More on AxCrypt File Encryption for Windows

AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files.

We have received 1,756,691 registrations, so it is tried and proven!

Features

Right-click integration with Windows Explorer makes AxCrypt the easiest way to encrypt individual files in Windows.

Double-click integration makes it as easy to open, edit and save encrypted files as it is to work with unencrypted files.

Many additional features, but no configuration required, just install it and use it.

AxCrypt encrypts files that are safely and easily sent to other users via e-mail or any other means. Self-decrypting files are also supported, removing the need to install AxCrypt to decrypt.

AxCrypt is translated into English, Danish, Swedish, German, Dutch, Hungarian, Spanish, French, Italian and Norwegian so chances are it speaks your preferred language.

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]


Geek Squeaks’ of the Week (#48)

February 17, 2010

The hits keep on coming…  Geek Squeaks’ are weekly marvels of articles crafted by the members of the What’s On My PC blogroll. If  you have an interest in computers and information technology, I suggest that you bookmark these sites and make them part of your daily reading.

image

TTC Shelbyville
Test Drive Windows 7 Online

Snakebytez
Easily import Twitter contacts into Google Buzz with Tw2buzz

I Love Free Software
360Desktop: Desktop Manager Adds 360° View to Desktop

Worthy Tips
How to unsubscribe from a Google Buzz conversation?

Technogran’s Tittle Tattle
Blogging with windows live writer. 7

TuneUp Blog
Building the Perfect Media Center (Part One)

Canadian Tech Blogger
Top 5: Best Laptops

Internet Security Blog
Change DNS Server IP Address Settings With Few Clicks [How To]

thePC Security
Auto Lock / Unlock Computer With USB – Free Download

Lifehacker
Google Says Buzz Needed Wider Testing, Issuing Fixes This Week

Rarst.net
View Microsoft Excel files with native free app

Tech-for Everyone
Briefest Scam Email Ever?

Free PC Security
Valentine’s Day ‘I Love You’ Around The World

411-Spyware.com
How to Remove My Security Wall

WP Expert
Image Organization Workaround For WP.com

Plato On-Line
Company to Care for Pets after Christian Rapture

Evilfantasy’s Blog
BITS from MooSoft

Bill Mullins’ Weblog – Tech Thoughts
Two Free Apps to Encrypt Your USB Drive

Big Geek Daddy
Identity Theft Advice

Scoroncocolo
Windows 7 and Vista God Mode

What’s On My PC
Beware! Telephone Bill Rip-Off…

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]


A Drag and Drop Encryption Program

February 9, 2010

There are numerous file (and folder) encryption programs that are available to protect sensitive files on your computer; however, most people do not understand their purpose.  If you are carrying files around on a flash drive that are potentially sensitive in nature, OR maintaining sensitive files on a PC that is accessible by many people, OR storing sensitive files on the internet;  then it is important to protect the content of those files from prying eyes. One way of doing that is through file encryption.  Encryption software is designed to make your files unreadable (or accessible) to other people.  The encryption process usually prompts you to create a key (or password) prior to the software making the file(s) unreadable.  As a result, in order to  make the file readable again (through a process called decryption) you must enter the password that you originally provided.

image

One of my favorite encryption programs, that is FREE, small in file size (< 200 KB), and is portable;  is Drag ‘n Crypt ULTRA.  The “cool factor” to this program is that when you launch the program, a small target (or drop zone) appears on your desktop (see below).

image

To encrypt a file (or folder), you simply drag the file (or folder) to the target (or drop zone) and drop it.  Drag ‘n Crypt Ultra will go to work automatically, prompt you for a password, and then create the encrypted file. As an added level of security, the source file is erased to prevent someone from restoring the file using data recovery software (which is especially easy on a flash drive).

image

To decrypt the file you simply drag the file you originally encrypted to the target (or drop zone), enter your password, and the file will be restored to its’ original condition.

image

If you right mouse click on the target (or drop zone), you also have the following options:

image

My (2)-two favorite options is “create file association” and “Use Context Menu”.  With the “file association” option activated you can open your encrypted files by simply mouse clicking on the file(s) and if you have the “context menu” option activated you can perform your file encryption operations through the Windows Explorer context menu, which is typically activated by a right mouse click on a file (or folder).

Overall, Drag ‘n Crypt is fast, offers decent protection ( Twofish coding algorithm) and does not require installation (can be carried and used on your flash drive). I especially use this program to protect files on my flash drive and to protect files that I store online.

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]


A Safe and Secure Sticky Notes Program for your Flash Drive

December 27, 2009

If you are someone that uses a portable flash drive on a regular basis, then you most likely have experienced that feeling when you either forgot to unplug the drive from a foreign computer or that feeling when you have misplaced or lost the drive.  If this has not happened to you, believe me it will.  I am a heavy duty flash drive user and I have experienced both, even though I go to great lengths to monitor the whereabouts of my flash drive.  As a result of my carelessness, I have learned to use layers of protection to prevent access to the data on the drive in the event the drive falls into the wrong hands.

In conjunction with using encryption software on my flash drive (such as the FREE version of SafeHouse), I will also use programs on the drive that offer password protection and additional encryption.  For example, the sticky notes program that I carry on my flash drive is a FREE program called PNotes that not only can be password protected; it can also be configured to automatically encrypt your notes.

image

This little gem of a program contains a boat load of features that continues to get better and better.  PNotes can also be installed and run from your computer as well.

PNotes Features:

  • Ease of use – no installation, just unpack the downloaded archive to any location and run PNotes.exe.
  • Fully adjustable – you set the default fonts, colors and dimensions of notes.
  • Individual note adjusting – every note can have its own settings, like fonts, colors etc.
  • Rich text formatting – any portion of note’s text can be formatted separately.
  • Password protection – prevents unauthorized access to program.
  • Encryption – allows you to store notes as encrypted files, so even in case of loosing your USB stick nobody could read them.
  • Backing up – the notes could be backed up before saving – with any reasonable levels of copies – and quickly restored at any moment.
  • Transparency – opacity level for notes may vary from completely opaque to absolutely transparent.
  • Skins – there is a variety of skins for PNotes (some of them are just works of art) and, moreover, you can create your own if download PNSkinCreator – a small utility for creation PNotes skins.
  • Docking – you may dock notes to any side of screen (all together or each one separately) and get as a result a kind of panel.
  • Scheduling – it is possible to schedule each note to remind you about significant events by many different ways. Using this feature you may just hide notes and don’t worry, you’ll be notified in time.
  • Overdue reminders – have you set a number of reminders and turned your computer off or taken the program in whole to another computer? Never mind, next time the program will start it will check it’s settings and inform you about any overdue reminder.
  • Favorites – add frequently used notes to favorites for easy and fast access.
  • Searching – you may perform the quick search in notes either by their contents, or by their titles.
  • E-mailing – contents of each note or number of notes as attachment may be sent by e-mail.
  • Control Panel – this is your central command post. All management is put into effect here.
  • Grouping – notes can be separated into different groups for easy management. You may freely create, modify or delete groups and change every note’s belonging by single click or just drag_and_drop.
  • Internationalization – PNotes is fully Unicode supported and translated into many languages.
  • Portability – PNotes leaves no traces in Windows registry and can be started from any drive (fixed or flash) on any computer. Take your notes with you to any location.
  • Other features – of course there are many other unmentioned features in program, but I suggest you to discover them by yourself, these are delights of any new program, aren’t they?

StumbleIt

jaanix post to jaanix

Bookmark and Share

image

[ CLICK HERE TO LEAVE A COMMENT ]


Geek Squeaks’ of the Week (#27)

September 9, 2009

Wow…  Over a half-year of Geek Squeaks’. Combine all the articles together in a book and you have a technology book like no other.  Geek Squeaks’ are a compilation of articles from the authors of blogs (web sites) that are on the What’s On My PC… blogroll. I do have to admit I have associated with the best bloggers out there; no doubt about it.  If you want to read more “Geek Squeaks” be sure to visit the category link at the side of the blog.

image

StatCounter
Scoroncocolo

Multicore Computers and Old Programs*
Tech-for Everyone

Boost Firefox in a single click with SpeedyFox
Snakebytez

USB Image Tool
Evil Fantasy’s Blog

Best Websites of 2009
Carputer’s News and Computer Tips

Are You an Internet Addict?
Plato-online

Zune HD – And Drool All Over my Keyboard
Tux in the Midwest

Going after the hackers! Wanna help?
The Spyware Biz Blog

Give your file advance security with Cryptor encrypting utility Piyada’s World

How to Remove Antivirus Pro 2010
411-Spyware.com

Test Your Computer’s Stability
TTC Shelbyville

List of Portable Web Browsers
AKS-Feel The Change

JavaRa
The Abbey Rose

Computer Security
Crazy World of G

Nokia set to release a Net book mini computer
Computer Too Slow

Design Your Own Exercise Program Using Seven Key Moves [DIY] Lifehacker

Use Google Talk to get Latest & Top NEWS!
Mrintech

1by1 – tiny and portable mp3 audio player
Rarst.net

I Don’t Care If You’re Naked – Stop Spamming Me!
Bill Mullins’ Weblog – Tech Thoughts

Microsoft Office 2007 – Deal for college students
Sugarloaf Tech

Rootkits, Malware and Registry Protection
Free PC Security

How to List and View Installed Windows Fonts
thePC Security

Glass Notepad
Technize

ZeroRemote
Freeware Pharmacy

Learn how to keyboard…
What’s On My PC…

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]


Protecting sensitive files on your portable flash drive…

May 4, 2009

Carrying files on a flash drive is an easy method of transporting files to and from the office; BUT, did you ever stop and think; what the consequences would be if you lost the drive. Would you be exposing sensitive files and data to someone that found the drive that ultimately could come back to haunt you? Portable flash drives are small and can very easily lost or misplaced.

There are numerous methods available to encrypt files but most of the those methods can be time consuming, still can expose or give hints to the nature of the file data, and in most instances cannot be fully used on other PC’s due to limited access rights. As always, prior to transporting data to/from your home PC to another site (e.g. work), make sure you have permission to do so (e.g. consult with your network administrator).

I have experimented with many software utilities that will encrypt data on a drive to deter and prevent exposure of the data. If you do not know what encryption is, do not let the term scare you.

encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. [ source: WikiPedia ]

An utility that I recently started to use and have been quite impressed with is called “FREE SafeHouse Explorer”FREE Safehouse Explorer is a FREE (never expires) product that is offered by a company called PCDynamics, Inc. to promote their other commercial products and to promote the importance of data privacy.

SafeHouse

FREE SafeHouse Explorer is initially installed on your PC, BUT there is a menu option in SafeHouse to copy the program to your flash drive or any external media. Once on your flash drive you will be prompted to create a volume storage area.  The volume storage area can be any size up to 2000 Gigabytes… In my case I have an 8 Gig flash drive and I created a 2 Gig volume area to store my sensitive files. Once your volume has been created, the actual program on the flash drive, called “SafeHouse Explorer” is the program that you use to move, copy, and delete files in the protected volume; thus, it makes no difference if you have administrative access rights on the PC or not. Basically, in summary, the  files that you intend on protecting are hidden inside this volume file that gives no hint of what the data may or could be. You can also backup these volume files; and to open them, you only need the “SafeHouse Explorer” program.  SafeHouse Explorer is very similar to Windows Explorer in appearance and operation. There are many features to this program, requires a minimal learning curve, and in the end I feel comfortable with the protection if offers in the event my drive is lost or stolen.

SafeHouse Explorer In Action

Main Features:

SafeHouse Explorer makes your secret files invisible and hides them from snoopers, intruders and anyone else who doesn’t have your permission to view them.

SafeHouse Explorer uses passwords and maximum-strength 256-bit advanced encryption to completely hide and defend your sensitive files, including photos, videos, spreadsheets, databases and just about any other kind of file that you might have.

SafeHouse Explorer can protect files residing on any drive, including memory sticks, external USB drives, network servers, CD/DVDs and even iPods. Supports U3 Smart Drives.

SafeHouse Explorer creates hidden private storage areas on your local hard drive or external media to hold your confidential files. Your files are completely invisible until you enter your password. After you enter your secret password, you access your files using SafeHouse Explorer’s familiar drag-and-drop Explorer-like interface.

StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]