Newsletter Archives
-
Taming BitLocker and other encryption methods
ON SECURITY
By Susan Bradley
Our audience consists of several different segments. As a result, there are many different risk levels.
My risk tolerance may not be the same as yours, and vice versa. Ultimately, it comes down to your specific comfort level in your specific environment. And, of course, risk levels change over time.
Once upon a time, we would authenticate to our mail providers in plain text, with usernames and passwords clearly visible, and send all emails in the same fashion. You could “tap” the line with special equipment read every email – in the clear. That’s no longer considered secure, so now nearly all mail providers offer some sort of protection, especially for the credentials.
Read the full story in our Plus Newsletter (21.06.0, 2024-02-05).
-
No Crappy Passwords — Secure passwords, no password book
FREEWARE SPOTLIGHT
By Deanna McElveen
You have a password book. You know the one. That ruffled little book with the cover falling off and marked-out passwords dating back to the Clinton administration.
What would happen right now if that book got destroyed or stolen, perhaps along with the computer that remembers all those passwords?
Read the full story in our Plus Newsletter (19.42.0, 2022-10-17).
-
Cryptomator – a little foil on your head is quite fashionable
ISSUE 19.35 • 2022-08-29 FREEWARE SPOTLIGHT
By Deanna McElveen
You can say you don’t trust the cloud with your files, but you do store files in the cloud. Your emails, your cat pictures on Facebook, your virtual farm in Farmville, your credit info, your bank account … yep, the cloud.
But you don’t have to go all-in with full trust. Take matters into your own hands!
I love my cloud storage services. I use Dropbox (my favorite), Google Drive (or whatever they’re calling it this week), OneDrive (will always be SkyDrive in my heart), and iCloud (we all make mistakes). Do I trust them to encrypt my data? Sure I do. Encrypt away, geeks! Do I also encrypt the files again from my end? Heck, yeah! Now, one might call me paranoid, but I’m really just a bit of a history buff. Words like “unhackable” and “uncrackable” sound an awful lot like “unsinkable” to me.
Read the full story in our Plus Newsletter (19.35.0, 2022-08-29).
This story also appears in our public Newsletter. -
Portable Text Encryption — Your super-secret decoder ring
FREEWARE SPOTLIGHT
By Deanna McElveen
Ever send an important and sensitive email to the wrong person? Wouldn’t it be great if the reply you got back was “Why did you send me gibberish?” instead of “Bob makes HOW MUCH!?”
U.S. developer Dana Booth has created an easy-to-use tool to encrypt text before pasting it into an email, chat message, or anywhere else. Portable Text Encryption uses AES, DES, Blowfish, and RC4 symmetric encryption ciphers to make sure that if the recipient of your message doesn’t have the password you provide (tell them verbally — not in an email), they aren’t gonna be reading anything but gibberish.
Read the full story in our Plus Newsletter (19.31.0, 2022-08-01).
-
Apple plans to break its end-to-end encryption
PUBLIC DEFENDER
By Brian Livingston
Apple Computer shocked computer-security experts when the Cupertino company announced on August 5 that it plans to circumvent end-to-end encryption in Mac and iOS software, reporting US users if more than a few photos in their iCloud account match a national database of child pornography.
“We want to help protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material (CSAM),” Apple said in its announcement. But people with experience in the subject said the technology would be used for everything other than that.
Read the full story in the AskWoody Plus Newsletter 18.33.0 (2021-08-30).
-
Check or change Win10’s file-sharing encryption level
LANGALIST
By Fred Langa
If you’ve upgraded your PC from Win7, Win8, or early Win10 versions, it may still be using a thoroughly obsolete and nearly useless level of encryption for file sharing!
Plus: More on “stuttering mice” and a potentially dangerous charger-cord fire hazard!
Read the full story in the AskWoody Plus Newsletter 18.13.0 (2021-04-12).
-
Microsoft 365 privacy tools
SMALL-BUSINESS COMPUTING
By Amy Babinchak
I’ll assume that most AskWoody readers take their personal privacy seriously.
But how many of you extend your privacy concerns and actions to your work? Linked tightly with security, protecting business privacy extends to coworkers, clients, and all stored data.
In the past, Office has been both a critical business tool and a significant security risk. Fortunately, today’s Microsoft 365 for business has an excellent collection of robust security features.
Read the full story in AskWoody Plus Newsletter 17.35.0 (2020-09-07).
-
Is your deleted cloud data really gone?
LANGALIST
By Fred Langa
Most Windows users know that clicking “delete” does not actually erase local files. The same holds true for your data stored in the cloud.
Those files can remain in remote backups or in online services’ logs for a very long time. Fortunately, there’s an easy way to keep your left-online data protected, even when it’s no longer under your full control. Here’s how.
Plus: More on the demise of Windows’ screen saver.
Read the full story in AskWoody Plus Newsletter 17.10.0 (2020-03-09).