Securing your data

Lifehacker has published an overview of some of the many ways you can secure your data. The post was prompted by recently released browser vulnerabilities: first IE, then Firefox. They cover techniques far beyond just browser security, like how to properly wipe your iPhone. They mention disk encryption go-to TrueCrypt along with password management tools like KeePass. They also suggest using temporary credit cards to mitigate the impact of fraud.

[photo: Rija 2.0]

Comments

  1. TJHooker says:

    DEP and group policies on windows are exhaustively underrated. DEP on windows is actually better than ProPolice and the the stuff in Fedora 10 and the latest GCC. Ask anyone who knows what a canary value is.

    I run everything under DEP and configured signed driver loading, services, and group policies. I don’t run a firewall, and use free avira with it’s I/O monitoring/guard.

    Most people just assume that because source code is available, the code is correct and efficient.

  2. amk says:

    “Hide data inside files with steganography.”

    i’ve made a habit of not criticizing the posts on this site. although it’s incredibly difficult right now I’m going to stick with that. goodnight.

  3. ragnar says:

    you can put it in the safest safe of the world and it gets stolen. so first rule: encrypted backup. A real mans backup, to an external storage device, off location, but not connected to the internet, external Drive, DVD-RAM, DAT.

  4. TJHooker says:

    A “real mans backup” is nice and all, but the data is still being used on an active system with many attack vectors.

    Most software uses the registry or an ASCII file to store data, and most times vendors don’t encrypt the data; this is the case with Thunderbird and Pigin for example.

    In comparison a physically disconnected storage with an AES based protection would be nice for backups, but real time protection is way more important.

    Password Safe, Group policies, DEP, and Signed driver loading are about as good as real time protection gets on windows. With this setup data is stored correctly for the most part(considering no auto-logins,) vulnerable processes are very unlikely to run shellcode with stack based overflows, and rootkits are restricted to userland. Also group policies restrict privileges to malware.

  5. thenoz says:

    i think http://www.thenoz.wordpress.com had some killer ideas

  6. Fachu Malof says:

    Made some good points, I liked it.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 94,503 other followers