Saturday, June 26, 2010

Encrypt your Memory Stick / Flash Drive – Hard Disk Drive …

TrueCrypt 6.3a

The ultimate freeware encryption program, TrueCrypt is loaded with powerful features that those concerned with protecting their data from thievery should want–and have.

It offers 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works hard to offer powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be immediately intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.

The useful tips in the extensive help manual and volume-creation wizard provide excellent guidance. In fact, they’re required reading, as TrueCrypt lacks any considerable in-program help. For instance, the tutorial explains the entire concept beyond “hidden” volumes, but it doesn’t quite explain how to mount them. One obvious downside of any strong encryption program is if you happen to forget your lengthy, secure password, you should consider any protected files as good as gone. However, once files are mounted to a local drive with your password or key, they conveniently behave just like any normal files, allowing you to easily open, copy, delete, or other modify them another way. Dismount the volume, and voila–your previously accessible files are now safely secure from prying eyes.

Users can even create a hidden operating system, encrypted away from nosy busybodies, but make no mistake–TrueCrypt is not for the casual encryption explorer. Be sure to thoroughly understand what you’re doing with the program before you do something regrettable.

Download Link: http://www.meshtechnology.co.uk/download/truecryptsetup6.3a.exe


From TrueCrypt Foundation:

Protect your sensitive data with this free open-source disk encryption software. Creates a virtual encrypted disk within a file and mount it as a real disk. Encrypt an entire hard disk partition or a device, such as USB flash drive. Automatically and transparently encrypt in real time.

TrueCrypt provides two levels of plausible deniability, in case an adversary forces you to reveal the password: a hidden volume (steganography- more information may be found here); no TrueCrypt volume can be identified (volumes cannot be distinguished from random data). TrueCrypt uses encryption algorithms AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish. It is based on Encryption for the Masses (E4M) 2.02a, conceived in 1997.

Michael Rentmeister, Mesh Technology Ltd

See as well www.computerni.co.uk/about/downloads

Friday, June 25, 2010

Benefits of an effective IT Supplier Relationship

Building a successful relationship with your IT supplier is essential to your system's success.

Trying to purchase IT systems and services at the lowest possible cost - with no regard to your business goals for the project or the overall cost of ownership - is likely to lead to a strained relationship with your supplier and cause both system and business problems.

Ideally, your supplier should have a clear view of your business goals and the role of IT in achieving these. This will help you build a relationship that can deliver a number of benefits:

it will help ensure that service-level agreements are met and that system availability is high
it will help in the speedy resolution of problems or queries
the supplier can provide valuable guidance on your business' future IT direction through their knowledge of your industry sector and the latest IT developments
your system will deliver the anticipated business benefits
To build a successful relationship with any IT supplier you should be clear from the outset about what you both expect from the arrangement. Make sure that:

you both have clear expectations of exactly what you'll get in terms of hardware, software and services
the business relationship is mutually beneficial - your supplier will have no interest in whether you achieve your business goals if you just want goods as cheaply as possible
there are specific targets to be reached at set dates representing what your business gets out of its IT systems - not the delivery of boxes and cables
the supplier provides regular reports of progress towards the agreed business objectives for the system
you hold regular reviews with your supplier to see how things are going
you have enough flexibility to accommodate change - whether this is through new technologies, the business environment or refined business goals
you have a signed contract which you both agree to, that includes details of each party's obligations and what should happen in the event of a disagreement or dispute

See as well www.computerni.co.uk

5 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows 7, Vista and XP Service Pack 3 (SP3) to more efficiently maintain your computer and safeguard your privacy when you’re online.

1. Free up disk space

Use Disk Cleanup to:

Remove temporary Internet files.
Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).
Empty the Recycle Bin.
Remove Windows temporary files such as error reports.
Remove optional Windows components that you don’t use.
Remove installed programs that you no longer use.
Remove unused restore points and shadow copies from System Restore.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

2. Speed up access to data

Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.
When to run Disk DefragmenterIn addition to running Disk Defragmenter at regular intervals — monthly is optimal — there are other times you should run it too, such as when:

You add a large number of files.
Your free disk space totals 15 percent or less.
You install new programs or a new version of Windows.

3. Detect and repair disk errors

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

4. Protect your computer against spyware

Spyware collects personal information without letting you know and without asking for permission. From the Web sites you visit to user names and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance. To combat spyware, you might want to consider using Microsoft Windows Defender, which is included in Windows 7 and Windows Vista, and is available as a free download for Microsoft XP SP2. Other free anti-spyware software programs are also available.

5. Learn all about ReadyBoost

If you’re using Windows 7 or Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use nonvolatile flash memory — like a USB flash drive or a memory card — to improve performance without having to add memory.

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.

The Disk Cleanup tool helps you free up space on your hard disk to improve the performance of your computer. The tool identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.