Utilities to help protect data

If keeping bad guys from entering the system is only half of the challenges, it makes them unable to find new valuable data.

Very few computer users do not regularly update firewalls and antivirus software. Because there is always a new security vulnerability, exploiting or taking advantage of social networks to trick you into infecting your computer. Nor does it exclude the possibility that bad guys have physical access to your computer. Whether it is a thief or a sneaky colleague with an unclear purpose. So you can use some of the following ways to make sure data is always safe.

Password management software

Many people often use the same username and password for many different websites such as email, bank accounts, etc. Because hackers can easily get your users and passwords from one page. Unsafe web. They often use the user and password for many different websites because they cannot create ' rememberable and difficult to guess ' passwords.

Picture 1 of Utilities to help protect data

However, users can use free password management software like KeePass, Password Safe, .

KeePass provides a simple way to track all your passwords and keep them safe. This software allows users to save all passwords in a small and easy-to-use database, and encrypt this database and only you can access it. ().

Password Safe saves data in an encrypted and password-protected file. When to access login information in which the user only needs to be in the encrypted file. However, Password Safe is also less feature rich than KeePass.

In addition, users can use password management software that charges Sticky Password but the price is not cheap at around $ 30. But users can download the trial version here.

Data encrypt

You can use tools to encrypt all data or create encrypted files on the hard drive so others can be hard to penetrate. Such as BestCrypt and TrueCrypt, both support options for creating a virtual drive on the hard drive very simply.

BestCrypt allows users to create multiple 'virtual' drives on a 'real' drive and only you or your authorized person can access this drive. In fact, each virtual drive is a file named tail .jbc (called a container file) and the content of the file is the encrypted content of the virtual drive. Bestcrypt works as a part of the operating system (automatically encrypting and decrypting when reading / writing a disk), you just need to enter the correct password to open the container file that can work right away, can even be shared Virtual drive on the network for many users.

Like BestCrypt, TrueCrypt can encrypt an entire partition of your hard drive. Or you can create a folder type " TrueCrypt Container " on a hard drive partition, which will be treated as a virtual partition. But TrueCrypt is free, while BestCrypt costs about $ 60.

There are also other free encryption tools like FreeOTFE, which do not require users to install and use it via USB, so they can be used at any time. FreeOTFE is an open source program that encrypts 'PC' hard drives of PC and PAD. Using this program, users can create one or more ' virtual disks '.

Wipe data when needed

The last component to make sure your data is to make sure any file you want them to be ' destroyed ' must die. There are tools to disable files and data that users want to permanently delete. Using normal deletion in the way of Windows can not permanently delete files that users delete, Windows does not actually delete any data until overwriting the data. Therefore, bad guys can use specialized tools to recover the data that the user has deleted.

Therefore, to be assured that the data has been permanently deleted, users can use some of the following tools:

The free and open source File Shredder utility allows users to select deleted files or folders or clean up unused hard drives with various algorithms.

There is also a popular free utility like CCleaner but not open source. This utility allows users to remove unnecessary files in the Windows system so they can run faster and regain more free space on your hard drive.