Google+ Encrypting Your Computer Hard Drive ~ High Tech House Calls
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Saturday, March 2, 2013

Encrypting Your Computer Hard Drive

Do you have information on your computer that is sensitive?

Every day we see reports of corporations having their data compromised or exposed. Is is possible that a hacker could gain access to your computer hard drive and compromise your data?

What can you do to minimize your risks?

  • Ensure you have a good anti virus program running on your computer.
  • Keep your operating system and application software updated to minimize security holes that can be exploited by hackers.
  • Make sure you have a tested backup and recovery process in place.

Once you download and install the software, read the Beginners Tutorial (http://www.truecrypt.org/docs/). When you have built your encrypted container, you can move your sensitive data there.

  • When you supply the correct credentials, the container is visible to your computer and your applications like any computer hard drive.
  • Programs will run normally using the data on the encrypted container.
  • When you dismount the container, this is the same as removing a USB Jump Drive from your computer and putting it in your pocket. The container is no longer visible to your computer until you mount the container again with the proper credentials.
Things to think about when using an encrypted container:
  • Make sure you have a backup of your credentials and have stored your password in a safe place. Without these two pieces of information, you will be unable to mount the encrypted container.
  • If the container is not mounted, it cannot be backed up. If you dismount the container at the end of the day and your automated backup runs at midnight, the backup program will not find your container to back it up. 
Carl Thorne
Expert Computer Consulting