answersLogoWhite

0

Answer

This is a very popular question. Many people do not realize that if someone turns on your computer and is able to access your files than they can potentionaly view anything that is not encrypted. To stop this from happening you can download Trucerypt. It is free and it will allow you to encrypt any files you like. I usually put all the files in one folder and then encrypt the folder. It is just more conveinient for me this way but you can encrypt individual files if you want. You can download truecrypt from

http://download.cnet.com/TrueCrypt/3001-2092_4-10527243.html?spi=8f77c879343b6185366f2b7bdff14cd9

If you have any question feel free to write on my message board.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How do you connect between linksys without ethernet cable?

u could use a wirless reapeter, or an acess point


What do you use to acess Twitter?

I use my computer but lots of people use their mobiles


What is the name of a shaping tool 5 letters?

You could use a plane. You could use a lathe. You could use rasps and files, too.


Why you should protecting files from loss?

You should protect files from loss because they are expensive to replace. I have a number of them in my toolbox. I throw them away when they get dull. Some people use old files to make knives. The best ones for this are the ones made in the US.


What is the advantage and disadvantage of transaction processing system?

The advantage is that usually transaction processing is really fast, it takes up usually a few seconds, however, if there a lot of files in queue, the time taken to process data might take a long time. Another advantage is that it makes the process of boking more fair as files are processed in order in which they had been queued. (e.g. ticket booking) The disadvatages is that there is a chance of double booking. Also, transaction processing systems need to use direct acess files, serial acess media such as magnetic tape cannot be used.


How do you acess facebook free in china?

Yes,use proxy servers


What is the use of transfer port in engine?

Used by a technition to acess data.


Why do wrestlers use atletic tape on their fingers?

Multiple reasons: They could be hiding a blade to use during the match to cause themselves to bleed, could be healing from an injury, or could be protecting themselves from getting an injury.


What does the SVCHost process do?

In order to make the computer run more efficiently, Microsoft began to use .dll files as opposed to .exe files, but these new .dll files could not be opened directly from Windows. This is why SVCHost was created, to make these files accessible.


How do you encrypt files with Encrypt4all program?

I haven't use the mentioned program before,but i did use encryption shield.It's kind of encrypting software which provides you many ways of protecting your private or confidential files, data, folders from accessing by others.It has a lot of useful functions. Features detailed at its homepage whose address is on my bio. Wish can help.


How do you acess webtable in qtp?

Depending on what you are needing to do with it, you can use GetROProperty or GetTOProperties to view or set values.


Which commands could you use to copy all regular files in the current directory to tmp?

cp * /tmp