As important as data encryption can be for the home user, it’s even more imperative in the enterprise. The problem? The most effective measures are usually cast aside in lieu of something a little easier to deal with. With the CipherUSB, Addonics hopes to bring “simple” and “most effective” together as one. Does it succeed?
Many sysadmins understand how to set up and maintain a network, but the concept of auditing is an entirely different world. In the first part of a series on auditing and penetration testing (pentesting), we introduce the concepts and tools for putting all that security to the test. We’ll also talk about our pentest platform of choice, the Pwn Plug.
We’ve talked a lot in the past about keeping your computer safe and data backed-up, but we haven’t delved much into keeping your data secure. In this first part to a three-part series, we’re taking a look at one of the best (and easiest-to-use) cross-platform solutions for keeping your important data encrypted: TrueCrypt.
It’s easy to overlook that huge corporations are far less dangerous than the small business you deal with each and every day with regards to information theft. Some institutions have treasure troves of info on you that can far exceed the “big fish”. If you work in a SMB, you can’t afford to have your info stolen, so read on for some important tips.
We’ve talked a fair bit about home virtualization in the past, but now we’re going to take a different turn and tackle VPSs, or “Virtual Private Servers”. In essence, a VPS is a virtual machine in the cloud, allowing you to log in from anywhere and gain nearly full control over a remote machine with tons of bandwidth to do a variety of cool things.
|Addonics CipherUSB Review – Portable Encryption Made Easy||Brett Thomas||July 3, 2013||External Storage, Security|
|SysAdmin Corner: Introduction to Pentesting and the Pwn Plug – Part 1||Brett Thomas||December 20, 2012||Editorials, Security|
|TrueCrypt Primer: Part 1 – What It Is & Why You Should Care||Mario Figueiredo||November 20, 2012||Editorials, Security|
|SysAdmin Corner: 7 Network Security F-Ups Small Offices Make||Brett Thomas||October 19, 2012||Editorials, Security|
|VPS: What It Is and How It’s Useful||Rob Williams||December 3, 2010||Security, Software|
|Super Talent SuperCrypt 32GB USB 3.0 Flash Drive||Rob Williams||June 9, 2010||External Storage, Security|
|Too TRIM? When SSD Data Recovery is Impossible||Rob Williams||March 5, 2010||Security, Solid-State Drives|
|Addonics CipherChain Hard Drive Encryption||Rob Williams||December 9, 2009||Security, Storage|
|Quick-Gage: Kingston 16GB DataTraveler Locker+||Rob Williams||December 2, 2009||External Storage, Security|
|Steganos LockNote 1.0||Rob Williams||January 26, 2006||Security, Windows|
|Steganos Security Suite 2006||Rob Williams||December 14, 2005||Security, Windows|
|Steganos Internet Anonym 2006||Rob Williams||September 16, 2005||Security, Windows|
|Internet Anonymity – Anonymizer vs Steganos||Rob Williams||August 8, 2005||Security, Windows|
|Internet Anonymity – How you can stay safe online||Rob Williams||August 3, 2005||Security, Windows|