{"id":1311,"date":"2014-01-28T21:41:20","date_gmt":"2014-01-29T02:41:20","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1311"},"modified":"2014-01-28T21:41:20","modified_gmt":"2014-01-29T02:41:20","slug":"a-beginners-guide-to-encryption-what-it-is-and-how-to-set-it-up","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/a-beginners-guide-to-encryption-what-it-is-and-how-to-set-it-up.php","title":{"rendered":"A Beginner&#8217;s Guide To Encryption: What It Is And How To Set It Up"},"content":{"rendered":"<p><p>    Keep on hearing about encryption but still not sure what it    involves? Heres a basic introduction to encryption, when you    should use it, and how to set it up.<\/p>\n<p>    Images by Vector    Icon (Shutterstock), Pixel    Embargo (Shutterstock) and von_hedwig  <\/p>\n<p>    Encryption is a method of protecting data from people you dont    want to see it. For example, when you use your credit card on    Amazon, your computer encrypts that information so that others    cant steal your personal data as it is being transferred.    Similarly, if you have a file on your computer you want to keep    secret only for yourself, you can encrypt it so that no one can    open that file without the password. Its useful for everything    from     sending sensitive information to     securing your email,     keeping your cloud storage safe, and even     hiding your entire operating system.  <\/p>\n<p>    Encryption, at its core, is similar to those decoder rings you    played with when you were younger. You have a message, you    encode it using a secret cipher, and only other people with the    cipher can read it. Anyone else just sees gibberish. Obviously,    this is an incredibly simplified explanation. The encryption in    your computer is far more complex  and there are different    types of encryption that use multiple decoder rings  but    thats the basic idea.  <\/p>\n<p>    There are also different levels of security when it comes to    encryption. Some types, for example, are more secure but take    longer to decode. Few, if any, encryption methods are 100 per    cent foolproof. If you want a more detailed explainer on how    encryption works, check out     this article from the How-To Geek and this article    from HowStuffWorks. They explain a few different kinds of    encryption and how they keep you safe online.  <\/p>\n<p>    The short answer: yes. Things can be stolen even if you dont    share your computer. All someone needs is a few minutes in    front of the keyboard to retrieve anything they want. A login    password wont protect you, either      breaking into a password-protected computer is     insanely easy.  <\/p>\n<p>    So should you encrypt your sensitive files? Yes. But theres a    bit more to it than that. You have two big choices when it    comes to encryption: do you just     encrypt the important files , or do you encrypt your entire    drive? Each has pros and cons:  <\/p>\n<p>    We generally recommend against average users    encrypting their entire drive. Unless you have sensitive files    all over your computer, or have other reasons for encrypting    the entire thing, its easier to encrypt the sensitive files    and call it a day. Full disk encryption is more secure, but can    also much more problematic if you dont put in the work to keep    everything backed up safely (and then encrypt those backups as    well).  <\/p>\n<p>    That said, well show you how to do both in this guide. Well    talk a bit more about each situation in their individual    sections below.  <\/p>\n<p>    If you need to keep just a few files safe from prying eyes, you    can encrypt them with the free, open-source, cross-platform    TrueCrypt. These steps should work on Windows, Mac and Linux.    Note that if youre encrypting files to send them over the    internet, you can also use     this previously mentioned 7-Zip method.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.lifehacker.com.au\/2014\/01\/a-beginners-guide-to-encryption-what-it-is-and-how-to-set-it-up\/\" title=\"A Beginner's Guide To Encryption: What It Is And How To Set It Up\">A Beginner's Guide To Encryption: What It Is And How To Set It Up<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Keep on hearing about encryption but still not sure what it involves? Heres a basic introduction to encryption, when you should use it, and how to set it up. Images by Vector Icon (Shutterstock), Pixel Embargo (Shutterstock) and von_hedwig Encryption is a method of protecting data from people you dont want to see it. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-1311","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1311"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1311"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1311\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}