{"id":3183,"date":"2014-02-06T14:41:41","date_gmt":"2014-02-06T19:41:41","guid":{"rendered":"http:\/\/www.opensource.im\/?p=3183"},"modified":"2014-02-06T14:41:41","modified_gmt":"2014-02-06T19:41:41","slug":"a-beginners-guide-to-encryption-what-it-is-and-how-to","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/a-beginners-guide-to-encryption-what-it-is-and-how-to.php","title":{"rendered":"A Beginner&#8217;s Guide to Encryption: What It Is and How to &#8230;"},"content":{"rendered":"<p><p>    S  <\/p>\n<p>    You've probably heard the word \"encryption\" a million times    before, but if you still aren't exactly sure what it is, we've    got you covered. Here's a basic introduction to encryption,    when you should use it, and how to set it up.  <\/p>\n<\/p>\n<p>    Encryption is a method of protecting data from people you don't    want to see it. For example, when you use your credit card on    Amazon, your computer encrypts that information so that others    can't steal your personal data as its being transferred.    Similarly, if you have a file on your computer you want to keep    secret only for yourself, you can encrypt it so that no one can    open that file without the password. It's great for everything    from     sending sensitive information to     securing your email,     keeping your cloud storage safe, and even     hiding your entire operating system.  <\/p>\n<p>    Encryption, at its core, is similar to those decoder rings you    played with when you were younger. You have a message, you    encode it using a secret cipher, and only other people with the    cipher can read it. Anyone else just sees gibberish. Obviously,    this is an incredibly simplified explanation. The encryption in    your computer is far more complexand there are different types    of encryption that use multiple \"decoder rings\"but that's the    general idea.  <\/p>\n<p>    There are also different levels of security when it comes to    encryption. Some types, for example, are more secure but take    longer to \"decode.\" And few, if any, encryption methods are    100% foolproof. If you want a more thorough explainer on how    encryption works, check out this article from the How-To Geek and    this article from HowStuffWorks. They    explain a few different kinds of encryption and how they keep    you safe online.  <\/p>\n<p>    First of all, a short answer: yes. Things can get stolen even    if you don't share your computer. All someone needs is a few    minutes in front of the keyboard to retrieve anything they    want. A login password won't protect you, eitherbreaking    into a password-protected computer     is insanely easy.  <\/p>\n<p>    So should you encrypt your sensitive files? Yes. But it's a bit    more to it than that. You have two big choices when it comes to    encryption: do you just     encrypt the important stuff, or do you encrypt your entire    drive? Each has pros and cons:  <\/p>\n<p>    We generally recommend against average users    encrypting their entire drive. Unless you have sensitive files    all over your computer, or have other reasons for encrypting    the entire thing, it's easier to encrypt the sensitive files    and call it a day. Full disk encryption is more secure, but can    also much more problematic if you don't put in the work to keep    everything backed up safely (and then encrypt those backups as    well).  <\/p>\n<p>    That said, we'll show you how to do both in this guide. and    what you do is up to you. We'll talk a bit more about each    situation in their individual sections below.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/lifehacker.com\/good-luck-encrypting-your-system-drive-on-windows-8-t-1509886186\/@mrh829\" title=\"A Beginner's Guide to Encryption: What It Is and How to ...\">A Beginner's Guide to Encryption: What It Is and How to ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> S You've probably heard the word \"encryption\" a million times before, but if you still aren't exactly sure what it is, we've got you covered. Here's a basic introduction to encryption, when you should use it, and how to set it up. Encryption is a method of protecting data from people you don't want to see it<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-3183","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3183"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=3183"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3183\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=3183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=3183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=3183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}