While I mean my presentation is done, it would be just as true to say, "Truecrypt is DONE" as an application. This is one incredible program.
I spent most of the end of last week watching Truecrypt tutorials, like this one on YouTube, or this one on Irongeek. The Irongeek one is especially informative. I spent most of Sunday and Monday actually practicing using Truecrypt. It's pretty easy to use, but to use it to it's full potential takes practice. I first learned about Truecrypt on Security Now! with Steve Gibson and Leo Laporte, espisode #41. I highly recommend listening to it a few times if you intend on using Truecrypt.
- If you have files that you don't want anyone else to see, use Truecrypt
- If you use a laptop, and have sensative files on it, use Truecrypt
- If you keep any files on a USB jumpdrive, use Truecrypt - even regular files can contain sensitive information that can be used against you
- If you want to keep important records with your attorney, mother, best friend - make a CD with Truecrypt and have them keep it - just in case of fire, hurricane, or flood
- If you work for Her Majesty's Revenue and Customs, and you're sending a CD with 7.25 million peoples ID's by courier service - use Truecrypt. And get a different courier service!
- If you suspect your ex has hired private investigators to find out how much money you really have - use Truecyrpt.
- If you finally have evidence that the Electoral College if fake - use Truecyrpt
I really can't say enough about how important a tool Truecrypt is, and how important the skilled use of Truecrypt can be for a company with sensitive information - even if that company is only one person. At the very least, watch the Irongeek video on Truecrypt.
The Linux version of Truecrypt is command-line based, and the Truecrypt people are working on a GUI for it. A Mac OSX version is suppose to be forth coming too. I'll play around with the command-line version over the holidays, and report back.
No comments:
Post a Comment