Three Steps to Lock Down and Protect Your Laptop
By jim |
A strong password is not all that is needed to fully protect your precious data and files from prying eyes, court orders (heaven forbid), or theft! Even passwords can be cracked, and laptops can be stolen. So you need a three-prong system to protect your computer thoroughly.
First:
Encrypt your hard drive. That can mean either using the built-in FDE (a program on Win7) or purchase an encryption program that can fully encrypt your hard drive. You can buy hard drives with built-in FDE or use software tools like Windows Bitlocker. If your laptop is stolen or compromised, it will require a password. For all other systems, we recommend TrueCrypt, available for free at TrueCrypt. After downloading and installing, select the Create Volume command and Encrypt the system partition or the entire system drive.
Second:
Create a hidden volume. Encryption with hidden volumes is the key to really protecting your information. To get started, once again, we turn to TrueCrypt to set up a hidden volume file. Open TrueCrypt, select create a volume, create encrypted file container, normal hidden volume. After it formats, it will create the hidden volume. After this hidden volume formats, open the outer layer by mounting and using a simple password. Import some non-sensitive files, photos, and random documents. Test your work when you reboot: Use the secure password, and you should see only these non-sensitive files. Put all your essential files in the hidden volume.
Third:
Install Prey Project's open-source laptop tracking tool. This tool uses Wi-Fi and IP addresses to find your stolen laptop for free. Follow the TrueCrypt instructions so you can create two operating systems that open with two different passwords. Make the dummy OS easy to open with a weak password (such as "password"); make the second OS partition the one that holds your encrypted drive with a strong password. That way, if your laptop is stolen, the thief will break into the dummy OS that contains the tracking tool, and you will be able to find your laptop.
First:
Encrypt your hard drive. That can mean either using the built-in FDE (a program on Win7) or purchase an encryption program that can fully encrypt your hard drive. You can buy hard drives with built-in FDE or use software tools like Windows Bitlocker. If your laptop is stolen or compromised, it will require a password. For all other systems, we recommend TrueCrypt, available for free at TrueCrypt. After downloading and installing, select the Create Volume command and Encrypt the system partition or the entire system drive.
Second:
Create a hidden volume. Encryption with hidden volumes is the key to really protecting your information. To get started, once again, we turn to TrueCrypt to set up a hidden volume file. Open TrueCrypt, select create a volume, create encrypted file container, normal hidden volume. After it formats, it will create the hidden volume. After this hidden volume formats, open the outer layer by mounting and using a simple password. Import some non-sensitive files, photos, and random documents. Test your work when you reboot: Use the secure password, and you should see only these non-sensitive files. Put all your essential files in the hidden volume.
Third:
Install Prey Project's open-source laptop tracking tool. This tool uses Wi-Fi and IP addresses to find your stolen laptop for free. Follow the TrueCrypt instructions so you can create two operating systems that open with two different passwords. Make the dummy OS easy to open with a weak password (such as "password"); make the second OS partition the one that holds your encrypted drive with a strong password. That way, if your laptop is stolen, the thief will break into the dummy OS that contains the tracking tool, and you will be able to find your laptop.