Changes

Online Learning

643 bytes added, 9 years ago
/* Lesson 6 – Seven steps to better passwords */
You may be concerned that your encrypted volume not only protects your data from unauthorized access but also indicates precisely where you store the information that you most wish to protect. In a tight situation you could be forced to reveal the volume password through intimidation, interrogation and possibly worse.
* [[Destroying temporary files]]
'''Fact: ''' when you delete a file, even after you empty the Recycle bin, the contents of that file remain on your hard drive and can be recovered by anyone who has the right tools and a little luck.
Aside from destroying unwanted data from your digital memory device, you should also consider destroying temporary files.
* [[Backup]]
It is too late to think about having a backup once you lose or break your computer, USB memory stick. Obviously an up to date backup has to created in advance of the catastrophe.
 
* [[Lesson 4 Exercises]]
==Lesson 6 – Seven steps to better passwords==
A password is often the first (and last) line of defense – protecting unauthorized access to your computer or an Internet account. A password is like a key to a door. You may have several different keys for your home, your office, your car and your safe. None of the locks are the same and you have a collection of different keys to open them. The same should apply to your passwords. Each account should have its own strong password. The definition of a strong password is one that cannot easily be guessed, cracked or stolen by an attacker. This chapter explains how to create and remember strong passwords and how not to lose them!
 
* [[Better Passwords]]
252
edits