?
Solved

Login and Local Disk Security

Posted on 2006-06-21
4
Medium Priority
?
175 Views
Last Modified: 2013-12-04
I am currently in the market for a tool to encrypt the hard disk of a laptop to protect it in the event it was stolen.  Any recommendations?

Thank you.
0
Comment
Question by:kokeefe
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 750 total points
ID: 16954735
0
 

Author Comment

by:kokeefe
ID: 16954862
I understand that I would rather have the data be lossed than to have it fall into the wrong hands.  Do all of these type of applications carry the same risk of data loss if the password is lost/forgotten?  
0
 
LVL 85

Expert Comment

by:oBdA
ID: 16955078
Well, that's the point, isn't it? How is a security solution supposed to protect your vital data, if the exact same data that should be protected against theft by people not knowing the password can be restored through some backdoor?
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 16956669
Yes, thus far, truecrypt has no recovery tools available, no back door, no secret super pass. If you loss/forget the pass, you lose the data.
-rich
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses
Course of the Month13 days, 23 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question