[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Login and Local Disk Security

Posted on 2006-06-21
4
Medium Priority
?
177 Views
Last Modified: 2013-12-04
I am currently in the market for a tool to encrypt the hard disk of a laptop to protect it in the event it was stolen.  Any recommendations?

Thank you.
0
Comment
Question by:kokeefe
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 750 total points
ID: 16954735
0
 

Author Comment

by:kokeefe
ID: 16954862
I understand that I would rather have the data be lossed than to have it fall into the wrong hands.  Do all of these type of applications carry the same risk of data loss if the password is lost/forgotten?  
0
 
LVL 85

Expert Comment

by:oBdA
ID: 16955078
Well, that's the point, isn't it? How is a security solution supposed to protect your vital data, if the exact same data that should be protected against theft by people not knowing the password can be restored through some backdoor?
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 16956669
Yes, thus far, truecrypt has no recovery tools available, no back door, no secret super pass. If you loss/forget the pass, you lose the data.
-rich
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question