Solved

How to password encrypt a hard drive.

Posted on 2013-11-07
7
355 Views
Last Modified: 2013-12-09
I have a backup 3.5" 1tb hard drive. I need to know a way of encrypting the contents of this drive and require a password to access it. It does NOT have to be any sort of high level government super encryption. Just a format that would be EXTREMELY difficult for your average hacker / thief to crack. Any suggestions from an Expert that has had PERSONAL EXPERIENCE with a particular program? Must be easy to use and cost no more than $60. Free would be nice.
0
Comment
Question by:Need-a-Clue
7 Comments
 
LVL 35

Assisted Solution

by:Kimputer
Kimputer earned 50 total points
ID: 39629916
Take a look at Truecrypt, it's free.

http://www.truecrypt.org/docs/

You have the option to encrypt a whole hard drive, or you can just create a smaller container (basically, just a file), which you can mount as a drive letter.
Many many encryption methods too.
0
 
LVL 13

Assisted Solution

by:Andy M
Andy M earned 138 total points
ID: 39629925
You've also mentioned that it is used for backups. It may be worth looking into the backup software you are using (if any) as some of these have the option to encrypt the contents of the backups.
0
 
LVL 14

Accepted Solution

by:
Giovanni Heward earned 137 total points
ID: 39630055
Here's my recommendations:

Truecrypt
Symantec (PGP) Drive Encryption
BitLocker Drive Encryption

Whatever product you select, be sure to use dual-factor authentication, choosing between two of these categories:

something you know
something you have
something you are

For example, a strong password (something you know) used in conjunction with a WWPass PassKey or YubiKey (something you have)
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 27

Assisted Solution

by:Steve
Steve earned 175 total points
ID: 39698248
Hi @Need-a-Clue,

Before settling on a solution, consider how you use the drive as you mention it is a 'backup' drive. Do you use any specific software to 'backup' your system.

If you do, take care as encrypting the drive may stop the backup working (or slow it down)

If not, you are free to use pretty much any encryption and you have 2 basic options:
a) encrypt the whole drive
b) create an encrypted 'container' that sits on the drive and cannot be opened without the correct password.

The weak point of any protection is the password though. All encryption systems can be broken if you choose a simple password.

Before trying complicated encryption software, consider option 'b' by simply using a password protected ZIP/RAR file.
Google it for yourself to see how hard it is to crack a password protected ZIP file using a brute force attack.... (which is incidentally the same way to crack a professionally encrypted container too)
Loads of tools exist but they all do it in the same way.....

As long as you use a long, complicated password it would take ages to crack and is deemed 'uncrackable' within reasonable timescales.


If proper encryption helps you sleep better however, I agree with Kimputer that Truecrypt is one of the simplest options as it can do both types of encryption as above and is very reliable.

It's good and straight forward, but the same brute force attacks that work on ZIP files will also work on Truecrypt containers/disks, so make sure you choose a good password.

See the section '62 characters' on the site below so see how long a password between 2-8 characters might take to crack if you used upper/lower case letters, numbers.

Reference:
http://www.lockdown.co.uk/?pg=combi
0
 
LVL 14

Expert Comment

by:Giovanni Heward
ID: 39698433
The weak point of any protection is the password though. All encryption systems can be broken if you choose a simple password.

Precisely why two-factor authentication is so highly recommended.

something you have combined with something you know
My YubiKey is to the far right.

Another suggestion is to reference a file or passphase (a complete sentence or paragraph of your choosing) and perform a SHA-256 hash against it (could combine with a salt for added measure.)  You'd then use the SHA-256 hash as your actual password.
0
 

Author Closing Comment

by:Need-a-Clue
ID: 39705206
THANK YOU SO MUCH!!! I feel that I have received a mini education on passwords and truly appreciate each response! I had NO idea how complicated this subject is and how vulnerable people are. I appreciate ALL you EXPERTS! I apologize for the long response time. Health problems.
0
 
LVL 14

Expert Comment

by:Giovanni Heward
ID: 39706179
Your welcome!  Thanks for the points.

Here's a chart which shows various authentication methods and strengths.

auth strength
You can see a password is the weakest method.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article applies to This article will be of use if you are the owner / supporter of any computer that comes with a discrete graphics card from nVidia / ATI Radeon (Now owned by AMD) or any embedded graphics solution and need to upgrade the gr…
Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now