

With a less serious security solution, this is game over: As soon as you give over your password, your data is forfeit. Let’s say that some person or legal entity finds out you’re keeping files inside a TrueCrypt volume, and has the power to compel you to give away your password. TrueCrypt is very serious about security, to the point of providing plausibly deniable encryption. As soon as you unmount the volume (eject the disk, so to speak), it becomes completely inaccessible. Every file you put into this drive is instantly encrypted, secure from prying eyes.
Another word for paranoid password#
However, when you mount that volume using TrueCrypt, you need only enter the correct password and a new drive shows up on your system. TrueCrypt works by creating virtual encrypted disks this means that, as far as Dropbox can tell, a TrueCrypt-encrypted disk is just a blob of random binary data. TrueCrypt’s simple interface lets you specify a TrueCrypt volume and pick a drive letter for it, while showing some stats about currently mounted volumes.
Another word for paranoid free#
But here’s an interesting bit of trivia: Did you know some Dropbox employees can access your files? Granted, that they would do anything with your data is a far-fetched scenario, but why take the risk? The free utility TrueCrypt lets you effortlessly encrypt entire folders, so your cloud-synced data remains truly yours. These services are invaluable for synchronizing data across different computers and mobile devices or sharing it with others.

Or maybe SkyDrive, or Google Drive, or one of the numerous other cloud file-hosting services out there.

With a keylogger installed on your system, an attacker could potentially learn every single word you type throughout the day, including all of your usernames and passwords. One way the baddies circumvent password protection is with a keylogger: an application (or a physical hardware dongle connected to your computer) that sits in the background, quietly logging every single keystroke you type, and later transmitting this information to an attacker. KeePass isn’t limited to just usernames and passwords, either: Each entry has several other fields, including a free-form Notes field for securely storing any sort of text. The list itself is built to contain thousands of records, and you can subdivide it into folders and subfolders to keep things organized. It includes a quick-search box where you can type just a fragment of a website’s name to quickly find it on your list. KeePass features its own random password generator, so you don’t have to come up with random passwords on your own. And unlike commercial competitor LastPass, KeePass doesn’t automatically put your password database in the cloud (although you can put it into Dropbox yourself). KeePass lets you keep all of these username/password pairs in a securely encrypted database, protected behind a single master password-the only password you’ll have to remember. So, seriously: Use a unique, difficult password for each and every website you sign up for, no matter how little you plan to visit it. This means that if the user database of any one website you sign up for is compromised, hackers can ( and often do) try your username and password on many other websites and gain access. KeePass lets you quick-search for passwords and organize them into a complex tree of folders.įor too many of us, the alternative to a password manager is using the same password everywhere.
