Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Tweak it or the bunny gets it

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Halloween Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. K-Lite Mega Codec Pack
5. Format Factory
6. Sergei Strelec's WinPE
7. Visual C++ Redistributable Runtimes AIO Repack
8. MusicBee
9. Fortect
10. FlyOobe / Flyby11
More >>

top reads

Star 8 Windows Shortcuts That’ll Make You More Productive and Save You Time

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025


MajorGeeks.Com » Overview» Featured Software & Apps » Three Steps to Lock Down and Protect Your Laptop

Three Steps to Lock Down and Protect Your Laptop

By jim

on 06/16/2023

🎃🧟‍♂️👻 IObit’s Spooktacular Halloween Sale! IObit Halloween Sale: 90% OFF + Mystery Treat 🍬
Experience faster surfing, smarter security, and total privacy with IObit Pro!

A strong password is not all that is needed to fully protect your precious data and files from prying eyes, court orders (heaven forbid), or theft! Even passwords can be cracked, and laptops can be stolen. So you need a three-prong system to protect your computer thoroughly.

First:
Encrypt your hard drive. That can mean either using the built-in FDE (a program on Win7) or purchase an encryption program that can fully encrypt your hard drive. You can buy hard drives with built-in FDE or use software tools like Windows Bitlocker. If your laptop is stolen or compromised, it will require a password. For all other systems, we recommend TrueCrypt, available for free at TrueCrypt. After downloading and installing, select the Create Volume command and Encrypt the system partition or the entire system drive.

Second:
Create a hidden volume. Encryption with hidden volumes is the key to really protecting your information. To get started, once again, we turn to TrueCrypt to set up a hidden volume file. Open TrueCrypt, select create a volume, create encrypted file container, normal hidden volume. After it formats, it will create the hidden volume. After this hidden volume formats, open the outer layer by mounting and using a simple password. Import some non-sensitive files, photos, and random documents. Test your work when you reboot: Use the secure password, and you should see only these non-sensitive files. Put all your essential files in the hidden volume.

Third:
Install Prey Project's open-source laptop tracking tool. This tool uses Wi-Fi and IP addresses to find your stolen laptop for free. Follow the TrueCrypt instructions so you can create two operating systems that open with two different passwords. Make the dummy OS easy to open with a weak password (such as "password"); make the second OS partition the one that holds your encrypted drive with a strong password. That way, if your laptop is stolen, the thief will break into the dummy OS that contains the tracking tool, and you will be able to find your laptop.




© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition