Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - I wanna txt u up.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. Rufus
7. McAfee Removal Tool (MCPR)
8. MusicBee
9. Sergei Strelec's WinPE
10. K-Lite Mega Codec Pack
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » Overview» Featured Software & Apps » Three Steps to Lock Down and Protect Your Laptop

Three Steps to Lock Down and Protect Your Laptop

By jim

on 06/16/2023

A strong password is not all that is needed to fully protect your precious data and files from prying eyes, court orders (heaven forbid), or theft! Even passwords can be cracked, and laptops can be stolen. So you need a three-prong system to protect your computer thoroughly.

First:
Encrypt your hard drive. That can mean either using the built-in FDE (a program on Win7) or purchase an encryption program that can fully encrypt your hard drive. You can buy hard drives with built-in FDE or use software tools like Windows Bitlocker. If your laptop is stolen or compromised, it will require a password. For all other systems, we recommend TrueCrypt, available for free at TrueCrypt. After downloading and installing, select the Create Volume command and Encrypt the system partition or the entire system drive.

Second:
Create a hidden volume. Encryption with hidden volumes is the key to really protecting your information. To get started, once again, we turn to TrueCrypt to set up a hidden volume file. Open TrueCrypt, select create a volume, create encrypted file container, normal hidden volume. After it formats, it will create the hidden volume. After this hidden volume formats, open the outer layer by mounting and using a simple password. Import some non-sensitive files, photos, and random documents. Test your work when you reboot: Use the secure password, and you should see only these non-sensitive files. Put all your essential files in the hidden volume.

Third:
Install Prey Project's open-source laptop tracking tool. This tool uses Wi-Fi and IP addresses to find your stolen laptop for free. Follow the TrueCrypt instructions so you can create two operating systems that open with two different passwords. Make the dummy OS easy to open with a weak password (such as "password"); make the second OS partition the one that holds your encrypted drive with a strong password. That way, if your laptop is stolen, the thief will break into the dummy OS that contains the tracking tool, and you will be able to find your laptop.




© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition