Microsoft Office File Encryption (Windows)

Microsoft Word file encryption allows you to quickly and easily secure Word documents. Though early versions of Office’s file encryption were notoriously weak, newer versions are much stronger. Microsoft Office 2007-2010 offers AES-128 encryption using the SHA-1 algorithm, while Office 2013 and newer uses AES-128 and SHA-512. The use of SHA-512 is a major upgrade over SHA-1 in preventing brute-force attacks against passwords. Continue reading “Microsoft Office File Encryption (Windows)”

CP&S Podcast Official Announcement

As many of you have noticed, Michael and I have released the first two episodes of the Complete Privacy and Security Podcast. The podcasts are now available on iTunes, Google Play, and Stitcher. To those of you who have already listened, we apologize for the audio quality in those first couple of episodes – we are on a steep learning curve. The show continues to get better, and in the coming weeks we are bringing you some solid how-to episodes and top notch guests! Continue reading “CP&S Podcast Official Announcement”

7-Zip File Encryption

Though typically considered a compression program that allows you to “zip” files into a much smaller .zip file, 7-Zip also offers the ability to encrypt individual files. 7-Zip file encryption uses AES-256, and the program is free and open source.  In addition to encrypting the files, also offers the ability to encrypt the filenames.  This is a very important feature as filenames can reveal information about the contents of the files themselves, making 7-Zip a great tool for use when uploading to the cloud or anywhere else the files may be visible to a third-party. 7-Zip is free, and is officially supported for Windows and Linux. Continue reading “7-Zip File Encryption”

Encrypto File Level Encryption

One problem with encryption is the technical know-how required to use it. This is not inherently bad, but it does make using it with the uninitiated or disinterested a challenge. Fortunately there are some relatively user-friendly solutions we can employ to make encryption accessible to most, if not all. One such tool is Encrypto which offers extremely simple volume and file level encryption. Continue reading “Encrypto File Level Encryption”

Blur Privacy Service

I’ve mentioned the Blur privacy service a lot in the past but I’ve yet to fully review it. This post will serve as review, how-to, and as a chance to point out some important security features of the service. So what is Blur and why would you want to use it? That is hard to put into a single sentence. Most importantly for me, Blur offers a one-stop location from which I can mask my email address, my phone number, and my credit card. Unlike Pay With Privacy which I detailed last week, Blur is not a single-function service. Continue reading “Blur Privacy Service”

VeraCrypt Volume Level Encryption

VeraCrypt volume level encryption is perhaps one of the most common ways in which this program is utilized. It is also how I first became acqauinted with this TrueCrypt, it’s predecessor. If you are just starting with VeraCrypt, creating a working with a few volumes is a great way to ease into using encryption. If you don’t already have VeraCrypt, your first step will be to download and install it. Continue reading “VeraCrypt Volume Level Encryption”

FileVault Volume Level Encryption

A little known feature of FileVault is the ability to create encrypted volumes. Volumes are essentially encrypted file containers that can store a file or set of files. Volumes can be copied, emailed, burned to a DVD, or just set up as an additional layer of encryption for especially sensitive files. FileVault volume level encryption allows you to do this without needing a third-party application like VeraCrypt – assuming you don’t need to share these volumes with other operating systems.

Continue reading “FileVault Volume Level Encryption”

Volume Level Encryption Primer

Last week we wrapped up a big series on full disk encryption. Earlier this week I talked about full disk encryption for external media. Today I am going to begin talking about volume level encryption, and the next few posts will cover tools that you can use for this. First, though, I am going to talk about what it is, why you may want to use it, and why you may not. Continue reading “Volume Level Encryption Primer”