{"id":6755,"date":"2014-03-12T05:05:04","date_gmt":"2014-03-11T18:05:04","guid":{"rendered":"http:\/\/www.rjmprogramming.com.au\/wordpress\/?p=6755"},"modified":"2014-03-12T05:05:04","modified_gmt":"2014-03-11T18:05:04","slug":"data-security-via-cryptography-primer-tutorial","status":"publish","type":"post","link":"https:\/\/www.rjmprogramming.com.au\/ITblog\/data-security-via-cryptography-primer-tutorial\/","title":{"rendered":"Data Security via Cryptography Primer Tutorial"},"content":{"rendered":"<div style=\"width: 230px\" class=\"wp-caption alignnone\"><a target=_blank href=\"http:\/\/www.rjmprogramming.com.au\/Mac\/Security\/\"><img decoding=\"async\" style=\"float:left;border: 15px solid pink;\" alt=\"Data Security via Cryptography Primer Tutorial\" src=\"http:\/\/www.rjmprogramming.com.au\/Mac\/Security\/TrueCrypt_Primer-16of.jpg\" title=\"Data Security via Cryptography Primer Tutorial\"  \/><\/a><p class=\"wp-caption-text\">Data Security via Cryptography Primer Tutorial<\/p><\/div>\n<p>The subject of data security is becoming a bigger issue for all users of the Internet.   People may vary about their feelings regarding the level of personal responsibility they feel towards securing the data they present to the world, whether knowingly, or unknowingly, by engaging with the Internet, or <a target=_blank title='VPN information via Wikipedia' href='http:\/\/en.wikipedia.org\/wiki\/Virtual_private_network'>VPN<\/a>s.<\/p>\n<p>It might be that your interface to the Internet is through a private company&#8217;s network, and that a lot of this concern is taken care of to do with company policy, but if you delve to the n&#8217;th degree, there are interfaces to the world not just where you work, but with communications such as email.<\/p>\n<p><a target=_blank href=\"http:\/\/www.rjmprogramming.com.au\/Mac\/Security\/\" title='Click picture'>Today<\/a> we show you some great data security software, called <a target=_blank title='TrueCrypt downloads' href='http:\/\/www.truecrypt.org\/downloads'>TrueCrypt<\/a>, designed to be used to be able to encrypt the data files you wish to protect, whether that be via an encrypted individual file (container) or an encrypted volume or <a target=_blank title='USB information from Wikipedia' href='http:\/\/en.wikipedia.org\/wiki\/USB'>USB<\/a>, for instance, or even &#8220;bigger&#8221; arrangements, for which expert advice may come into play &#8230; am not sure you should call <a target=_blank title='Who you gonna call?' href='http:\/\/www.rjmprogramming.com.au\/wordpress\/?p=6524#wlmayt'>Ghostbusters<\/a> for this one?!<\/p>\n<p>TrueCrypt is open source software designed for use with Windows or Mac (as for today&#8217;s tutorial install and &#8220;first try&#8221;), at the very least.   Just installing it and setting up a small test shows that it can be manageable without that <a target=_blank title='Rocket Science?' href='http:\/\/www.highbeam.com\/doc\/1G1-135832050.html#be-doc-text' onclick=' window.open(\"http:\/\/www.rjmprogramming.com.au\/Mac\/Security\/Chortle.html\", \"Chortle\", \"top=430, left=500, width=200, height=100\"); '>rocket science<\/a> degree.<\/p>\n<p>Whatever the case the use of data encryption is not a step to enter into, without looking into the issue a bit.   As far as email goes, do some research into whether your email client perhaps encrypts for you &#8230; read <a target=_blank title='Is Gmail encrypted?' href='http:\/\/www.personcenteredtech.com\/2012\/06\/is-gmail-encrypted\/'>here<\/a> &#8230; but this is a huge topic area with some pretty high level expertise in the Information Technology industry.   The other aspect you can be pretty sure about regarding this topic, is that it will be a topic of growing interest, rather than a shrinking <strike>petunia<\/strike> violet.<\/p>\n<p>If this was interesting you may be interested in <a title='Click here to see topics in which you might be interested' href='#d6755' onclick='var dv=document.getElementById(\"d6755\"); dv.innerHTML = \"&lt;iframe width=670 height=600 src=\" + \"http:\/\/www.rjmprogramming.com.au\/wordpress\/?s=security\" + \"&gt;&lt;\/iframe&gt;\"; dv.style.display = \"block\";'>this<\/a> too.<\/p>\n<div id='d6755' style='display: none; border-left: 2px solid green; border-top: 2px solid green;'><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The subject of data security is becoming a bigger issue for all users of the Internet. People may vary about their feelings regarding the level of personal responsibility they feel towards securing the data they present to the world, whether &hellip; <a href=\"https:\/\/www.rjmprogramming.com.au\/ITblog\/data-security-via-cryptography-primer-tutorial\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,29,37],"tags":[295,380,386,1114,1314,1319],"class_list":["post-6755","post","type-post","status-publish","format-standard","hentry","category-elearning","category-operating-system","category-tutorials","tag-data-security","tag-email","tag-encryption","tag-security","tag-truecrypt","tag-tutorial"],"_links":{"self":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/6755"}],"collection":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/comments?post=6755"}],"version-history":[{"count":0,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/6755\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/media?parent=6755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/categories?post=6755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/tags?post=6755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}