BillRM
 
  1  
Reply Sat 27 Mar, 2010 04:46 pm
@Chumly,
I had all of your safeguards in place and then added whole drive encryption with the free/open source truecrypt not to mention added encrypted mounted volumes also using truecrypte.
0 Replies
 
BillRM
 
  1  
Reply Sat 27 Mar, 2010 04:51 pm
@Chumly,
Quote:
I should point out I still want to easily make full backups using external HD's so whatever I use has to allow me to do that easily as well.


No problem, I used NTBACK program in connection with a large external USB hard drive that is also protected with truecrypt and had have no problem and even had done a full backup with this setup not that long ago.
0 Replies
 
Chumly
 
  1  
Reply Sat 27 Mar, 2010 04:53 pm
Good to know BillRM!
0 Replies
 
BillRM
 
  1  
Reply Sat 27 Mar, 2010 04:54 pm
@DrewDad,
Quote:
difficult or impossible to use the laptop once it has been stolen.


Bios chips can be replace for all types of computers for around 30 dollars and ATA hard drive lock breaking will cost you around a 100 dollars.
0 Replies
 
BillRM
 
  1  
Reply Sat 27 Mar, 2010 05:30 pm
@Chumly,
Chumly you might wish to look at the following

http://en.wikipedia.org/wiki/Truecrypt

To give you an idea of what truecrypt is along with their own website

http://truecrypt.org

As a user of this program for a number of years I could not be happier with it and never had a problem with it working or performed of any kind. Hell in fact I had run if forrunner program scandisk on 98 systems also without problems for a number of years before truecrypt replaced it.

With it on your system your information should be safe from any reasonable level of attack short of someone with the resources of a government or a very large firm behind them and even there you would give them one hell of a headache.

Someone just randomly stealing your laptop at a airport would be stop cold by truecrypt unlike with an bios lock and an ATA lock that can be gotten around for at most 200 dollars.

If I was you I would still keep my bios and ATA lock in place in order to made what is call an evil maid attack a great deal harder.

An evil maid attack is someone that is targeting you knowing you are running truecrypt and had access to your computer long enough to boot up with a USB stick and place a keylogger in the MBR area of the hard drive to record your truecrypt passphase as you enter it and then they would need access once more to your computer.

That is also a highly directed attack and not an issue for most people.




0 Replies
 
Chumly
 
  1  
Reply Sat 27 Mar, 2010 05:38 pm
I do indeed appreciate your confirmation as to its efficacy and all the info you've provided; tsarstepan pointed out a valid mobile methodology in his posting as per http://nerdbusiness.com/blog/what-if-someone-steals-your-laptop-tutorial-mobile-data-encryption
0 Replies
 
BillRM
 
  1  
Reply Sat 27 Mar, 2010 05:40 pm
@Chumly,
Second comment one big safe guard to keep people from placing evil malware on your computer by way of the internet and thereby maybe endangering your information/files is a program by the name of sandboxie.

The free version is just fine and once more I been running any program that connect to the net under it for a year or so now without a problem.
Chumly
 
  1  
Reply Sat 27 Mar, 2010 05:44 pm
@BillRM,
Sounds interesting, I have heard about the sandbox concept and my backup software Acronis has this feature as per: "When the Try mode is on, all alterations of your system will be performed with your computer's virtual replica on Acronis Secure Zone. You will be able to apply them to your actual system or reject them at any time."
BillRM
 
  1  
Reply Sat 27 Mar, 2010 06:10 pm
@Chumly,
Chumly I fear you had open a can of worms as I am a computer security nut of the first order and as such would like to also direct your attention toward a non-free program call “Process Guard”(around 30 dollars) that will not allow any program to run and or install in your system until you grant it permission and if a program had change since it were last started it will tell you that fact and once more ask for your ok.

It also will not allow any program to place keyboard hooks as in keyloggers unless you ok that program to do so. It also offer protection to memory(as in memory overflow attackes)/registors changes in XP similar to what you will now find build into window 7.

Of course it is a pain at first set up, even with a learn mode you can turn on but afterward the only time you know it is there is when you or your system had done some program upgrade or you add another software package.

Hope you will forgive me for going a little overboard on the issue of security.

Oh you can also set a password on this program so no one else can install a program on your computer if they do gain access to it.
Chumly
 
  1  
Reply Sat 27 Mar, 2010 07:27 pm
@BillRM,
Process Guard sounds interesting, however I do wonder if it's worth the time, trouble and expense over Acronis Try and Decide (via Acronis Secure Zone) since that is already part of my Acronis backup software and I know how to use it.

Here are the two videos describing Acronis Try and Decide:
http://www.youtube.com/watch?v=2OUfys5AHQQ
http://www.youtube.com/watch?v=V1hMqtOqFLg

Give 'em a look-see and tell me what you think!
BillRM
 
  1  
Reply Sat 27 Mar, 2010 07:49 pm
@Chumly,
Will do..........................................................
0 Replies
 
BillRM
 
  1  
Reply Sun 28 Mar, 2010 05:19 am
@Chumly,
Chumly Process Guard does not seem to overlap Acronis in it functions.

It is a overall monitoring/security program that protect from memory and other route for malware attacks and add security featuries to XP that can now be found in Microsoft windows 7 OS to XP systems along with being similar to Microsoft Steady State program for XP without locking the whole system down to the same degree and that Steady State does.

Sandboxie is the similar program to Acronis and both seem to greatly overlap however sandboxie had been design more to act as an ongoing barrier between programs that interface with the internet and therefore are targets for malwares and the rest of your system.

It had a numbers of nice features that allow you to set it up to act with your browsers and p2p and mail programs with little pain.

See the youtube link below for more details.

http://www.youtube.com/watch?v=YjFup73WIFE



Chumly
 
  1  
Reply Sun 28 Mar, 2010 11:46 am
@BillRM,
Alrighty then, from what I can tell given that I have:
Spybot
Avast!
Acronis Try and Decide
CCleaner
Hardware-based firewall
Windows Firewall
Windows System Restore
Four external HD's with multiple dated images of all my laptops

I've got enough going on in the protection/redundancy department and my efforts would be best spent in encrypting the data. Not that I do not appreciate the input about Process Guard.

So if you or anyone else has further advice as to encrypting the data for laptops that would be great otherwise I'm going with the combo of KeePass & TrueCrypt as noted here http://nerdbusiness.com/blog/what-if-someone-steals-your-laptop-tutorial-mobile-data-encryption

My great thanks to all!
BillRM
 
  1  
Reply Sun 28 Mar, 2010 03:24 pm
@Chumly,
Ok and good luck however here are a few more comments you know me!

All routers are hardware firewalls, with the whole drive encrypted you do not need to run CClean.

Have fun.............

Chumly
 
  1  
Reply Sun 28 Mar, 2010 05:02 pm
@BillRM,
Yes I know a router can be configured as a hardware-based firewall, less port forwarding.
I very much disagree that CClean has no use simply because the whole drive is encrypted.
0 Replies
 
Chumly
 
  1  
Reply Sun 28 Mar, 2010 08:16 pm
Thank you again to all, and to all a good evening.
0 Replies
 
 

Related Topics

Clone of Micosoft Office - Question by Advocate
Do You Turn Off Your Computer at Night? - Discussion by Phoenix32890
The "Death" of the Computer Mouse - Discussion by Phoenix32890
Windows 10... - Discussion by Region Philbis
Surface Pro 3: What do you think? - Question by neologist
Windows 8 tips thread - Discussion by Wilso
GOOGLE CHROME - Question by Setanta
.Net and Firefox... - Discussion by gungasnake
Hacking a computer and remote access - Discussion by trying2learn
 
  1. Forums
  2. » Safeguard Laptop?
  3. » Page 2
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.09 seconds on 12/23/2024 at 12:48:54