How Safe is Your Success? Part 8 of 8

Written by Bill Hely


Continued from page 1

While grossly underutilized, encryption is nevertheless a very mature technology with defined standards but — and here'srepparttar big drawback — it has always been difficult and complex to implement for people with little technical aptitude or training. Fortunately, that is no longer a good reason not to implement encryption on your PC, if only so it's at least there and readily available if/when you need it.

When I decided that my computer and Internet security Bible "The Hacker's Nightmare" would not be complete without coverage of encryption, I was acutely aware ofrepparttar 103507 obstacles. The implementation difficulties concerned me greatly because this was a book aimed squarely at educating and protecting non-experts, thus solutions that were complex to implement and/or maintain and/or use were not acceptable.

However it did not make any sense at all to settle for anything less than a global standard that could be readily implemented by anyone. Proprietary implementations were out. To cut a long story short (the long version can be found in "The Hacker's Nightmare") I searched and tested and trialed and eventually discovered an excellent yet inexpensive product that enforced a very high degree of security, conformed to globally accepted standards, yet was easy to install and use.

The encryption chapter in The "The Hacker's Nightmare" was so well accepted by people who suddenly became aware ofrepparttar 103508 value of encryption that I decided to hive that chapter off into a separate book for people who for some reason didn't wantrepparttar 103509 full security Bible. I called it "Code Rings & Secret Handshakes: The Email Encryption Guide". That title is a bit of a misnomer becauserepparttar 103510 Guide tackles both eMail and File/folder encryption as well, butrepparttar 103511 initial focus is on eMail protection.

Don't worry — I'm not going to compel you to buy one of my books to find out what encryption software I eventually settled on, use myself and highly recommend to everyone. Just jump torepparttar 103512 link below, provide your name and eMail address, selectrepparttar 103513 product you are interested in (you should choose FileAssurity OpenPGP) and shortly thereafter you'll receive an eMail with download instructions. Here'srepparttar 103514 link: http://HackersNightmare.com?res=ArticsoftTrial

Please Note that I do not recommend trialingrepparttar 103515 Lite version ofrepparttar 103516 software. Lite is missing several features that I think you'll find very useful, andrepparttar 103517 small price difference is just not worthrepparttar 103518 sacrifice of those features. The detailed tutorials in my books deal with features NOT found inrepparttar 103519 Lite version.

I should emphasize that you do not need either of my books to use this software, butrepparttar 103520 less expert you are with "computer stuff"repparttar 103521 more valuable you will findrepparttar 103522 detailed tutorials. Also, owners of either "The Hacker's Nightmare" or "Code Rings & Secret Handshakes" are eligible for a $15 discount onrepparttar 103523 registered version ofrepparttar 103524 encryption software package.

Well that'srepparttar 103525 last of this eight-part series "How Safe Is Your Success". I hope you have foundrepparttar 103526 articles informative and useful. I welcome contact from you on related matters, suggestions for future articles, or your thoughts on how this series might be improved. Please don't hesitate to contact me throughrepparttar 103527 form at: http://HackersNightmare.com?res=Contact

-------------------------

Bill Hely is an Australian technologist, consultant and author whose professional focus has been on advising and supporting small business operators in IT and Office Productivity - and rescuing them when they didn't heed his advice the first time around. He is the author of several books on technology for the business person, including the Bible of Internet and PC security "The Hacker's Nightmare" - http://HackersNightmare.com


How Safe is Your Success? Part 1 of 8

Written by Bill Hely


Continued from page 1

Computer and Internet security are very wide-ranging and complex topics – so much so that even experienced experts specialize in just a subset ofrepparttar whole. This may be part ofrepparttar 103506 reason that a perception has developed amongrepparttar 103507 general online populace that anything related to "computer security" is too difficult to be tackled by anyone other than an expert.

So considerrepparttar 103508 enigma we are presented with if that's all true.

Onrepparttar 103509 one hand, you'd have to be bereft of all five senses and living on Mars not to know there is a sub-culture of Internet denizens who get their jollies by interfering with, stealing from and generally harming other people. We all know this. Logically we must then understand that if we connect torepparttar 103510 Internet, we become potential victims of these cyber-grubs. But, onrepparttar 103511 other hand, we just know that we are powerless to do anything about it because it's "all too hard".

The big corporates are OK – they can afford to hire those experts and specialists I just spoke of. But what aboutrepparttar 103512 non-IT-expert,repparttar 103513 average computer user and/or small business operator – what do they do for protection?

Well, I am going to let you in on a little secret. A secret that, if you take it seriously, just may save your business inrepparttar 103514 not too distant future.

A lot of what you have been led to believe is complete garbage.

Many experts treat average PC users as if they are imbeciles; many others know better but they want you to think you are an imbecile anyway. It's in their vested interests to have you thinking like that. As long as you "know" that security is just "too hard" there'll be an inflated demand for their services.

Don't get me wrong. There are some security issues that really are very complex and well beyondrepparttar 103515 ken of mere mortals. Such situations do demandrepparttar 103516 services of highly skilled specialists. Even basic security relating to mid- to big-business networks requires extensive technical knowledge.

But as a small business operator, there is an awful lot you can do to safeguard against ever getting into a compromised situation, and to safeguardrepparttar 103517 privacy and integrity of your data.

That is, to safeguardrepparttar 103518 success you have already attained as well as that still to come.

In Part 2 well look at one ofrepparttar 103519 biggest weaknesses in your Internet interactions –repparttar 103520 web browser. And no, it's not going to be a knock-Internet-Explorer-fest. Throughout this series we are going to stick to practicalities and realities.

Inrepparttar 103521 meantime I'd like to leave you with some homework. Here's a link to a detailed article I wrote concerning some urban myths about browsers: http://hackersnightmare.com/FreeContent/Browser_Wars.pdf

-------------------------



Bill Hely is an Australian technologist, consultant and author whose professional focus has been on advising and supporting small business operators in IT and Office Productivity - and rescuing them when they didn't heed his advice the first time around. He is the author of several books on technology for the business person, including the Bible of Internet and PC security "The Hacker's Nightmare" - http://HackersNightmare.com


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use