Continued from page 1
While grossly underutilized, encryption is nevertheless a very mature technology with defined standards but — and here's
big drawback — it has always been difficult and complex to implement for people with little technical aptitude or training. Fortunately, that is no longer a good reason not to implement encryption on your PC, if only so it's at least there and readily available if/when you need it.
When I decided that my computer and Internet security Bible "The Hacker's Nightmare" would not be complete without coverage of encryption, I was acutely aware of
obstacles. The implementation difficulties concerned me greatly because this was a book aimed squarely at educating and protecting non-experts, thus solutions that were complex to implement and/or maintain and/or use were not acceptable.
However it did not make any sense at all to settle for anything less than a global standard that could be readily implemented by anyone. Proprietary implementations were out. To cut a long story short (the long version can be found in "The Hacker's Nightmare") I searched and tested and trialed and eventually discovered an excellent yet inexpensive product that enforced a very high degree of security, conformed to globally accepted standards, yet was easy to install and use.
The encryption chapter in The "The Hacker's Nightmare" was so well accepted by people who suddenly became aware of
value of encryption that I decided to hive that chapter off into a separate book for people who for some reason didn't want
full security Bible. I called it "Code Rings & Secret Handshakes: The Email Encryption Guide". That title is a bit of a misnomer because
Guide tackles both eMail and File/folder encryption as well, but
initial focus is on eMail protection.
Don't worry — I'm not going to compel you to buy one of my books to find out what encryption software I eventually settled on, use myself and highly recommend to everyone. Just jump to
link below, provide your name and eMail address, select
product you are interested in (you should choose FileAssurity OpenPGP) and shortly thereafter you'll receive an eMail with download instructions. Here's
link: http://HackersNightmare.com?res=ArticsoftTrial
Please Note that I do not recommend trialing
Lite version of
software. Lite is missing several features that I think you'll find very useful, and
small price difference is just not worth
sacrifice of those features. The detailed tutorials in my books deal with features NOT found in
Lite version.
I should emphasize that you do not need either of my books to use this software, but
less expert you are with "computer stuff"
more valuable you will find
detailed tutorials. Also, owners of either "The Hacker's Nightmare" or "Code Rings & Secret Handshakes" are eligible for a $15 discount on
registered version of
encryption software package.
Well that's
last of this eight-part series "How Safe Is Your Success". I hope you have found
articles informative and useful. I welcome contact from you on related matters, suggestions for future articles, or your thoughts on how this series might be improved. Please don't hesitate to contact me through
form at: http://HackersNightmare.com?res=Contact
-------------------------

Bill Hely is an Australian technologist, consultant and author whose professional focus has been on advising and supporting small business operators in IT and Office Productivity - and rescuing them when they didn't heed his advice the first time around. He is the author of several books on technology for the business person, including the Bible of Internet and PC security "The Hacker's Nightmare" - http://HackersNightmare.com