AboutWelcome to Free Software Daily (FSD). FSD is a hub for news and articles by and for the free and open source community. FSD is a community driven site where members of the community submit and vote for the stories that they think are important and interesting to them. Click the "About" link to read more...
Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it?
Securing a computer goes beyond more than just using strong passwords. You should consider what happens if an unauthorized person gains physical access to your computer. If the only security feature protecting your data from an unauthorized person is a user account password, then you have not taken enough steps to protect your computer and your data.
Germany has just passed a new law that adds more "anti-hacker" provisions to the German criminal code. Although the new rules are meant to apply narrowly to hacking, critics are already complaining that they may prevent necessary security and network research.
What happens if someone gains unauthorized, physical access to your computer? Even with all the fancy firewall and other network security tools running, If the disk is not encrypted, check mate! Your data is now shared. This short tutorial shows you how Fedora implements disk encryption and how that protects your computer if it ever falls into the wrong hands.
We are pleased to announce the availability of new Red Hat Storage Server 2.0 features and capabilities that bring enhanced virtual machine storage functionality for Red Hat Enterprise Virtualization, end-to-end encryption for data at rest and in motion, and enhanced security and data availability.
But the pain of buying a new computer pales in the face of losing the data from an unprotected laptop. A few simple steps toward data protection can avoid an invasion of your privacy and the real likelihood of identity theft.