Security Basics mailing list archives
RE: File Encryption - Part II
From: "Lucas Zaichkowsky" <LZaichkowsky () cyracom net>
Date: Tue, 16 Sep 2003 09:55:43 -0700
As someone else said, EFS is at the filesystem level. When you logon to your account, you have access to the private key and all encrypted data under your account can be read. To maximize EFS security, export the private key to a reliable media and put that in a safe. Keep a second copy on a USB memory stick that you can put on your actual physical keychain. When you need to read an encrypted file, you'll have to give it the private key to decrypt it. http://support.microsoft.com/?kbid=223316 -Lucas -----Original Message----- From: Rick Jones [mailto:rwjones2001 () hotmail com] Sent: Monday, September 15, 2003 5:48 PM To: security-basics () securityfocus com Subject: Re: File Encryption - Part II I have put off file encryption for a long time, but this thread prompted me to get started. So I created a folder called "Secrets," then created a text document called "Passwords," then did everything I was supposed to do to encrypt "Secrets" and all of its subfolders and files. The "Passwords" file turned a nice green color and showed itself as being encrypted. So far, so good. Then I e-mailed the "Passwords" file to someone, and asked them if they could open it. Sure enough, they could. So I am wondering...just what is file encryption supposed to accomplish? What I would like is a program or something I can use to encrypt a folder and all of its contents, and that absolutely will not open without a password or some other fairly airtight indicator that the creator -- and no one other than the creator -- wants to get in. Can anyone suggest how I might accomplish this? Thanks, RWJ _________________________________________________________________ Compare Cable, DSL or Satellite plans: As low as $29.95. https://broadband.msn.com --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ----------------------------------------------------------------------------
Current thread:
- Re: File Encryption - Part II Rick Jones (Sep 16)
- Re: File Encryption - Part II Patrick Boucher (Sep 16)
- RE: File Encryption - Part II Lucas Zaichkowsky (Sep 16)
- <Possible follow-ups>
- RE: File Encryption - Part II Neil Fryer (Sep 16)
- RE: File Encryption - Part II Kenneth Buchanan (Sep 16)
- Re: File Encryption - Part II Kamal Habayeb (Sep 16)
- RE: File Encryption - Part II Kenneth Buchanan (Sep 16)
- RE: File Encryption - Part II Milli Bit (Sep 23)
- RE: File Encryption - Part II Milli Bit (Sep 23)
- Re: File Encryption - Part II Kamal Habayeb (Sep 23)
- RE: File Encryption - Part II Meidinger Chris (Sep 23)
- RE: File Encryption - Part II Chris Berry (Sep 23)