If you have an account, please:
Log in
Stay Informed

Here's something that

I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

How can I help you?
Contact Jeremy

File Encryption

Assuming you do everything right and hackers and bad code never manage to make it into your system, you're still at risk for someone stealing your computer physically (particularly in the case of laptops). For this reason, it's important to take the time to learn how to use file encryption.

For Windows users, there is an option to make your files private, but in most versions of Windows, this doesn't work very well. Without getting really nerdy-technical as to why, let's just say that having a separate encryption program is a good idea.

Encryption made easy

In cases where your computer is stolen or if you are worried about anyone you know accessing certain folders and files on your computer, you might want to protect them behind strong encryption.

Truecrypt lets you create an encrypted file container that works like a folder, but looks as if it were a file full of random data. To use the encrypted container, you select it in Truecrypt, enter your password (which should be a very strong one), and the program will "mount" the file as if it were a removable hard drive on your system.

While mounted, you can copy files and folder to and from your "drive" and organize them as if it were a second hard drive or thumb drive plugged into your computer. When you're done, you "dismount" the container and it returns to its strongly encrypted state while looking like a simple file full of random data.

It's easy to set up and use as the documentation is very straighforward and includes a step-by-step walkthrough with pictures.

Guide Navigation
prev: Operating System Updates|INDEX|next: Firefox

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

Share This

Have a Comment or Question?

If you want to learn more about my professional background, click here to learn more. Otherwise, let’s get started - how can I help?

Online learning
On-site learning
Read my blog


A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]