2.8.4 EFS – Part 2
By Val Bakh
In part 1 of the blog post about Encrypting File System (EFS), we described how EFS works, in common-sense terms, using a story of your attempts to secure the door of your house as a convenient example. Now let’s continue this discussion and translate that story into technical terms. We’ll also talk about certificates because they are virtually inseparable from matters related to encryption.
MS Windows 7 Tips and Tricks | 2.8.4 EFS – Part 2
Mar 5, 2014 8:25:00 AM / by Kelson Lawrence posted in file encryption key, Encrypting File System
MS Windows 7 Tips and Tricks | 2.8.3 EFS – Part 1
Jan 9, 2014 8:39:00 AM / by Kelson Lawrence posted in NTFS, Encrypting File System, EFS Part 1
2.8.3 EFS – Part 1
By Val Bakh
As the world of information technology (IT) becomes more and more sophisticated with each passing day, the security of the information that we store on computers has become a major headache. But, just as we occasionally have to go to work while suffering a migraine, we have to accept the pervasive need for IT security. There’s no way around it. It’s like locking the door to your house when you are leaving for work. There’s always the risk that you might misplace your house keys during the day or leave them behind in your office, but leaving the door unlocked is no longer as viable an option as it used to be a few decades ago. Similarly, we have to secure our data. The question is, how? Data security is an extremely complex but fascinating subject area. There are many technologies and methods, which are usually implemented in conjunction with one another to form a multilayered, impregnable (keep your fingers crossed) fortress.