PCSTATS Main Page Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews

Beginners Guides
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....  
Contact the Suite 66 Advertising Agency
How Motherboards Are Made: A Gigabyte Factory Tour

Beginners Guides: Encryption and Online Privacy

Beginners Guides: Encryption and Online Privacy - PCSTATS
Abstract: This article aims to cover the basics of online security, including a description of the methods online stores use to protect themselves and their customers.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCstats Sep 23 2003   Mike Dowler  
Home > Reviews > Beginners Guides > PCstats

Creating a recovery agent

Decide which user you wish to use as a data-recovery agent. It is recommended that you use the built in 'administrator' account. Login as this account.

Go to 'start\run' and type 'cmd' to bring up the command prompt.

Type 'cipher /r:(pick a filename) to create a digital certificate for a recovery agent. You will be prompted to set a password. This creates two files in the 'my documents' folder of the current user. Be aware that these files can be used by anyone to become a data-recovery agent, so it is wise to remove them after we are finished this procedure.

Go to 'start\run' and type certmgr.msc.

Go to 'certificates - current user\personal' right click and choose 'all tasks' then 'import' Click next.

On the 'file to import' page, click 'browse' then change the 'files of type' dropdown box to .pfx files.

Select the filename you created with the 'cipher /r:' command. Type the password. Check the 'mark this key as exportable' box.

Click 'next.' Choose the 'Automatically Select The Certificate Store Based On The Type Of Certificate' option. Click 'next,' then 'finish.' Close the certificates console.

< Previous Page © 2019 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >


Contents of Article: PCstats
 Pg 1.  Beginners Guides: Encryption and Online Privacy
 Pg 2.  Encryption
 Pg 3.  Public key and symmetrical encryption methods
 Pg 4.  Digital Signatures
 Pg 5.  How to know that you are using SSL
 Pg 6.  Browser security concerns
 Pg 7.  Managing Cookies
 Pg 8.  Temporary Internet files folder
 Pg 9.  DIY privacy, encrypting your files
 Pg 10.  — Creating a recovery agent
 Pg 11.  Exporting a data recovery certificate

Use the power of Google to search all of PCSTATS and the PCSTATS Forums. Tell us what you think of this new feature - FEEDBACK?
   08 / 19 / 2019 | 10:55AM
Hardware Sections 

PCSTATS Network Features Information About Us Contact
PCSTATS Newsletter
ShoppingList Assistance
Tech Glossary
Technology WebSite Listings
PermaLink News
Archived News
Submit News (Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2019 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.