PCSTATS Main Page Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews

Beginners Guides
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....  
 
Contact the Suite 66 Advertising Agency
Seagate Backup Plus Slim External USB 3.0 2TB Hard Drive Review

Beginners Guides: Encryption and Online Privacy

Beginners Guides: Encryption and Online Privacy - PCSTATS
Abstract: This article aims to cover the basics of online security, including a description of the methods online stores use to protect themselves and their customers.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCstats Sep 23 2003   Mike Dowler  
Home > Reviews > Beginners Guides > PCstats

Exporting a data recovery certificate

Go to 'start\run' and type 'secpol.msc' to open the local security policies. Navigate to 'Security Settings\Public Key Policies\Encrypting File System,' and Choose 'Action\Add Data Recovery Agent.' Click 'Next.'

Click 'browse folders.' open the filename you created earlier with the 'cipher' command. Click 'next' then 'finish.' The current user is now a data-recovery agent and can decrypt any EFS encrypted files on the system.

Exporting a data recovery certificate

In order to be sure you cannot lose all your encrypted data in the case of an accident, you need to export the digital certificate you just created for the recovery agent. This will allow you to create new recovery agents in case something awful happens to your current Windows installation.

Login to the user account you made the recovery agent in the last step. Go to 'start\run' and type secpol.msc to bring up the local security policy. Navigate to 'Security Settings\Public Key Policies\Encrypting File System.' Right-click the certificate you just issued and choose 'all tasks\export.'

Select the 'DER Encoded Binary X.509 (.CER)' option, and click 'Next'. Now specify the location you wish to export the certificate to, for example a floppy disk. Keep it Safe! Now if the worst happens, you can follow the steps listed above to create a recovery agent, using the certificate you just exported. Best practice is to now delete the two files you created with the 'cipher' command in order to ensure that only you have access to the recovery agent.

Find out about this and many other reviews by joining the Weekly PCstats.com Newsletter today!

- Diagnosing Bad Memory
- 101 Tips and Tweaks for WindowsXP
- Burning CDs and DVDs
- Optical Drives & Recording Formats
- Securing Your Wireless Network
- Little Known Features of WindowsXP
- Ergonomics & Computers
- Annual PC Checkup
- Installing WindowsXP
- Encryption and Online Privacy
- Home Networking and File Sharing
- Forgotten Passwords & Recovery Methods
- Preventing Data Theft from a Stolen Laptop
- Creating a Weblog / Blog
- Installing RAID on Desktop PCs
- RAM, Memory and Upgrading
- Ten Steps to a Secure PC
- Flashing A Motherboard BIOS
- Diagnosing Bad Hard Drives
- Decrypting Document & Zipped File Passwords
- Spyware protection and Removal
- Wireless home networking
- Internet Connection Sharing
- Remote Access to Computers
- Hard Drive Data Recovery
- Firewalls and Internet Security
- Back up and Restore Data in WinXP
- Assembling Your Own PC
- VPNs and Internet Connection Security
- Legally Copying Software and Music
- Setting up a FTP Server in WinXP
- Creating MP3 Music Files
- Stopping Spam
- Cloning WindowsXP
- Browser Hijacking and How to Stop It
- Printer Sharing on a Home Network

< Previous Page © 2017 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Beginners Guides News»

 

Contents of Article: PCstats
 Pg 1.  Beginners Guides: Encryption and Online Privacy
 Pg 2.  Encryption
 Pg 3.  Public key and symmetrical encryption methods
 Pg 4.  Digital Signatures
 Pg 5.  How to know that you are using SSL
 Pg 6.  Browser security concerns
 Pg 7.  Managing Cookies
 Pg 8.  Temporary Internet files folder
 Pg 9.  DIY privacy, encrypting your files
 Pg 10.  Creating a recovery agent
 Pg 11.  — Exporting a data recovery certificate

SEARCH PCSTATS 
Use the power of Google to search all of PCSTATS and the PCSTATS Forums. Tell us what you think of this new feature - FEEDBACK?
   11 / 17 / 2017 | 4:31PM
Hardware Sections 


google
 
PCSTATS Network Features Information About Us Contact
FrostyTech
TransmetaZone
BeginnersPC
PCSTATS Newsletter
PCSTATS Forums
ShoppingList Assistance
Tech Glossary
Technology WebSite Listings
PermaLink News
Archived News
Submit News (Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Employment
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2017 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.