PCSTATS     
[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Beginners Guides: Encryption and Online Privacy
Beginners Guides: Encryption and Online Privacy - PCSTATS
This article aims to cover the basics of online security, including a description of the methods online stores use to protect themselves and their customers.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Sep 23 2003   M. Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Creating a recovery agent

Decide which user you wish to use as a data-recovery agent. It is recommended that you use the built in 'administrator' account. Login as this account.

Go to 'start\run' and type 'cmd' to bring up the command prompt.

Type 'cipher /r:(pick a filename) to create a digital certificate for a recovery agent. You will be prompted to set a password. This creates two files in the 'my documents' folder of the current user. Be aware that these files can be used by anyone to become a data-recovery agent, so it is wise to remove them after we are finished this procedure.

Go to 'start\run' and type certmgr.msc.

Go to 'certificates - current user\personal' right click and choose 'all tasks' then 'import' Click next.

On the 'file to import' page, click 'browse' then change the 'files of type' dropdown box to .pfx files.

Select the filename you created with the 'cipher /r:' command. Type the password. Check the 'mark this key as exportable' box.

Click 'next.' Choose the 'Automatically Select The Certificate Store Based On The Type Of Certificate' option. Click 'next,' then 'finish.' Close the certificates console.

< Previous Page © 2023 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >

 

Contents of Article: PCSTATS
 Pg 1.  Beginners Guides: Encryption and Online Privacy
 Pg 2.  Encryption
 Pg 3.  Public key and symmetrical encryption methods
 Pg 4.  Digital Signatures
 Pg 5.  How to know that you are using SSL
 Pg 6.  Browser security concerns
 Pg 7.  Managing Cookies
 Pg 8.  Temporary Internet files folder
 Pg 9.  DIY privacy, encrypting your files
 Pg 10.  — Creating a recovery agent
 Pg 11.  Exporting a data recovery certificate

 
Hardware Sections 


 
PCSTATS Network Features Information About Us Contact
FrostyTech
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2023 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.