Thiru

As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it’s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.

How to Hide Your IP Address: The ultimate step-by-step guide

How to hide your IP Address? Whether you like it or not, your IP address follows you around where you go online just like how your shadow follows you wherever you go down on the street. You can’t get rid of it but unlike your shadow which only leaves your outlook skeleton without sharing anything …

How to Hide Your IP Address: The ultimate step-by-step guide Read More »

20 Tips to Protect USB Flash Drive and Extend Its Lifespan

Protect USB Flash Drive

A USB flash drive is one of the most important and essential accessories you can buy for your computer, since it contains backups of your most precious and significant files. Do you want to extend the life of USB Flash Drive? Follow these 20 tips to protect USB flash drive from physical damages/loss and extend …

20 Tips to Protect USB Flash Drive and Extend Its Lifespan Read More »

How to Password Protect Files and Folders on Mac

Password-Protect files and folders on mac

In today’s contemporary society, we store a wealth of data on our computers, some of it private and very sensitive. Keeping those data secure and maintaining privacy are highly important for any Mac user. Yet many of us give it scant attention and do little more than the bare minimum, if anything at all to …

How to Password Protect Files and Folders on Mac Read More »

Full Disk Encryption vs File and Folder Encryption

Full disk encryption Vs file and folder encryption

Data at rest, Data in Transit and Data in Use, these three terms we often hear when someone talks about data protection. This article explains why you should use file and folder Level encryption on top of full disk encryption. Let’s drive into detail of full disk encryption  vs file and folder encryption. Individual and …

Full Disk Encryption vs File and Folder Encryption Read More »

Commonly used Encryption Algorithms

Encryption algorithm

Today, security is an afterthought for many PC users, it’s a major priority for businesses of any size. It has to be when the Ponemon Institute tells us that security breaches are costing companies millions every year. Even if you don’t have millions to lose, protecting what you do have should be a high priority. There are …

Commonly used Encryption Algorithms Read More »

Common Usage of Encryption

Common usage of encryption

The purpose of this article is to provide information in the area of practical cryptography of interest to anyone wishing to use Encryption Software. This post covers starting from what is encryption, how encryption works, requirement for encryption and common usage of encryption in real world with examples. What is Encryption? Encryption is the conversion of …

Common Usage of Encryption Read More »

Top Reasons Encryption Is Not Used

top reasons encryption is not used

There is many reasons to password-protect – or encrypt – one’s digital data and keep private life as private. Foremost among them is to protect it during a security breach. This article list down top reasons encryption is not used by individuals as well organisations. Top Reason why we encrypt Here is what Bruce Schneier …

Top Reasons Encryption Is Not Used Read More »

File Shredder – how to permanently delete files from your computer?

File Shredder

File shredder programs are software tools that permanently delete files on your computer. As you may or may not know, deleting a file just hides it from the operating system. It isn’t really gone until that same space is overwritten by something else. This is exactly what a file shredder does. It overwrites selected files using a specified data sanitization method, ensuring that’s it …

File Shredder – how to permanently delete files from your computer? Read More »

What is Encrypted Web Connection and Why it’s Important

SSL Encryption

Encryption is the process of helping protect personal data by using a “secret code” to scramble it so that it cannot be read by anyone who doesn’t have the code key.Encrypted Web Connection is a process through which some or all of the Internet activity initiated from a Web browser is natively encrypted. Encrypted Web …

What is Encrypted Web Connection and Why it’s Important Read More »

How to Send Encrypted Email Attachments using Kruptos

kruptos email encryption

Kruptos2 Professional allows you to create encrypted email attachments so you can email your sensitive documents to anyone who has a Windows based computer. Your recipients do not need to have Kruptos 2 Professional installed all they need is the correct password to gain access to your shared documents. Kruptos 2 Professional encrypted attachments utilise the same …

How to Send Encrypted Email Attachments using Kruptos Read More »

How to View or Edit Your Files Securely in USB Drive?

how to view or edit your files securely

An encrypted USB thumb drive is the safest way to carry any sensitive files. This article shows you how to view or edit your files securely which are stored in USB drive using Kruptos 2 Go for USB drive encryption software. Unfortunately, you cannot password protect your entire USB drive, like you can password protect …

How to View or Edit Your Files Securely in USB Drive? Read More »

Pin It on Pinterest

Scroll to Top