{"id":1928,"date":"2017-09-25T17:19:30","date_gmt":"2017-09-25T17:19:30","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1928"},"modified":"2019-05-25T18:15:47","modified_gmt":"2019-05-25T18:15:47","slug":"how-to-encrypt-files","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/","title":{"rendered":"How to Encrypt Files"},"content":{"rendered":"<p>Some information is best kept secret no matter whether it&#8217;s about your private life or business sensitive data. Now that we\u2019re living in the future, much of that information is stored in computers. One of the ways to keep things secret in a computer is to <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/common-usage-of-encryption\/\">use cryptography<\/a>. <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2mac.html\">Kruptos 2 Professional<\/a> is one way to use Encryption to keep your data safe and this post explains how to encrypt files using Kruptos.<\/p>\n<h2>Getting and Starting Kruptos<\/h2>\n<p><a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">Kruptos 2 Professional<\/a>, now in its seventh version, is made by Kruptos 2 Software company. A trial version of the program can be downloaded at the <a href=\"http:\/\/www.kruptos2.co.uk\/download.html\">free trial page<\/a>. It downloads and installs like any other Windows application and your installation should be very smooth without any problem.<\/p>\n<p>Upon running Kruptos for the first time, the program will display a message detailing the conditions of the trial. In short, until the user purchases a license, the program will have full functionality for thirty uses. After that, only decrypting of files will be allowed.<\/p>\n<p>Click the \u201cContinue Trial\u201d button at the lower right of the window to bring up the application proper. Notice the Visa icon at the upper right side of the window, reminding the user to upgrade to the full version. A bit tacky, but convenient for those who get sold on the program.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Begin.jpg\" \/><\/p>\n<h2><a href=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/encryption.html\">How to Encrypt Files<\/a><\/h2>\n<p>To encrypt a file, drag it to the project pane. That\u2019s the main area in white in the above picture. You can drag the file from the explorer pane to the left, or from another window or the desktop. You can drag several files at once by shift-clicking or control-clicking. When you\u2019ve put all of the desired files in the project pane. Click on the \u201cEncrypt\u201d icon as outlined in the picture below.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Encrypting.jpg\" \/><\/p>\n<p>You\u2019ll be asked to give and confirm a password. Since Kruptos is a desktop application, it provides an option to show the password as you type it rather than as a string of asterisks.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Password.jpg\" \/><\/p>\n<p>Historical Note: Ever wonder why passwords are echoed on the screen as dots or asterisks? Back in ye olden days, no one had personal computers. To use a computer, one had to go to The Computer Room. This was a public or semi-public room holding row upon row of computers or ASCII terminals (a terminal was a computer, a keyboard, a screen, and a modem, minus the computer). There were no partitions to provide privacy. Thus, computer-crackers could steal login credentials by shoulder-surfing. Except for Internet kiosks, this isn\u2019t as much of a concern as it used to be.<\/p>\n<p>Back to work.<\/p>\n<p>Click on the \u201cEncrypt\u201d button at the bottom of the password dialog box and Kruptos will encrypt the selected files.<\/p>\n<div id=\"attachment_16771\" class=\"wp-caption alignnone\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Finished.jpg\"><img decoding=\"async\" class=\"size-full wp-image-16771\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Finished.jpg\" alt=\"\" width=\"554\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Encryption completed.<\/p>\n<\/div>\n<p>The encrypted file will have an icon that looks like this:<\/p>\n<div id=\"attachment_16772\" class=\"wp-caption alignnone\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/DoneEncrypting.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16772\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/DoneEncrypting.jpg\" alt=\"\" width=\"110\" height=\"126\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Files that have been encrypted by Kruptos have this icon.<\/p>\n<h2>How to Decrypt Files<\/h2>\n<p>Decrypting is the reverse of encrypting. Cryptologists (those are the math nerds who make this work) call this restoring the plaintext. The plaintext is the original unencrypted file. To do this with Kruptos, drag the encrypted file to the project pane and click on the \u201cDecrypt\u201d button that\u2019s to the right of the \u201cEncrypt\u201d button. You\u2019ll be prompted for the password.<\/p>\n<div id=\"attachment_16773\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Reversing.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16773\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Reversing.jpg\" alt=\"\" width=\"321\" height=\"315\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Enter the password which you chose earlier to get your old file back.<\/p>\n<\/div>\n<p>And you\u2019ll get your old file back.<\/p>\n<div id=\"attachment_16774\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Plaintext.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16774\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Plaintext.jpg\" alt=\"\" width=\"554\" height=\"171\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Decryption completed.<\/p>\n<h2 class=\"wp-caption-text\"><a href=\"http:\/\/www.kruptos2.co.uk\/blog\/file-shredder\/\"><span style=\"font-size: 29px; font-weight: bold; background-color: transparent; text-align: inherit;\">How to Shred Files<\/span><\/a><\/h2>\n<\/div>\n<p>Sometimes, the best way to keep a secret is to get rid of the secret. That means coming to your senses and deleting the directory where you\u2019ve kept your erotic Star Trek\/Harry Potter crossover fan fiction. The problem is that it\u2019s possible for someone to \u201cundelete\u201d that directory so that the whole world can laugh at your poor sense and worse taste.<\/p>\n<p>Files are stored on hard disk drives. Accessing hard drives involves moving a physical drive head over a physical platter. In computer terms, that is achingly slow. In order to make hard drives usable, operating system developers have to resort to shortcuts.<\/p>\n<p>One of those shortcuts is to cheat on file deletion. When you delete a file, the file system marks the respective tracks on the hard drive as available for use. If those tracks have not yet been used, then it\u2019s possible for your worst enemy to grab your computer and use an \u201cundelete\u201d utility to retrieve your literary crimes and bring shame on your household.<\/p>\n<p><a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-delete-your-files-permanently-using-kruptos-2-professional\/\">Securely deleting files<\/a> (or \u201cshredding\u201d them) requires going over those tracks on the hard drive platter and overwriting them with either zeroes or with random noise. To do this in Kruptos, drag the file you want to shred to the project pane, as in the examples for encrypting and decrypting. Then click on the \u201cShred\u201d button as shown. The slider next to the button controls how many passes the drive head will make over the platter (the maximum is sixteen). The more passes, the more secure the shredding purportedly is.<\/p>\n<p><strong>Important Note:<\/strong> With modern hard drives,\u00a0<a href=\"http:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/secure_del.html#Epilogue\">one pass suffices<\/a>. Extra passes don\u2019t add extra security and they need more time to complete.<\/p>\n<div id=\"attachment_16775\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Shred.jpg\"><img decoding=\"async\" class=\"size-full wp-image-16775\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Shred.jpg\" alt=\"\" width=\"600\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Click the button to permanently delete files.<\/p>\n<\/div>\n<p>Remember that, of its nature, shredding is irrevocable. If an undelete utility could retrieve the file, then shredding would be useless.<\/p>\n<div id=\"attachment_16776\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Sure.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16776\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Sure.jpg\" alt=\"\" width=\"459\" height=\"187\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Think twice.<\/p>\n<\/div>\n<h2>Kruptos in Right-Click Context Menu<\/h2>\n<p>In addition to the main Kruptos interface, the installation process also adds items to the desktop right-click menu. This menu allows quick access to Kruptos\u2019 main features without having to go through the trouble of finding the application icon.<\/p>\n<div id=\"attachment_16777\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Context.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-16777\" src=\"https:\/\/cdn.appstorm.net\/windows.appstorm.net\/authors\/rudolfwinestock\/Context.jpg\" alt=\"\" width=\"554\" height=\"146\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Right-click in Windows Explorer to get this menu.<\/p>\n<\/div>\n<p>Those of a technical bent may wonder what algorithm Kruptos uses.\u00a0So Kruptos uses Bruce Schneier\u2019s Blowfish algorithm with a cipher strength of 256 bits. That\u2019s nice to know, especially since Schneier is a well-regarded expert on computer security. To bring up the actual help system, click on the \u201cView Help\u201d button at the bottom of that window.<\/p>\n<p>see also <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/commonly-used-encryption-algorithms\/\">commonly used encryption algorithms.<\/a><\/p>\n<h2>Wrapping Up<\/h2>\n<p>Now you got some idea how to encrypt file using Kruptos encryption software. Aside from its main purpose of securing information Kruptos also has ancillary functions, such as making self-extracting archive files, <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\">sending encrypted emails<\/a>, integration to all <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-share-your-data-with-clients-securely-using-kruptos-2-pro\/\">popular cloud folder providers<\/a>, filename encryption, secure notes storage and creating Zip archives.<\/p>\n<p>Kruptos 2 Encryption software is as also cross-platform compatible includes Windows, Mac OS and Android as well USB version. Having one more program on your computer that does those things shouldn\u2019t be such a burden but this little program makes your life ease by protecting all your sensitive data.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Some information is best kept secret no matter whether it&#8217;s about your private life or business sensitive data. Now that we\u2019re living in the future, much of that information is stored in computers. One of the ways to keep things secret in a computer is to use cryptography. Kruptos 2 Professional is one way to &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\"> <span class=\"screen-reader-text\">How to Encrypt Files<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1929,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,36],"tags":[47,46,48],"class_list":["post-1928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-kruptos-news","tag-decrypt","tag-encrypt","tag-shredder"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Encrypt Files - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Learn how to encrypt your files plus other tips to ensure your privacy, protect your data, and secure intellectual property.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Encrypt Files - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how to encrypt your files plus other tips to ensure your privacy, protect your data, and secure intellectual property.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-25T17:19:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-25T18:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png\" \/>\n\t<meta property=\"og:image:width\" content=\"670\" \/>\n\t<meta property=\"og:image:height\" content=\"371\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"How to Encrypt Files\",\"datePublished\":\"2017-09-25T17:19:30+00:00\",\"dateModified\":\"2019-05-25T18:15:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\"},\"wordCount\":1113,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png\",\"keywords\":[\"decrypt\",\"Encrypt\",\"shredder\"],\"articleSection\":[\"Data Protection\",\"How To\",\"Kruptos News\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\",\"name\":\"How to Encrypt Files - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png\",\"datePublished\":\"2017-09-25T17:19:30+00:00\",\"dateModified\":\"2019-05-25T18:15:47+00:00\",\"description\":\"Learn how to encrypt your files plus other tips to ensure your privacy, protect your data, and secure intellectual property.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png\",\"width\":670,\"height\":371,\"caption\":\"How to encrypt files\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Encrypt Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Encrypt Files - Kruptos Security Blog","description":"Learn how to encrypt your files plus other tips to ensure your privacy, protect your data, and secure intellectual property.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/","og_locale":"en_US","og_type":"article","og_title":"How to Encrypt Files - Kruptos Security Blog","og_description":"Learn how to encrypt your files plus other tips to ensure your privacy, protect your data, and secure intellectual property.","og_url":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/","og_site_name":"Kruptos Security Blog","article_published_time":"2017-09-25T17:19:30+00:00","article_modified_time":"2019-05-25T18:15:47+00:00","og_image":[{"width":670,"height":371,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png","type":"image\/png"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"How to Encrypt Files","datePublished":"2017-09-25T17:19:30+00:00","dateModified":"2019-05-25T18:15:47+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/"},"wordCount":1113,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png","keywords":["decrypt","Encrypt","shredder"],"articleSection":["Data Protection","How To","Kruptos News"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/","url":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/","name":"How to Encrypt Files - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png","datePublished":"2017-09-25T17:19:30+00:00","dateModified":"2019-05-25T18:15:47+00:00","description":"Learn how to encrypt your files plus other tips to ensure your privacy, protect your data, and secure intellectual property.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/Kruptos-Cloud.png","width":670,"height":371,"caption":"How to encrypt files"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-encrypt-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Encrypt Files"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1928"}],"version-history":[{"count":2,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1928\/revisions"}],"predecessor-version":[{"id":2335,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1928\/revisions\/2335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1929"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}