If you're someone who checks the system logs every now and then, to make sure things are running smooth - you may have noticed some errors related to Private Disk:
The PRVDISKAMD64 service failed to start due to the following error: The system cannot find the file specified.
The program works fine, despite these log entries. The error is not critical and it has no impact on the program's functionality. But why is it there? And what does it mean?
Private Disk comes with several flavours of drivers - 32-bit and 64-bit. Upon installation, both driver types are registered, but only one of them is successfully loaded by the system.
The other type, which is not compatible with the platform, fails to load - hence the log entry is generated.
In other words, you can simply ignore these notifications.
This behaviour will be changed in the next release, so the system won't bother loading modules that are not designed for it. Until then, here is a simple solution:
On choosing the entries:
What the modules mean:
An updated version of the upcoming Keeper 4 is now available:
It is a more polished version of the previous release, described here.
A new version of Secrets Keeper is about to be released. It will be called Keeper. You can download a preview from this address:
An installer is not yet available, but we're working on it. At this point just unzip it. Run the included BAT file to enable the integration into MS Office and Windows Explorer.
Of course, no story is complete without screenshots, so here we go (screenshots are clickable):
Keeper's main window, nothing special in it, but notice that the main menu is not shown by default.
The key management window enables you to manage the passwords and contacts stored on your keys. Keeper will generate passwords for you, as well as evaluate their strength. You can have an unlimited number of groups and contacts in each group.
The email addresses will be used when you click the "encrypt and email" option.
The file encryption dialog. You can choose whether you wish to use a password from a key connected to the system (otherwise type it by hand). If you use a password from the key, you can choose which group to encrypt the data for.
The settings window looks like any other settings window.
Note that the update checking feature does not work yet, therefore if you wish to track Keeper's progress, check this page every now and then.
Keeper integrates itself into the Microsoft Office suite, enabling you to encrypt files or decrypt them from within Word, or other programs from Office.
Keeper 4 also integrates itself into the context (right-click) menu of Windows Explorer. This gives you quick access to features such as:
If you right-click an encrypted archive, you will see options such as:
As you can see, Keeper 4 is a huge step forward from Secrets Keeper 3.5. The new version is prettier, it provides an excellent user experience, and it will run on platforms other than Windows ;-)
So, you and your employer are not on good terms anymore and you think it is payback time? Here is a beginner's guide to expressing disagreement.
Disclaimer: the article does not focus on the moral and legal side of the issue, the focus is purely technical.
Note: a complementary article for employers will follow shortly, but if you're sharp enough you can derive the protection methods from this information.
The options are different, but if you're in the IT industry, the common choices are:
Change all the passwords
It is a matter of time before they find a new person who knows how to apply the password reset procedure - most (if not all) systems have one. Sometimes it is as easy as reading the manual (which they should've told you to write in the first place) and following the instructions.
As an IT expert, you are aware of the fact that if someone has full physical access to a system - they can override pretty much every security measure.
Delete all the data
This is a better approach, because in this case there is nothing to recover. They can have the passwords for every server, the key for every door - but there is nothing to be found behind any of the doors.
Encrypt all the data
This is an extension of the previous method, and it is psychologically more aggressive, because this time they know they have the files, and "all they need" is the password. This gives them the false feeling that they're almost there.
Apply subtle changes to the systems configurations, etc.
If you need an example of this, remember the movie "Office space" to get an idea about how this is done.
Share corporate secrets with the competition
If you are not bound by an NDA, they won't be able to use this against you.
All the methods above have one thing in common - you'll have to pay for it sooner or later, and there is no approach that enables you to get away scot-free.
I do not encourage employees to cheat their employers (and vice-versa), I consider that a direct dialogue is the best way to solve a problem, as well as to prevent it from happening in the first place. This article must not to be used as legal advice.
A new release is going to be made public in the nearest future - Private Disk 2.11 is here. This version brings us one step closer to Private Disk 3.0, adding some new features.
Private Disk Explorer is the major new feature of this release - it enables you to access your encrypted disks even on systems where you don't have administrator privileges.
Yes, that's right! Private Disk is the first program of its kind that can run on any computer, in any circumstances; from Windows 9x to Vista and the not-yet-official Seven - your encrypted files are at your fingertips.
You will be able to explore NTFS and FAT32 images, regardless of their size, having the possibility to add new files to an image, remove existing ones or replace them with updated versions.
From now on Private Disk is unarguably the best option for those who need rock-solid encryption and mobility.
Other changes include:
Overall Private Disk became more polished and more reliable. Currently only the English and the Russian versions are available, other language versions will follow shortly.
PD Explorer is a free tool that enables you to explore Private Disk encrypted images even in the cases when Private Disk is not installed on the computer, even if you don't have administrative privileges.
You can view the contents of the encrypted disk, write or remove files from it - as you can normally do with an archive such as a ZIP file.
It is extremely simple in use, making it easy to add new files to the encrypted vault, delete or update existing files.
PD Explorer is compatible with NTFS images of any size, there are no file size restrictions, nor are there limitations about the maximum number of files that can be processed.
PD Explorer is a available for free, you can download it right now.
2g 3g administrator antivirus authentication beta biometry «blue screen» bsod business citrix data driver email encryption «file system» form-filling gsm howto «identity theft» internet keeper keylogger logon mobile password «password carrier» portability privacy «private disk» release sales security service seven sim «sim card» «sim manager» «sim reader» «smart card» software tips token troubleshooting usb usim vista windows wiping xp