Backing up SIM cards and making copies of your contacts and SMS is the first thing you'd want to do if a SIM reader got into your hands.
However, there may be cases in which destroying data is more important than keeping them. In such cases it becomes a good idea to clear SIM card memory in order to prevent private information from getting into wrong hands. Here are a few examples:
In these circumstances, you should erase SIM card data before giving the card to anyone. This includes wiping SIM contacts, the SMS archive, the list of last dialled numbers, own numbers stored on the SIM card.
To clear SIM card memory, you have to manually go through each entry and delete it. This is a long and boring operation; besides that - there is a risk that you will accidentally miss some of the entries - simply because there are hundreds of records, and a monotonous operation that involves pressing buttons on a tiny key-pad of a mobile phone is error prone.
The solution to this problem is SIM Manager's Clear SIM card feature, it does all of the above in a few clicks.
Besides that, with SIM Manager you can backup SIM cards before erasing them, thus you get to keep a copy of all the sensitive information from the SIM's memory.
Take a look at this video tutorial, which describes how to clear SIM card data without leaving a trace.
An updated version of the upcoming Keeper 4 is now available:
It is a more polished version of the previous release, described here.
A new version of Secrets Keeper is about to be released. It will be called Keeper. You can download a preview from this address:
An installer is not yet available, but we're working on it. At this point just unzip it. Run the included BAT file to enable the integration into MS Office and Windows Explorer.
Of course, no story is complete without screenshots, so here we go (screenshots are clickable):
Keeper's main window, nothing special in it, but notice that the main menu is not shown by default.
The key management window enables you to manage the passwords and contacts stored on your keys. Keeper will generate passwords for you, as well as evaluate their strength. You can have an unlimited number of groups and contacts in each group.
The email addresses will be used when you click the "encrypt and email" option.
The file encryption dialog. You can choose whether you wish to use a password from a key connected to the system (otherwise type it by hand). If you use a password from the key, you can choose which group to encrypt the data for.
The settings window looks like any other settings window.
Note that the update checking feature does not work yet, therefore if you wish to track Keeper's progress, check this page every now and then.
Keeper integrates itself into the Microsoft Office suite, enabling you to encrypt files or decrypt them from within Word, or other programs from Office.
Keeper 4 also integrates itself into the context (right-click) menu of Windows Explorer. This gives you quick access to features such as:
If you right-click an encrypted archive, you will see options such as:
As you can see, Keeper 4 is a huge step forward from Secrets Keeper 3.5. The new version is prettier, it provides an excellent user experience, and it will run on platforms other than Windows ;-)
So, you and your employer are not on good terms anymore and you think it is payback time? Here is a beginner's guide to expressing disagreement.
Disclaimer: the article does not focus on the moral and legal side of the issue, the focus is purely technical.
Note: a complementary article for employers will follow shortly, but if you're sharp enough you can derive the protection methods from this information.
The options are different, but if you're in the IT industry, the common choices are:
Change all the passwords
It is a matter of time before they find a new person who knows how to apply the password reset procedure - most (if not all) systems have one. Sometimes it is as easy as reading the manual (which they should've told you to write in the first place) and following the instructions.
As an IT expert, you are aware of the fact that if someone has full physical access to a system - they can override pretty much every security measure.
Delete all the data
This is a better approach, because in this case there is nothing to recover. They can have the passwords for every server, the key for every door - but there is nothing to be found behind any of the doors.
Encrypt all the data
This is an extension of the previous method, and it is psychologically more aggressive, because this time they know they have the files, and "all they need" is the password. This gives them the false feeling that they're almost there.
Apply subtle changes to the systems configurations, etc.
If you need an example of this, remember the movie "Office space" to get an idea about how this is done.
Share corporate secrets with the competition
If you are not bound by an NDA, they won't be able to use this against you.
All the methods above have one thing in common - you'll have to pay for it sooner or later, and there is no approach that enables you to get away scot-free.
I do not encourage employees to cheat their employers (and vice-versa), I consider that a direct dialogue is the best way to solve a problem, as well as to prevent it from happening in the first place. This article must not to be used as legal advice.
A new release is going to be made public in the nearest future - Private Disk 2.11 is here. This version brings us one step closer to Private Disk 3.0, adding some new features.
Private Disk Explorer is the major new feature of this release - it enables you to access your encrypted disks even on systems where you don't have administrator privileges.
Yes, that's right! Private Disk is the first program of its kind that can run on any computer, in any circumstances; from Windows 9x to Vista and the not-yet-official Seven - your encrypted files are at your fingertips.
You will be able to explore NTFS and FAT32 images, regardless of their size, having the possibility to add new files to an image, remove existing ones or replace them with updated versions.
From now on Private Disk is unarguably the best option for those who need rock-solid encryption and mobility.
Other changes include:
Overall Private Disk became more polished and more reliable. Currently only the English and the Russian versions are available, other language versions will follow shortly.
PD Explorer is a free tool that enables you to explore Private Disk encrypted images even in the cases when Private Disk is not installed on the computer, even if you don't have administrative privileges.
You can view the contents of the encrypted disk, write or remove files from it - as you can normally do with an archive such as a ZIP file.
It is extremely simple in use, making it easy to add new files to the encrypted vault, delete or update existing files.
PD Explorer is compatible with NTFS images of any size, there are no file size restrictions, nor are there limitations about the maximum number of files that can be processed.
PD Explorer is a available for free, you can download it right now.
A report published recently by IC3 (Internet Crime Complaint Center), provides a lot of insightful tips to those who often engage in Internet commerce. The study was carried out in cooperation with the FBI, the National White Collar Crime Center, and the Bureau of Justice Assistance.
The study is extremely useful, as modern life is a path that will inevitably intersect with the Internet, whether we want it or not. The web helps us - consumers, do things faster and easier; the problem is that fraudsters get the same benefits. As a result, if you fall for an Internet scam, the damage can be of a greater magnitude, and it can be inflicted upon you so quickly that you won't even notice it happened. Here are some numbers that put things in perspective:
It is highly recommended that you look through it and study the charts, and the recommendations section, which explains how to deal with such cases, as well as prevent them from happening. The remaining part of this article focuses on the issue of identity theft, which sadly was not given enough attention in the survey.
It is interesting that the study concludes that identity theft is one of the smaller troubles, as shown in the chart below.
Such a state of things is quite strange, because another study (the Computer Security Institute survey for 2007) found identity theft a much more serious problem. Could it be so that the victims of identity theft are not yet aware of their status?
Another possible explanation is that the scope of the IC3 report is simply different, it focuses on issues that occur after a transaction is complete (i.e. it is assumed that everything was ok before the final click in the process), while the truth is that identity theft has much more serious consequences. There is no need to use fake cheques, there is no need to engage in a long conversation with a "Nigerian scammer", nor there is a need to get involved in auction bidding. With your data in their pocket, a fraudster can do anything in a clean way - the sellers will not suspect that something is wrong, because from their point of view, they are dealing with an honest person, and everything is legal.
Identity theft occurs when someone else uses your personally identifying information without your knowledge or permission, to obtain credit cards, loans and mortgages, buy various products on your behalf, leaving you responsible for the consequences.
To minimize the risk of identity theft, you have to make sure that all the ways in which an identity can be stolen (attack vectors) are taken care of.
2g 3g adapter authentication beta biometry «blue screen» bsod business cdma driver email encryption «file system» form-filling google gsm howto internet keeper keylogger logon mobile name password «password carrier» portability privacy «private disk» release security seven sim «sim card» «sim manager» «sim reader» «smart card» software synchronization tips token troubleshooting usb usim vista winamp windows «windows 7» wiping xp