Encryption protects sensitive files from unauthorized access and spybots. Free software is available to encrypt files, folders, and drives, with options to erase the original file and hide encrypted files. Public encryption can be used for email and messaging. Self-decrypting files are not secure, but can be useful for less sensitive information.
Encryption turns readable files into unreadable code until the decryption key is provided. Encrypting sensitive files keeps your data safe even if a computer falls into the hands of a stranger. Encrypting sensitive files also protects them from spybots should your system become infested with malware. Fortunately it’s easier than ever to encrypt files with readily available software, many of which are even free.
Complex algorithms developed by various authors are used to encrypt files. These encryption programs use a single password to encrypt and decrypt data, folders, and even entire drives. Other types of encryption, called “public encryption,” use one key for encryption and another for decryption, where only the latter key needs to be private. This method is used to privatize email and instant messaging.
There are many free and open source encryption programs available. Most of these programs add a shortcut to context menus, the menus that open when you right-click a file. By placing a link here, you can encrypt any file by simply right-clicking on the name and selecting the encryption program. You will be prompted for a password and the file will be encrypted with this key. If this password is forgotten, the file cannot be decrypted later.
When encrypting files, the last three letters of the file or the extension will change depending on the software. For example, when you use Pretty Good Privacy® (PGP) to encrypt a Microsoft Word® document, the file becomes filename.doc.pgp. If you try to open the encrypted file by double-clicking, you will be prompted for the password used to encrypt it. If you encrypt more than the one-time file, you might consider keeping all sensitive files in one folder and encrypting the folder instead.
Encryption options typically include the ability to automatically erase the original file after the encryption process is complete. An “erase” is a safe way of deleting a file by rewriting it multiple times so that the data cannot be recovered, even using recovery tools. Some programs will let you dictate how many steps the software should take to erase the data. A minimum of eight passes is considered safe for most purposes, while the government or military might use up to 20 passes or more.
Some software offers the option to add an attribute to prevent encrypted files from being displayed in Windows Explorer®. It’s important to note, however, that it’s trivial to turn this feature off, causing all files to appear, so you shouldn’t rely on this option. Alternatively, steganography encryption programs will encrypt and then hide the files within graphic files that will still display correctly.
It is also possible to encrypt an entire drive or volume. For example, you might keep all your financial programs, banking programs, spreadsheets, and personal documents, such as wills or other critical data, on a dedicated drive. By keeping that drive encrypted when it’s not in use, you’re protecting it from malicious software and prying eyes should someone gain access to your system. It is also possible to encrypt a drive containing an operating system, although for most purposes this is unnecessary.
If you want to send an encrypted file to a friend as an email attachment, you can use an encryption program to create a self-decrypting file that won’t require the recipient to install encryption software. A password will need to be provided, however, by telephone or other means. Self-decrypted files are not considered truly secure because the password must be transmitted to the recipient, and most passwords can easily be cracked using software designed for this purpose. However, it’s a good way to keep information private as it traverses the Internet, as long as the information isn’t too sensitive.
Free open source programs used to encrypt files, folders and drives are readily available. If you want to encrypt your email, look for a public encryption program. Remember that your correspondents will also need a compatible encryption program installed.
Protect your devices with Threat Protection by NordVPN