Sensitive Data Search Results

How To: Secure your sensitive data in Ubuntu with encryption

TrueCrypt is a free application that lets you encrypt designated programs on your Ubuntu system to prevent unwanted access. Provided you select a strong password, intruders will not be able to open your personal files and documents. This instructional video walks you through the process of installing TrueCrypt on your Ubuntu operated machine and demonstrates an example on how to create an encrypted volume within a select partition.

How To: Completely erase a computer hard drive to remove all private data

Data thieves don't have to be programming wizards to get their hands on your personal information. They often find hard drives that contain financial and other sensitive data at flea markets, charity shops, the city dump—even on eBay. In this video tutorial, PC World explains how to completely erase sensitive data from old drives before recycling or discarding them. Wipe your old hard drives with this how-to.

How To: Delete files securely in Mac OS X Leopard

Have sensitive data that you want to make sure you securely delete? Or maybe you're getting an external drive ready to recycle or to give to a colleague. In this video tutorial, you'll find instructions for securely emptying your trash and also securely delete the contents of an external hard drive. For more, and to learn how to remove data from your Mac computer securely, watch this video tutorial from Apple.

How To: Protect your PC in 10 ways

There are 10 major ways to protect your PC. Disable Autorun, in Windows. Make sure that your system is up to date, by setting automatic updates. Always use a log on for your computer that does not have administrative privileges. Use different passwords, and change your passwords on a regular basis. Don't use simple passwords. Be careful of using links sent to you via email. Never disclose your sensitive information in public forums: e.g. social networks. Encrypt sensitive data on your compute...

How To: Hack a network with Nessus 3

The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. In this network security video tutorial, you'll learn how to hack a network using Nessus 3.

How To: Remove sensitive information from PDF's in Acrobat 9

This video shows how to use a special tool to redact or remove sensitive information from Adobe Acrobat 9. This includes hidden metadata, file attachments, comments, hidden text and layer elements within a PDF file. You can also set it up when you're emailing. The Examine Document function highlights information that you may want to remove. You can then select the different types of data and choose which things you want to remove.

How To: Use NTFS

NTFS? What is it? It stands for New Technology File System, but what does that mean? Well, it's the standard system for filing in Windows NT, including all later versions, up to the current Windows 7, but Mac users can take advantage of this file system, too. If you’re confused when it comes to your hard drive’s format, this guide will show you the way to get the most out of your system.

How To: Remove sensitive information in Adobe Acrobat 9 Pro

This video speaks about removing sensitive information in Adobe Acrobat 9. The viewer might get a very obvious idea of removing sensitive information by redaction. Redaction is the process of permanently removing sensitive information from a PDF file. This is done by opening the Advanced menu, clicking "Redaction" and then clicking "Show redaction tools", which can be in any format, images or text. The viewers will definitely get a clear idea of removing such sensitive information by redactio...

How To: Create a website and improve web presence

When you need a website to showcase your product or service, it can be quite confusing. Follow these easy steps to gather everything you need to have a successful website. Start your search for a domain name in the domain name registrar. (Example: www.companyname.com) Rent space from a hosting company to hold the files for your website. Set up an email account for your company. Create the content for your website (example: products, prices, services, etc). Get internet security to protect sen...

How To: Sort data in Excel

ShowMeAcademy.com shows how to sort data in Excel 2007. Excel has many options for sorting data according to any given column. To sort your data, right click on a cell in the column that you want to sort by. A menu comes up where you will see the “Sort” option. Hold your mouse over “Sort” and another menu comes up showing the different ways to sort. For example, if you select “Sort Smallest to Largest” it will take all the data and sort it from the row that has the lowest figure u...

How To: Encrypt data w/o admin rights using Rohos Mini Drive

This technical video will show you all about the Rohos Mini Drive. See how you may work with an encrypted partition on a PC without admin rights using this free portable encryption solution. It securely protects your portable data on any USB device. Portable utility Rohos Disk Browser gives you opportunity to work with your sensitive data on a USB drive in the usual way on any PC (even at an internet cafe, where you don’t have admin rights).

News: Oculus Is Collecting a Scary Amount of Data for Facebook

The highly anticipated VR headset hasn't been on the market long, but there's an issue that has some consumers, and even government officials, concerned about the Oculus Rift. You probably guessed the issue surrounds privacy and the extensive, not-so-secret way that it's collecting your personal data. The privacy concerns came about as various customers and media outlets took notice of the rather lengthy Terms and Services that pop up once you strap yourself into the Rift headset.

News: Many Lookup Engines

Hello I have now asked for help a few times, so I figured I should contribute with what I can offer as of right now, which is many valuable sites if you need to look someone up.

How To: Add with case-sensitive criteria in Microsoft Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 204th installment in their series of digital spreadsheet magic tricks, you'll learn how to use the SUMPRODUCT and EXACT functions in an array formula to add the sales for a sales representative where lower and upper letters matter (i.e., are case sensitive) in the criteria (conditions).

How To: Count characters & numbers within a string in MS Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 288th installment in their series of digital spreadsheet magic tricks, you'll learn how to count the number of characters or numbers in a text string with a formula that is case sensitive.

Prev Page