Home

KEYSecurePC General Principles

image

Contents

1. letters numbers and special characters You must be think but how do remember a password like KEFHU987 uh amp 612 Not to mention the fact that need to U ty remember three different ones as required by KeySecurePC Well that does present some diffic Thanktully there are various tricks you can use to remember We describe some in the next section EMA060511_UK 2 How to create a secure password that is easy to remember This section describes some methods for creating and keeping a secure password as follows Think of a poem or a saying that you know by heart YOU CAN T A widely used method is TEACH AN OLD DOG NEW TRICKS created using the first letter of each word in the saying YCTAODNT This sy remember just recite the saying but virtually impossible for anyone Your password can be sequence of letters is 0 else to identity In order to make your password even safer add an at the beginning and a number at the end related something easy to remember for example the shirt number of your favourite player and you have a crack proof password YCTAODNT66 If a poem or a saying still seems too popular think of a notable phrase from your life that only you would know in my case for example an old professor used to say IF YOU DON T STUDY YOU LL ALL END UP DITCH DIGGERS or IYDSYAEUDD an excellent base for a strong password ud
2. number of environments to two 1 GB on all KeySecurePC models and is normally less sensitive and or are shared with other people nt users must enter the 1st co workers In order to access this environm al which you can download from the download section on our website er you have chosen y personal devic ited storage capacity s that are considered can hav ng a high We all know that a persona may be operated by differen y time you turn on the computer you are asked to indicate which user environment you want to access and a with your wife eve individual compute KeySecurePC bei The first environment has a lim d store fil or trusted used to manage an like friends family password see the User Manu www keysecurepc com The second environment has a far greater storage capacity approximately 3 to 252 GB depending on the KeySecurePC model chosen and was designed for the personal and exclusive use of the KeySecurePC owner In order to access this environment users must type the 2nd password see User N B For security reasons the existence of the dual environment is not visible to anyone and access he two environments is governed solely by password This means that when you run KeySecurePC on your computer there is NO screen providing a choice Manual between two different environments or users as is common on PCs All that appears is a simple screen wi
3. KEYSECUREPC GENERAL OPERATING PRINCIPLES IMPORTANT BEFORE STARTING KEYSECUREPC ON YOUR COMPUTER PLEASE READ THIS MANUAL CAREFULLY MORE PARTICULARLY PLEASE READ THE SECTIONS RELATED TO THE 3 REQUIRED PASSWORDS THE 2 WORK ENVIRONMENTS WIPING DELIBERATE DATA DELETION PLEASE READ CAREFULLY THESE SECTIONS CONTAIN ESSENTIAL INFORMATION FOR THE PROPER USE OF KEYSECUREPC AND THE SAFETY OF YOUR DATA EMA060511_UK INDEX GENERAL KEYSECUREPC OPERATING PRINCIPLES THE DUAL KEYSECUREPC ENVIRONMENT THE 3 PASSWORDS 3 1 Data theft and brute force programmes why it is important to carefully choose and protect your passwords 3 2 How to create a secure password that is easy to remember 3 3 KeySecurePC passwords it is important to choose them carefully because they cannot be changed EMA060511_UK GENERAL KEYSECUREPC OPERATING m s general operating principles ical thereby allowing even a novice to understand Please visit our website www keysecurepc com if ure ive or external memory storage ts own internal operating system programmes and PRINCIPLES These initial pages describe the KeySecurePC syst This description is meant to be brief and non techn the general operating principles of KeySecurePC you would like information of a more technical na KeySecurePC is not an ordinary encrypted USB d Unlike standard encrypted USB drives it contains i space for storing data ter KeySecurePC It work
4. e inversion of words If it is easy for you to remember the words HOUSE d jumble them houseboat becomes OHTUEOSBA a random sequence of more secure by adding a number and repeating it the same number of times was five you should repeat it five times perhaps with an dividing the password becomes OHTUEOSBA 55555 easy for you to remember bu se to reconstruct bsites on the internet that suggest ways to build a secure password visit them o find other ideas and easily create your three KeySecurePC passwords Remember that it is importan spend a few extra minutes on this activity now because once you choose your KeySecurePC Other methods used inc and BOAT combine an elters that can be mad as the number itself if i 60015 and number Your impossible for anyone e There are also many w passwords for security reasons they cannot be changed without re initializing the entire system After choosing your passwords remember that their security depends on proper protection Remember e never tell anyone your password e never type the password in front of others e never write passwords on paper e n your PC never save them o Ifyou really wantto keep track of your password becreative ifyour password is OHTUEOSBA 55555 a boat and a player with the number 5 keep photos of a house EMA060511_UK SS The KeySecurePC passwords it is importan
5. etters of the keyboard choose passwords that are simple or related to our lives because they are easier to remember close to you Force programmes are based on the programme s ability to gain access to the system by ent housands of different passwords every minute until it guesses the right one The first words that these programs try to use are those most common or otherwise present in dictionary such as first names or simple words like DOLL or CAR Once all dictionary words such as MALETHVS The possible combinations it can try are endless and one can run a brute force can ters programme for a very long time In order to make it more difficult for a brute force programme we add numbers from the keyboard and create combinations such as M4N2K3LKJUIO645 Finally le and numbers can be combined with special characters like or or even punctuation characters If you add up the letters numbers and special characters on our keyboard you will see that there is a very high number of possible combinations so if you create a password over 8 characters long with letters numbers and special characters arranged randomly guessing your password will be very ina ing T unlikely from a statistical point of view even a brute force programme would have a difficult time So the security of a password depends on both its length and complexity or the combination random and unpredictable sequence of
6. s very simply When connected to a compu e replaces the hard drive operating system and programmes of the host computer e redirects all data management to itself using its internal operating system and programmes By redirecting data management to itself KeySecurePC prevents the computer from creating and saving data of any type including temporary files links histories or any trace of your activities which would otherwise remain hidden for years in your PC s hard disk operating system and programmes and could be recovered by anyone at any time using data recovery software No traditional system offers such complete security for the computer on which you work e no encrypted USB drive Q no data protection software no encrypted hardware All these systems have the same weakness when they hide or delete your files they only hide or delete the visible copies of the files you work on and do not remove the socalled temporary files links and histories or copies of your data that the computer continuously and automatically creates and saves on the hard disk in the operating system and in programmes Temporary files contrary to their name are saved for years by your computer They are ghost files that remain hidden for years in the memory of your computer keeping track of your Internet surfing and the files that you manage or download Recovering this data is very easy All that is needed is a data recovery programme
7. t to choose them carefully because they cannot be changed You must enter three different passwords into the system to use your KeySecurePC e The first password allows access to the system s first environment e The second password allows access to the system s second environment e The third password starts the wiping process the deliberate destruction of data The three passwords are an integral part of KeySecurePC s security technology Once entered into the system they are encrypted and influence the AES256 encryption algorithm making it even more secure For this reason it is important to choose them carefully following the suggestions found in the previous sections It is also IMPORTANT TO REMEMBER THAT THE THREE PASSWORDS CAN NOT BE CHANGED WITHOUT RE INITIALIZING THE ENTIRE SYSTEM The reason for this is simple As the passwords directly affect the encryption any change could open a security vulnerability on the device making it susceptible to attack Reinitialization of the system involves the loss of all data stored on your KeySecurePC Anyone wishing to change their passwords can but must first move all data to a backup device for xample our KeySecurePC Backup and then re copy it to the re initialized system EMA060511_UK
8. th password prompt like the one you see below You decide whether to type the first second or third password thus accessing the first or second environment or with the third password wiping data e premere INVIO Inserire password C EMA060511_UK THE 3 PASSWORDS Sm Data theft and brute force programmes why it is important to carefully choose and protect your passwords No matter how obvious it may sound the easiest way to enter a wellprotected system is knowing the password So for a data thief it is much simpler steal a password than try to crack a secure system in fact most cases of data theft occur further to discovery of a confidential password This simple concern is even more important considering that most data thefts are carried out by those closest us family friends colleagues and who know us best in other words people who are mor ikely to know our password perhaps by simply guessing it This can happen because many of us For xample some choose the name of their dog FIDO or their children ANTHONY or their date of birth NewYork0703 1968 These passwords are easy to remember but also easy to guess for those Furthermore the systems most commonly used by hackers to discover your password so called Brute ring th are tied the program tries random combinations of letters created using the 26 l
9. to recover and generate an exact copy of what you thought you had deleted forever That is why it is no use e deleting files e moving them to an external memory e saving them on an encrypted USB drive e formatting your hard drive even over and over again All these actions remove conceal or delete the visible copy of files but do not remove temporary files histories or links which remain hidden for years on the hard disk in the operating system and in programmes on your computer ready to be retrieved by a data recovery program EMA060511_UK WITH KEYSECUREPC YOU CAN USE YOUR PC AND NO TRACE OF YOUR WORK SESSION REMAINS ON YOUR COMPUTER ySecurePC where it is protected by full AES256 encryption Encryption Standard and is an encryption algorithm that has never been with the computing power of current computers No trace remains of your web history of files used or downloaded of emails exchanged f video music pictures 0 All your data is internally saved on 6 AES stands for Advanced broken and is considered unbreakabl Not surprisingly AES256 encryption ensures a safety level equal to that presently used by th intelligence agencies of many countries to protect their Top Secret documents In considering the level of security offered by KeySecurePC bear in mind that KeySecurePC does es as encrypted USB drives often do but actually encr
10. ypts THE ENTIRE ly all programmes and every piece of data therein single file unless they know your password they would have impossible given the level of security presently guaranteed by in the world with builtin Wiping an option for the deliberate many professionals and entrepreneurs appreciate having in not encrypt individual f OPERATING SYSTEM and consequen s impossible for anyone to access a override the entire system which is AES256 encryption ySecurePC is one of the few systems d irreversible deletion of data s feature may seem excessive but It i ful K n Q Thi reme cases the option of destroying data rather than letting it fall into the wrong hands ex With regard to this aspect it is important to remember that Wiping involves repeated overwriting of random and illegible data on the same sectors containing the original files Just minutes after implementation the KeySecurePC Wiping function overwrites every single piece of data stored therein and thereby increases the protection and security offered by KeySecurePC EMAO605 1 6 THE DUAL KEYSECUREPC ENVIRONMENT computer provides several work environments or in other words that it users with different passwords If for example you share your computer one the computer asks for the password Each a very large number of users environments imits the

Download Pdf Manuals

image

Related Search

Related Contents

「ミニマスター」取扱説明書  Intelligent GSM&PSTN Auto-Dial Alarm System  LENA SERVICE A5 _rev 3_enric 04-2003    Oxiperm C Service Manual  Outils et documentation pour l`installation  Manuel d`utilisation  StarTech.com 8-Port Desktop 10/100 Mbps Fast Ethernet Switch  

Copyright © All rights reserved.
Failed to retrieve file