Tip:
Highlight text to annotate it
X
Computer File Encryption : Part 1 Jeff Hostetler, Host & Producer
Chris Hartley, Co-Host & Writer Brittany Cradic, Writer & Social Media Specialist
Scott Schulte, Writer & Developer
Jeff : Welcome back to The Communicator! Iím JeffÖ
Chris : Iím Chris. Jeff : Öand today weíre going to talk about
network encryption. One of the things that weíve talked about in our earlier episode
of The Communicator was on password protection which is always great for securing things
on the network as well as online intrusion especially if someone else has access to your
computer or access to your accounts. You want to make sure that you got this password-protected
and I believe when we had Brittany on, we also talked about pass phrases ñ being about
to mix things in with special characters butÖ..what weíre going to talk about is multiple layers
of protection. Now what weíre going to do, weíre going to be showing you guys a video
on password hacking. Now this particular individual has access to a computer, USB port. Weíre
not going to show you how itís done, weíre going to show you how quick it can be done
and Chris what do you want to add to that? Chris : Well just the importance of why that
can be a better step for your further step for protection. While passwords and pass phrases
are absolutely essential absolutely needed. If youíre just an average-level PC user,
youíre checking your mail, youíve got some account stuff like that, itís in your home
and not too many people have access to your PC thatís probably perfectly fine. But if
youíre a power user and you have a lot accounting information in there, very critical information
that you want to make sure is protected and other people have access to your PC, physical
access in certain area. Say you lived in a dorm and you have a roommate something like
that then I would probably want to look at cause most of the time you think of business
level, you think encryption, protect business but nowadays itís personal information thatís
easier to guess. They go for the easy stuff. In a situation, this is that is when this
would be a required step that youíd want to pursue.
Jeff : Well we certainly done condone doing any style of hacking whatsoever but we did
want to show you the severity behind leaving a computer without multiple levels of protection.
Chris : Ö and how quickly it can be accessed. Jeff : Thatís right. So check out this video!
Video : Ok for this demonstration Iím going ahead to create a virtual machine with a basic
Windows XP installation. Iím going ahead to create an account password of 123456789.
I want to check and make sure that logs us in. Ok letís say just for the sake of argument
here, I didnít know what that password was. Iím going to go ahead and get my virtual
machine here to boot off the CD drive. Now Iím going to go to the process of wiping
the windows password. Ok Iíve just successfully cleared the password and now just for the
sake of argument in case an account was locked on the computer, I would go ahead and unlock
the account. Ok thatís done. Iím going to go ahead and write the changes. Ok and now
all I need to do is reboot the virtual machine. And there we are logged in to the administrator
account. No password. Now mind you this will work on any Windows-based system, servers,
workstations and it will work for any local account. This is only one of maybe fifty different
ways to do this. I am by no means a hacker. The tools I used are freely available online.
Just to give you one demonstration as to why file encryption is would be necessary for
you. Thank you. Jeff : What do you think about that?
Chris : Wow! That was fast! Jeff : Well you can certainly see that multiple
levels of security are very important and in future episodes of The Communicator that
are coming up especially this next one weíre going to do, weíre going to talk about encryption.
How youíre actually able to encrypt your system on the network, what your options are
as far as thatís concerned. So? Chris : So weíre going to get this done.
Jeff : Yeah it kind of leaves you breathless in the end.
Chris : The fact that you think youíre completely secure and thereís something that completely
bypass that in that short of a time and gain complete access to your system, I really donít
know what to say. Jeff : I mean because on networks you canít
tell when you have disgruntled employees, when you have people that want to malicious
things on the network. You never know and for an organization to lose very critical
data, financial data would just be completely mind-blowing.
Chris : Absolutely! Jeff : So check out the next part two of this
video that weíll be showing shortly. Chris : Thank you.