If they do manage to find the DMGs, hopefully by then I’m on my way and seeking legal help. ![]() ![]() As they begin to snoop around, image the drive, run forensics, etc., they should feel they have the keys to the kingdom. If I must hand over my admin password, the person now on the desktop should still have a difficult time learning these disk images exist and a password is required to open them.Also very important, DMGs containing sensitives files are only mounted on an as-needed basis. All my confidential files are typically stored this way, in a series of encrypted DMGs with separate passwords. Hidden in some obscure directory on the local machine, a network storage device, a USB drive, whatever. A great thing about DMGs is that they can be stored anywhere.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |