{"id":3933,"date":"2012-03-01T13:55:39","date_gmt":"2012-03-01T18:55:39","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=3933"},"modified":"2012-03-01T13:58:03","modified_gmt":"2012-03-01T18:58:03","slug":"3933","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/3933\/","title":{"rendered":"You Can Hide From Prying Eyes &#8211; With This Cloudeight Freeware Pick"},"content":{"rendered":"<p>EB has tons of files she\u00a0doesn&#8217;t\u00a0want me to see. I don\u2019t know what they are, but I sure have some good guesses. Anyway, she\u2019s always looking for a why to keep her files hidden.\u00a0Doesn&#8217;t\u00a0she realize that by being so secretive she only raises my suspicions? I guess not, because the years roll by she\u2019s being secretly storing thousands of \u201cthings\u201d that she keeps hidden from me. You know what I think? I think she\u2019s storing the goods she\u2019s got on me in case I\u2019m ever foolish enough to run for public office. I can see it now \u2013 \u201cThundercloud sleeps with stuff bunny rabbit\u201d. Yes knows things like this. She knows I like ketchup on chocolate and other stuff I don\u2019t want anyone to know. She knows more juicy stuff too, but you know this is a family publication.<\/p>\n<p>Anyway, most of you don\u2019t know this, but I\u2019m a songwriter too. And at least with songs, I don\u2019t have to worry about grammarians sending me nasty emails ripping apart my sloppy grammar. When I write songs, I\u2019m entitled to use something known as poetic license. And I love to use it \u2013 a lot!<\/p>\n<p>So I wrote this song for EB \u2013 because she keeps hiding stuff from me.<\/p>\n<p><strong>Prying Eyes<br \/>\n<\/strong>(sing to the tune of the Eagles\u2019 \u201cLyin\u2019 Eyes\u201d)<\/p>\n<p><em>Girls who live in Michigan are sneaky<br \/>\nThey cover up their misdeeds in some files<br \/>\nThey run around and hide their dirty secrets<br \/>\nAnd then give you all those toothy smiles.<\/em><\/p>\n<p><em>All those folders hidden behind her desktop<br \/>\nLabeled with nice names like church and ski<br \/>\nBut she can\u2019t fool this guy who&#8217;s from Ohio<br \/>\nNo Michigander can fool me &#8211; no siree!<\/em><span style=\"font-style: italic;\"> <\/span><\/p>\n<p><em>She can\u2019t hide, from my prying eyes.<br \/>\nAnd her smile is a thin disguise.<br \/>\nI thought by now, she\u2019d realize<br \/>\nShe ain\u2019t gonna hide a thing from my prying eyes.<br \/>\n<\/em><br \/>\nAs you can see, by now, I\u2019m quite talented. Next week, as a treat, I\u2019m going to sing that song for all of you, while strumming my guitar. It will be a newsletter for you to remember, and one EB will want to forget.<\/p>\n<p>Anyway, I\u2019ve rambled long enough. And the smart ones among you have already skipped all of above, and are looking for the meat of this article. You still haven\u2019t found it have you? OK I get the hint.<\/p>\n<p>This Cloudeight\u00a0<a title=\"freeware pick\" href=\"http:\/\/thundercloud.net\/infoave\/new\/2011\/02\/24\/freeware-pick\/\">freeware pick<\/a> can help you hide your files from prying eyes. If you&#8217;re a TSA body-prober or run the body scanning machines, you\u2019ll really love this Cloudeight <a title=\"freeware pick\" href=\"http:\/\/thundercloud.net\/infoave\/new\/2011\/02\/24\/freeware-pick\/\">freeware pick<\/a>. It will help you keep all those nasty purloined photos of odd-shaped people &#8212; the ones you groped at airports all over the country. If you\u2019re not a TSA agent (and hopefully, most of your aren\u2019t) you\u2019ll appreciate encrypting all your sensitive files. I like it because I can hide pictures of myself when I was 20 from myself. That way I I don\u2019t have to be reminded of how old and wrinkly\u00a0I&#8217;ve\u00a0become. But hey, my mind is still as spunky as a 20-something&#8217;s.<\/p>\n<p>Today\u2019s\u00a0<a title=\"freeware pick\" href=\"http:\/\/thundercloud.net\/infoave\/new\/2011\/02\/24\/freeware-pick\/\">freeware pick<\/a> (starting over again, trying to stay on track here) is a free program that can encrypt a folder, a USB flash drive, or a whole disk partition so only you can see the contents of those folders, drives or partitions \u2013 as long as you remember your password that is. Why would you want to encrypt anything? I don\u2019t know. I give up? Why? Why? I don\u2019t know\u2026but you know. You might have bank statements from a secret bank account you don\u2019t want your spouse to see. Maybe you were saving up against the advent of a quick getaway? Maybe your obsessed with Mickey Mouse (or worse, Minnie Mouse) and you\u2019d be embarrassed if anyone saw your collection of 2 GB worth of Mickey Mouse photos \u2013 including 4 autographed photos of you and Mickey standing in front of the Magic Kingdom. How the heck do I know why you\u2019d want to encrypt your files? That\u2019s between you and your files, not between you and me.<\/p>\n<p>I\u2019m done. Now I\u2019m going to bring in the program\u2019s developer to give you some real information about his wonderful and increasingly popular freeware program. And without a another word:<\/p>\n<p>\u201cTrueCrypt is a software system for establishing and maintaining an on the fly encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password\/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).<\/p>\n<p>Files can be copied to and from a mounted TrueCrypt volume just like they are copied to\/from any normal disk (such as\u00a0simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory\/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted\/decrypted must be stored in RAM before it can be encrypted\/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.<\/p>\n<p>Let\u2019s suppose that there is an .avi video file stored on a TrueCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and\/or keyfile) and mounts (opens) the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type \u2013 typically a media player. The media player then begins loading a small initial part of the video file from the TrueCrypt-encrypted volume to RAM (memory) in order to play it. While the part is being loaded, TrueCrypt is automatically decrypting it (in RAM). The decrypted part of the video (stored in RAM) is then played by the media player. While this part is being played, the media player begins loading next small part of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption\/decryption and it works for all file types, not only for video files.<\/p>\n<p>Note that TrueCrypt never saves any decrypted data to a disk \u2013 it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and\/or keyfile)\u2026.\u201d<\/p>\n<p>If that sounds like something you\u2019ve been longing for or pining after, then you\u2019ll be eternally grateful for\u00a0<a rel=\"nofollow\" href=\"http:\/\/www.truecrypt.org\/\" target=\"_blank\">this week\u2019s freeware pick of the week \u201cTrueCrypt\u201d<\/a>. <a href=\"http:\/\/www.truecrypt.org\/\"><strong>You can learn a lot more and\/or download TrueCrypt from the TrueCrypt web site<\/strong><\/a><span style=\"text-decoration: underline;\"><strong>.<\/strong><\/span><\/p>\n<p>Facts for the curious:<\/p>\n<p><strong><a rel=\"nofollow\" href=\"http:\/\/www.truecrypt.org\/\" target=\"_blank\">TrueCrypt<\/a><br \/>\n<\/strong>What is it?\u00a0 A heavy-duty, free file encryption tool<br \/>\nOperating Systems: Windows XP, Windows Vista, Windows 7 32bit and 64bit<br \/>\nDownload info:\u00a0 3.3MB Windows Executable (EXE)<\/p>\n<p><span style=\"font-style: italic;\">NOTE: We are not responsible for your use of this program. If you encrypt important files and forget your password, you\u2019re out of luck. Really. Use this program with care and keep you password burned in your brain. Or write it down on a piece of paper and stick it your sock drawer. If you are going to write down\u00a0your password, don\u2019t write \u201cPassword for TrueCrypt\u201d on the paper. Just write the password and put it somewhere safe. If anyone finds it, they won\u2019t have any clue what Abv83e66M12671p is. If someone asks, just tell them it\u2019s your car\u2019s registration number. See? I learned that bit of chicanery from the best, EB herself.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>EB has tons of files she\u00a0doesn&#8217;t\u00a0want me to see. I don\u2019t know what they are, but I sure have some good guesses. Anyway, she\u2019s always looking for a why to keep her files hidden.\u00a0Doesn&#8217;t\u00a0she realize that by being so secretive she only raises my suspicions? I guess not, because the years roll by she\u2019s being secretly storing thousands\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/3933\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/3933"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=3933"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/3933\/revisions"}],"predecessor-version":[{"id":3938,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/3933\/revisions\/3938"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=3933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=3933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=3933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}