Home / How To's / How To Hide Your Private Data And Personal Information?

How To Hide Your Private Data And Personal Information?

How To Hide Your Private Data?

 

How To Hide Your Private Data And Personal Information?
How To Hide Your Private Data And Personal Information?

How To Hide Your Private Data And Personal Information. This is one of the most concerned questions for people now- a- days. Most people, unfortunately, can’t do much with a computer, except type a letter on word, or draw on ms paint – in a nutshell, their technical knowledge in respects to computers is very limited.  Therefore, if you are one of these people, this article may be of little or no use to you – although this statement sound harshly blunt, my intention is to prevent you from wasting your own time – it’s therefore advisable that you first learn the basics of personal computer operation and then dive into this article. On the other hand, if you are like the average computer user – possessing basic knowledge – please keep on reading.  Like most users, the more you know about computers, the more you are aware of their capabilities, as today the entire world has shifted towards electronic data storage – no one uses actual paper files anymore – though, to some extent, I could be wrong. Consequently, data of all types are now stored on personal computers. However, not all computers are strictly personal, in fact, from time-to-time – you may have had guests over which tried to access your personal computer with or without your consent, or perhaps you have other family members who have regular access to your PC, in such case you may be looking into ways on how to hide your private data.  Thus, hiding your data can be simple and complicated depending on how you hide your digital information. The following set of instructions will describe some techniques you can use to hide your data.

Make a hole in the wall – A Fool Proof Approach To Hide Your Data :

Don’t take this subtitle literally – I am not asking you to actually drill or punch a hole in your wall. This technique simply teaches you how to fool others into thinking that you have nothing to hide. For this trick, all you have to do is create an empty folder and rename it and relocate it somewhere uninteresting / inconspicuous. My personal favorite is to build a hole into C:\WINDOWS\system32 and name the file “jtl” “eft ““pat” etc. Surely, no one will actually go in that deep just to look for your secret folder. In addition, if someone is determined to seek out your secret file – they will surely be discouraged once they start exploring C:\Windows, as they will encounter similarly labeled files such as “inf” “tapi” “csc” etc. So, making a hole in the wall works quite well for most users – just make sure to rename your file inside the folder to something inconspicuous also.

File Masking :

If you are looking into another method on how to hide your data, then file masking is a sure-fire way to fool the non tech-savvy snooper into thinking you don’t have anything to hide. In order to mask your file, all you have to do is simply change the extension path for the file you are attempting to protect. For example, if you have private images to hide, you can change their extension. For example, simply right-click on the image, now you should see “opens with:”option, next to it should be the button “change”. Click that button and choose notepad as the default program which opens the file. Consequently, when someone opens that file, all they would see is a bunch meaningless scribble that makes no sense at all. However, make sure to rename the file, otherwise someone can figure that you changed the file extension – considering the fact that you didn’t bother to change the file name.

Encrypt it:

If you are on lookout to hide your data in a more advanced manner, keep in mind that the only fool-proof method for hiding your digital information is to secure it with encryption software. All other methods have the tendency to fail, and are no way as reliable as data encryption software. In addition, choosing the correct encryption software also matters – as such software may have a weak or strong encryption algorithm. Thus, it is advisable that you thoroughly research data encryption software before purchasing. Read reviews and expert opinions and then decide rather than making a hasty purchase. Moving on, you can also utilize cloud servers to hide your data, depending on how large your data is, it may take a while for it to be uploaded on the cloud server, plus cloud storage doesn’t come cheap. If you are looking to backup your encrypted data on your PC to a cloud server, folder lock is the only one that has both capabilities built into its interface.

About Mohammad Irfan Ali

Mohammad Irfan Ali
Mohammad Irfan is the Lead Content Strategist at NewSoftwares. His main interest is in web related threats, phishing scams and social networking hoaxes. He is the admin of Talk Security and regulates the publication of all blogposts.

Check Also

Everything-you-need-to-know-about-data-leaks-in-2017

Everything you need to know about data leaks in 2017

With the recent hacking of Yahoo servers, Information security experts are questioning yahoo’s cyber security ...

Leave a Reply

%d bloggers like this: