The Oasis for
Rational Conservatives

The Amazon’s Pantanal
Serengeti Birthing Safari
Wheeler Expeditions
Member Discussions
Article Archives
L i k e U s ! ! !
TTP Merchandise

FIGHTING THE COOKIE MONSTER

Download PDF

I discovered a free program that fills an important security need. Consequently, the column I promised on a second backup program will have to wait one week.

There’s something going on with cookies. I’m not sure what, but I guarantee you – somebody’s up to no good.

No, I don’t mean computer cookies – although that’s another story. I mean the cookies you get in the store on the bakery; they’re getting bigger. Am I the only one noticing this? I haven’t seen anything about it in the media – it’s as if there is an organized effort to completely ignore this phenomenon. We all know how the cookie industry has handled its opponents in the past, and I have no desire or intention of ending up in a steaming batch of shortbread, if you know what I mean.

I’ve taken what I consider to be reasonable steps to protect myself. I have all my findings and documents on a PC – several, in fact, with backup copies of the hard drives in safe keeping, with instructions to my attorneys to release the information if anything happens to me.

But my preferred option would be not become a martyr to the cookie industry; I’d much rather live to fight other battles.

So I’ve begun protecting my files with a great application I’ve discovered, one that will enable you to keep any secret exactly that – a secret, one that no prying eyes will be able to get at.

Keeping my notes, charts, databases, development projects and contacts to myself is essential. You never know who is watching – whether on a network or over the Internet.

With all the sophisticated search tools today, it’s a simple task for a programmer to write a script to search for data, whether text or otherwise. There is one sure way to keep prying eyes off your files, and that’s to encrypt them, with the strongest most invulnerable encryption possible.

You can do it for free. I recommend you download and install AxCrypt, a program based on the strongest encryption model available – AES-128 File Encryption and Compression).

Download AxCrypt from http://axcrypt.sourceforge.net, for all Windows from 95 on.

wizard_0610051.jpg

Click where the cursor shows on the screenshot. You’ll see four download screens in a row. Of course, you can choose a different folder as the target.

wizard_0610052.jpg

wizard_0610053.jpg

wizard_0610055.jpg

The download with a broadband connection only takes several seconds. Navigate to the target folder and double click the setup icon.

You’ll go through a typical installation process, ending with the screen:

wizard_0610057.jpg

It’s important you read the Readme file, so don’t uncheck it before clicking ‘Finish’.

wizard_0610058.jpg

If you click ‘user manual’ it’ll appear online. Instead, you’ll want to download the manual to refer to at your leisure. You may do that by right-clicking the user manual, which will bring up a context menu.

wizard_0610059.jpg

Select ‘Save Target As�

wizard_06100510.jpg

And save it to the same folder you saved axcrypt to.

To install AxCrypt, simply double-click the setup program in the folder to which you downloaded it.

wizard_0610056.jpg

You’ll begin a typical installation process, whose final page is:

wizard_0610057.jpg

Once installed, AxCrypt integrates into Windows Explorer. I suggest you first try it with a copy of a folder, in case you make a mistake. In my case I encrypted c:\temp. Select the folder or file and right click.

wizard_06100512.jpg

Next you get two choices of how to encrypt the file or folder.

wizard_06100513.jpg

I used a short passphrase here, just for a test. In practice you should use a long, complicated passphrase, with small letters, capital letters and numbers. Be sure not to forget it. There is no back door. If you forget the passphrase, you are out of luck.

Write it down, gtve it to one or two trusted friends or relatives, and that’s that. Since it is very unlikely any one of us can remember many long passphrases, I chose to use this as a default. The one I’m going to use in the future is something I’ll never forget.

The alternative is to let AxCrypt generate a unique key-file for each encryption. In my mind, it would be a nightmare keeping track of folders, files and key-files.

I suggest you don’t check the box to remember the passphrase for decryption. Anyone can automatically decrypt your folder if you check the box.

Let’s look inside the folder after it has been encrypted.

wizard_06100514.jpg

You can see it’s an AxCrypt file.

Now we’ll reverse the process and decrypt c:\temp

And behold. If we open c:\temp, we have the original file.

There’s a lot about AxCrypt I don’t yet know. And there are programs such as CookieCop that allows you to approve or disallow each cookie. However, it’s terrible intrusive and slows down your computing, as well as itself slowing down your computer.

Last week I got an email asking me if Norton Ghost performs incremental backups. An incremental backup is just appending the changes since the previous backup. Yes it does. It’s a real time saver and I should have mentioned it.

Spysweeper 4.0 is out. It got rave reviews. Version 4.0 is much faster, gives more information, and reviews say it catches even more intruders.

Dennis Turner