VeraCrypt is an open source encryption software that allows you to create encrypted volume or drive on Windows, Mac and Linux. It is based on TrueCrypt and it solves many vulnerabilities and security issues found in TrueCrypt. VeraCrypt uses highly secure AES, Serpent and Twofish encryption ciphers and their combinations to encrypt your data. You […]
Category: Information Security
Anti-Spam(22)
Anti-Virus(6)
BitLocker(9)
Data Encryption(10)
SSL Certificate(3)
Two-Factor Authentication (2FA)(23)
User Privilege(2)
What is VeraCrypt?
How to use Disk Utility to encrypt virtual disk (disk image) in Mac OS?
How to perform FileVault 2 whole drive encryption in Mac OS?
What is FileVault 2 in Mac OS?
FileVault 2 is built into the OS X operating system. It is an integral security feature for Mac that allows you to encrypt the contents of your whole drive. It uses full disk, XTS-AES 128 encryption to help keep your data secure. FileVault 2 requires OS X Lion or later, and OS X Recovery installed […]
What is BitLocker Drive Encryption?
BitLocker is a built-in feature of Windows that allows you to easily encrypt entire disk drives or removable devices. When enabled, it encrypts the data on the computer or removable device and restricts access using a password or recovery key. It helps prevent the theft of data on that disk if the computer or removable […]
How to handling infected files in ESET?
Depending on the type of threat, your ESET program might clean, block, or quarantine one or multiple files, block access to a website, make changes to online communication settings. See below for a ‘Threat found’ notifications that you might see from your ESET product: This type of notification is displayed when your ESET product detects a […]
How to perform on-demand scanning in ESET?
ESET provides a “Custom scan” to perform on-demand scanning. To trigger it, please try the following two methods: Method One: “Whole File System Scanning” Open your Windows ESET product and follow the instructions below. (P.S. It will take quite a long time to complete the whole system scanning.) Method Two: “Selected File Scanning” You can right […]
What I need to do before and after changing my user account password?
Your password may be stored in different locations or devices (i.e. Mobile devices WI-FI password). Before changing the password, we recommend you to identify the places where you may have your account and password stored. After changing the password, you should update the new password in your identified locations. Some common locations where are stored your […]
What can I do if I forgot my user ID?
A students user ID consists of the first 7 characters of the Student’s ID. (e.g. ac12345). A staff user ID is a 5 to 15 English character/digit string starting with an English character. If you still forget your user ID, please contact ICTO Help Desk for further information.