Friday, June 6, 2014
On 10:50 PM by Unknown No comments
Encryption is a rare necessity these days. It's important to safeguard your device (mobile/tablet) from prying eyes in case it is misplaced/stolen. Today a lot of our activities (financial, to say the least) depend upon our mobiles and tablets, therefore any negligence on the part of the user might cost a lot!
How does it work?
There exist a plethora of encryption formulas. Consider for instance the elementary encryption formula where every letter of a word is replaced with the letter that follows it in the alphabetical order. This is pretty much a basic form of encryption. It must be remembered that encryption algorithms used in personal computing today tend to be really complex, so much so that even the fastest supercomputers can't break in to them.
Do you really need it?
Encryption isn't such a big deal for casual users, however if you're one of those who keep personal or financial information stored on your mobiles, well, it's time to act now. In case your phone is misplaced/stolen miscreants having a decent know how of the tricks involved could easily break into your device and steal valuable information that could be used against you in 'n' number of ways. Here's where encryption comes into play!
How do you do it?
Here's how you do it:
-The primary requisite to encryting your Android device is to have a fully charged battery. Also, it will work when your phone is connected to the charger. So, make sure you follow these to begin with.
-PIN/Password protect your device's lock screen and make sure you remember your PIN/password at all times. Once you're sone with the encryption process you'll need to unlock your screen with the same.
-Go to Security menu under Settings to look for the encryption menu. The same will depend upon the type of phone you have and the Android version it supports.
-Encryption menu > Encrypt Phone/Tablet.
-This will initiate a warning window that states you will lose some/all of your data in case the encryption process is interrupted.
-Select Encrypt Phone/Tablet . You'll be prompted to provide your PIN/password.
-Once the process is complete, your Andrpid device will reboot and start the encryption process.
How does it work?
There exist a plethora of encryption formulas. Consider for instance the elementary encryption formula where every letter of a word is replaced with the letter that follows it in the alphabetical order. This is pretty much a basic form of encryption. It must be remembered that encryption algorithms used in personal computing today tend to be really complex, so much so that even the fastest supercomputers can't break in to them.
Do you really need it?
Encryption isn't such a big deal for casual users, however if you're one of those who keep personal or financial information stored on your mobiles, well, it's time to act now. In case your phone is misplaced/stolen miscreants having a decent know how of the tricks involved could easily break into your device and steal valuable information that could be used against you in 'n' number of ways. Here's where encryption comes into play!
How do you do it?
Here's how you do it:
-The primary requisite to encryting your Android device is to have a fully charged battery. Also, it will work when your phone is connected to the charger. So, make sure you follow these to begin with.
-PIN/Password protect your device's lock screen and make sure you remember your PIN/password at all times. Once you're sone with the encryption process you'll need to unlock your screen with the same.
-Go to Security menu under Settings to look for the encryption menu. The same will depend upon the type of phone you have and the Android version it supports.
-Encryption menu > Encrypt Phone/Tablet.
-This will initiate a warning window that states you will lose some/all of your data in case the encryption process is interrupted.
-Select Encrypt Phone/Tablet . You'll be prompted to provide your PIN/password.
-Once the process is complete, your Andrpid device will reboot and start the encryption process.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
The importance of encryption tools lies in one simple fact. Prevention is better than cure. File encryption is of paramount importance...
-
This is the age of connectivity. We randomly switch from smartphone to tablet to computer many times every single day, so much so that some...
-
Looking for a free ebooks on some topic? Your search ends here with these websites.. When looking for free ebooks, there are many reso...
-
Hi friends some of the viewers had messaged me to give hacking books so that they can learn every thing offline.So here i am providing with...
-
The following keyloggers are handy tools for hacking/surveillance. Keylogger is basically a surveillance software that has the capabi...
-
Carrying around an actual computer is now possible since we have USB sticks that you can use to store all the basic utilities you need and ...
-
Hacking tools are available aplenty. Top hackers in the world today recommend hacking tools made for Linux and Windows operating systems. I...
-
Did you know you could use HTML to hack a website? Here's how to do it! Yes folks, you can use HTML to hack a website....
-
While a great deal of time and effort is invested in designing and developing a software, it only takes a few seconds to bring it down on...
-
Whether it is the iPhone, iPad or Android-based systems, building an app quickly is an imperative for developers. Developers often ...
Copy Rights 2014 Himanshu_Teotia. Powered by Blogger.
0 comments:
Post a Comment