Because there's more to life than one's self, status or material things.
(for those dealing with real-life issues and who enjoy participating in stimulating discussions on issues and ideas, crave the thrill of geographic, mental and spiritual exploration and discovery and value local and global community, belonging and old and new friendships)
Are popularity, accomplishment, recognition, respect, wealth, power, fame, even religion not cutting it? Have you tried all the world’s got to offer and in doing so come up empty and unsatisfied? Feel like there's nowhere to turn? How to make your life explode with relevance.
Was Jesus just a man who married Mary Magdalene? Has the church been hiding information from us for years about Jesus? Don't decide too quickly. Examine the evidence first.
Think conclusive cases can't be made for the Bible and Jesus' claim to be the God/Man Messiah? You'd be surprised. The overwhelming mountain of factual, historical evidence is too compelling, too convincing to be ignored.
If you want to keep using Windows, I strongly recommend saving your files with the fourth option below.
(from next to least secure to most secure)
in encrypted folders (next to least secure)(Microsoft recommends never encrypting individual files - least secure, and encrypting the folders instead. However, you may consider making an exception when sending them to someone else. After sending it, securely erase the file, or encrypt the folder it's in.)
on an encrypted partition (more secure)
on an encrypted hard disk drive (even more secure, especially on laptops - see note below)
WARNING: Using Windows' EFS (Encrypted File System) is not recommended, especially with Windows 2000. 1)If Windows gets corrupted or you reinstall it, you'll loose your data by loosing access to them. 2)It's not secure from physical access to your computer. 3)Someone with physical access can still see file names and alter folder settings. 4)Even if the EFS keys are exported, they remain on your hard drive. skip
If in spite of those risks you want to use EFS, and have Windows 2000, XP Pro or Server 2003 and a floppy drive, I strongly recommend using EFS in Mode 3 (the most secure mode) for basic encryption and saving your startup key (also called the SysKey) on an encrypted removable medium. Here's how.
on encrypted removable media, and your encryption key on a separate encrypted removable medium, and encrypting your whole hard disk drive (most secure, especially on laptops - see note below)
Note: ''Normally, after you power on a computer and it goes through its memory test, the boot loader will load the OS. When you install drive encryption software [and encrypt the whole hard disk drive], it modifies the boot loader to run instead of Windows on boot. The encryption software then authenticates the user, and, on success, loads Windows.'' - NetworkComputing.com
(only available in Enterprise and Ultimate editions - only encrypts the whole hard disk if it isn't partitioned - otherwise, only the operating system's partition, also called a volume or drive - usually C drive) skip
According to Microsoft, ''BitLocker has two TPM modes:''
''TPM-only. This is transparent to the user, and the user logon experience is unchanged. However, if the TPM is missing or changed, BitLocker will enter recovery mode, and you will need a recovery key or password to regain access to the data.''
''Startup key. The user will need a startup key to log on to the computer. A startup key can either be physical (USB flash drive with a machine-readable key written to it) or personal (a PIN set by the user).''
Note: Both TPM modes require a Trusted Platform Module (version 1.2 or later) and a compatible BIOS.
''BitLocker also has a mode for non-TPM systems:''
''USB Flash Drive key. The user inserts a USB flash drive in the computer before turning it on. The key stored on the flash drive unlocks the computer.''
If you choose to store sensitive, private data on your hard drive instead of on removable media, I strongly recommend using the Startup key TPM mode.
FREE CompuSec (for single and dual-boot Windows and GNU/Linux systems, removable media and VoIP) skip
WARNING: The security file, which will be created when you install CompuSec, contains the encryption keys and saving it to your hard drive leaves them vulnerable to theft. I strongly recommend putting the security file on an encrypted removable medium.
CompuSec e-Identity (encryption for Windows and GNU/Linux systems, removable media and VoIP - comes with an e-Identity security device, a smart card with USB reader or a USB token for 2-factor authentication before booting)
CompuSec BIO (fingerprint scanner with built-in smart card reader for Windows and GNU/Linux systems)
PGPdisk 6.02i (free - for Windows 95, 98 and Me and Mac OS - not compatible with Windows 2000 or XP - read note below for a compatible version) skip
Note: ''While PGPdisk from PGP 7.1.1 Corporate Desktop (the last version released by NAI) [and later versions of PGP Whole Disk Encryption and PGP Desktop Professional, which includes Whole Disk Encryption, are] functional on Windows XP, PGPdisk from earlier NAI versions of PGP -- such as PGP 7.0.3 Personal Security, PGP 7.0.4 Desktop Security, PGP Corporate Desktop 7.1, or PGP 6.5.8 Desktop Security -- is not.''
''If you're interested in creating and using...encrypted drives on Windows XP, you'll have to obtain a copy of the new [PGP Whole Disk Encryption or PGP Desktop Professional,] PGP 8.0 Desktop or Personal, the older PGP 7.1.1 Corporate Desktop, PGP 6.5.8ckt build 08 (or later), or one of the several third-party OTFE (on-the-fly-encryption) programs known to be Windows XP compatible, such as...DriveCrypt [Plus Pack].'' - SpywareWarrior.com in PGP Versions, Sources, & Alternatives
PGP Desktop Professional (commercial - includes Whole Disk Encryption - for Windows and Mac OS - for extra protection, get it with Aladdin eToken)
DriveCrypt Plus Pack (DCPP) (commercial - for Windows NT, 2000 and XP - uses strong AES encryption - allows secure hiding of an entire operating system inside the free space of another operating system)
''There are three modes in which Syskey operates. In mode one, enabled on all [Windows 2000, XP Pro and] Server 2003 computers by default, a system key is generated by the computer randomly and an encrypted version of the key is stored locally. In this mode, you can still restart the computer normally.''
''In mode 2, the system key is generated and stored in the same way as with mode 1, but an additional password, selected by the administrator, provides further protection. When you restart the computer, you must enter this system key password during startup. This additional password is not stored locally.''
''Mode 3 is the most secure method of operation. [emphasis added] The computer-generated key is stored on a floppy disk instead of locally. You can't start the computer unless you have physical possession of the floppy disk, as it must be inserted in the disk drive when you are prompted during startup.'' - article ''Securing Server 2003 Domain Controllers'' by Deb Shinder at WindowsSecurity.com
I strongly recommend storing your SysKey with mode 3, especially if you have a laptop / notebook.
Note: In Windows 2000, XP and 2003 ''Syskey mode 3 requires a floppy disk. No other type of removable media is supported for syskey storage [unfortunately].'' Windows Vista's BitLocker has a USB option. skip
ATTENTION: ''Do not store the key on an ERD [Emergency Repair Disk]. To do so would be to provide two items needed to attack your system in one location. Do make copies of the disk. Without it you cannot boot your Windows NT system.'' - article ''Protecting the SAM with Syskey'' by Roberta Bragg at Informit.com skip
For more articles on how to protect your private data, visit Privacy Watch. Few things are more valuable than your personal data. PC World Senior Associate Editor Andrew Brandt shows you how to protect it.