Saturday, July 20, 2013

How to Encrypt a Cell Phone


Data Encryption
1. Choose a data encryption software for your mobile phone. You can consider using SecurStar, WMkits, and AutoKrypt (see Resources). As of 2010 these programs ranged in price from free to $20.
2. Download the data encryption software you have selected. Install it to your phone.
3. Make an encrypted data file storage on your mobile phone. For example, if you are using AutoKrypt, find the data encryption icon on your screen. Click on it and then go to your phone's menu.'Go to 'Storage' and select 'Create.' A window for 'New Storage' will appear.
4. Name the file you just have created. Click on 'Browse,' then enter the file name in the 'Name' box. Fill in other necessary details and hit the 'OK' button when you are done.
5. Modify the setting for the file storage. Type in the storage size in the 'Storage Size' box. Check the box beside 'Hidden' if you want to hide the file from other browsers.
6. Create a password for your encrypted data file. Click on the 'Create' button and type the password. Do not forget your password, and keep it safe and private.
7. Select the files on your cell phone you want to add to the encrypted data file. Open the browser on your cell phone and simply check and select the files you want to be encrypted.
Voice Encryption
8. Choose a voice encryption software. Select which software you are going to use for your cell phone. A few that you can use include SecurStar, Smart Encryptor-Encryption Manager, and Secure Voice GSM 1.1.
9. Download and install the program on your cell phone.
10. Run the program by clicking the software's icon on your phone's menu.
11. Set your cell phone to GSM mode. Go to the menu and select 'Tools Settings.' Click on 'Phone' and then 'Network.' Select 'GSM,' then press the 'OK' button.
12. Turn off your cell phone and restart it again. Return to the menu and go to 'Applications.' Open up the encryption program. Agree to the terms and conditions and click 'OK.' Now your call will be encrypted against scanners used by hackers.

No comments:

Post a Comment