SlideShare a Scribd company logo
ENCRYPTING WORD
DOCUMENTS
This is one in a series of tutorials on digital and
mobile security for journalists and bloggers. We
will show you how to encrypt Microsoft Word 2010
documents and Open Office text documents.
Jorge Luis Sierra
Knight International Journalism Fellow
2013
ENCRYPTING WORD
DOCUMENTS IN MAC
Follow these steps to encrypt your Microsoft Office 2010
Word document in Mac computers.
Step 1. Open the document.
•  Go to File and open the Word document you want to
encrypt.
Step 2. Click on Preferences…
Step 3. Click on Security
Step 4. Write your password
Step 5. Save the encryption
ENCRYPTING WORD
DOCUMENTS IN PC
Follow these steps to encrypt Microsoft Office 2010
Word documents in a PC computer.
Step 1: Open your document
•  After opening the document, click File and then click Info.
Step 2. Protect your document
•  In the Info options, click Protect document. After that you
can click on Encrypt with password.
1
2
3
Step 3: Enter your password
•  After a window opens, write your password and click OK.
Step 4: Confirm your password
•  In the next window, confirm your password and click OK.
ENCRYPTING OPEN OFFICE
TEXT DOCUMENTS
Follow these steps to encrypt an Open Office text
document.
Step 1: Create a document.
Step 2: Save your document.
•  In the File option, click Save as…
1
2
Step 3: Save with password
•  In a new window, click Save with Password, then Save.
1
2
Step 4: Write your password
•  Write and confirm your password. Click OK.
Step 5: Encrypted document.
•  Close and open your document. You will need to enter
your password to read it.
Encrypted documents
•  Are you ready to encrypt text documents?
•  This tutorial is part of the Digital and Mobile Security
Program for Journalists and Bloggers supported by the
International Center for Journalists and Freedom House.
•  Author: Jorge Luis Sierra, Knight International Journalism
Fellow. 2013.
•  Follow him on Twitter: @latinointx

More Related Content

Similar to How to encrypt word documents

Set a password in a word document
Set a password in a word documentSet a password in a word document
Set a password in a word document
Ravi Kumar Lanke
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016
William Mann
 
Fixed: MS Word the File is Corrupted and Cannot be Opened
Fixed: MS Word the File is Corrupted and Cannot be OpenedFixed: MS Word the File is Corrupted and Cannot be Opened
Fixed: MS Word the File is Corrupted and Cannot be Opened
Itworlds Worlds
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Digital literacy – part 3
Digital literacy – part 3Digital literacy – part 3
Digital literacy – part 3
Gisele Fernandes Loures Domith
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...
Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...
Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...
Plunet BusinessManager
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
KharimMchatta
 
How to Recover Corrupted Word File
How to Recover Corrupted Word FileHow to Recover Corrupted Word File
How to Recover Corrupted Word File
John Park
 
Ict workshop 2018 urkund
Ict workshop 2018 urkundIct workshop 2018 urkund
Ict workshop 2018 urkund
dharma gohel
 
College Application Essay Length. Online assignment writing service.
College Application Essay Length. Online assignment writing service.College Application Essay Length. Online assignment writing service.
College Application Essay Length. Online assignment writing service.
Angela Lovett
 
Setareh Gerashi 9 B
Setareh Gerashi 9 BSetareh Gerashi 9 B
Setareh Gerashi 9 B
jboulanger
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
docTrackr Presents at DefCamp 2013 - November 29-30
docTrackr Presents at DefCamp 2013 - November 29-30docTrackr Presents at DefCamp 2013 - November 29-30
docTrackr Presents at DefCamp 2013 - November 29-30
docTrackr
 
How to made a Document if you ne (as PDF)
How to made a Document if you ne (as PDF)How to made a Document if you ne (as PDF)
How to made a Document if you ne (as PDF)
Hassan Mujtaba ACCA. MCOM
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
William Mann
 
Word processing in english ms word
Word processing in english   ms wordWord processing in english   ms word
Word processing in english ms word
eVidhya
 
Presentation microsoft office 2013 akshay
Presentation microsoft office 2013 akshayPresentation microsoft office 2013 akshay
Presentation microsoft office 2013 akshay
Akshay Singh
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
ALVAREZAPRILROSE
 

Similar to How to encrypt word documents (20)

Set a password in a word document
Set a password in a word documentSet a password in a word document
Set a password in a word document
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016
 
Fixed: MS Word the File is Corrupted and Cannot be Opened
Fixed: MS Word the File is Corrupted and Cannot be OpenedFixed: MS Word the File is Corrupted and Cannot be Opened
Fixed: MS Word the File is Corrupted and Cannot be Opened
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Digital literacy – part 3
Digital literacy – part 3Digital literacy – part 3
Digital literacy – part 3
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...
Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...
Plunet Summit 2018: With a Little Help from My Friends - The Plunet Support F...
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
How to Recover Corrupted Word File
How to Recover Corrupted Word FileHow to Recover Corrupted Word File
How to Recover Corrupted Word File
 
Ict workshop 2018 urkund
Ict workshop 2018 urkundIct workshop 2018 urkund
Ict workshop 2018 urkund
 
College Application Essay Length. Online assignment writing service.
College Application Essay Length. Online assignment writing service.College Application Essay Length. Online assignment writing service.
College Application Essay Length. Online assignment writing service.
 
Setareh Gerashi 9 B
Setareh Gerashi 9 BSetareh Gerashi 9 B
Setareh Gerashi 9 B
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
docTrackr Presents at DefCamp 2013 - November 29-30
docTrackr Presents at DefCamp 2013 - November 29-30docTrackr Presents at DefCamp 2013 - November 29-30
docTrackr Presents at DefCamp 2013 - November 29-30
 
How to made a Document if you ne (as PDF)
How to made a Document if you ne (as PDF)How to made a Document if you ne (as PDF)
How to made a Document if you ne (as PDF)
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
Word processing in english ms word
Word processing in english   ms wordWord processing in english   ms word
Word processing in english ms word
 
Presentation microsoft office 2013 akshay
Presentation microsoft office 2013 akshayPresentation microsoft office 2013 akshay
Presentation microsoft office 2013 akshay
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
 

More from Jorge Luis Sierra

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Jorge Luis Sierra
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Jorge Luis Sierra
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvil
Jorge Luis Sierra
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular Android
Jorge Luis Sierra
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digital
Jorge Luis Sierra
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digital
Jorge Luis Sierra
 
How to use anonymox
How to use anonymoxHow to use anonymox
How to use anonymox
Jorge Luis Sierra
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
Jorge Luis Sierra
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
Jorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en Guerrero
Jorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en Veracruz
Jorge Luis Sierra
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de Veracruz
Jorge Luis Sierra
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet
Jorge Luis Sierra
 
Cómo usar peerio
Cómo usar peerioCómo usar peerio
Cómo usar peerio
Jorge Luis Sierra
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVault
Jorge Luis Sierra
 
Jitsi meet
Jitsi meetJitsi meet
Jitsi meet
Jorge Luis Sierra
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmail
Jorge Luis Sierra
 
Cómo encriptar emails
Cómo encriptar emailsCómo encriptar emails
Cómo encriptar emails
Jorge Luis Sierra
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internet
Jorge Luis Sierra
 
Protege tu móvil
Protege tu móvilProtege tu móvil
Protege tu móvil
Jorge Luis Sierra
 

More from Jorge Luis Sierra (20)

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvil
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular Android
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digital
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digital
 
How to use anonymox
How to use anonymoxHow to use anonymox
How to use anonymox
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en Guerrero
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en Veracruz
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de Veracruz
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet
 
Cómo usar peerio
Cómo usar peerioCómo usar peerio
Cómo usar peerio
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVault
 
Jitsi meet
Jitsi meetJitsi meet
Jitsi meet
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmail
 
Cómo encriptar emails
Cómo encriptar emailsCómo encriptar emails
Cómo encriptar emails
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internet
 
Protege tu móvil
Protege tu móvilProtege tu móvil
Protege tu móvil
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

How to encrypt word documents

  • 1. ENCRYPTING WORD DOCUMENTS This is one in a series of tutorials on digital and mobile security for journalists and bloggers. We will show you how to encrypt Microsoft Word 2010 documents and Open Office text documents. Jorge Luis Sierra Knight International Journalism Fellow 2013
  • 2. ENCRYPTING WORD DOCUMENTS IN MAC Follow these steps to encrypt your Microsoft Office 2010 Word document in Mac computers.
  • 3. Step 1. Open the document. •  Go to File and open the Word document you want to encrypt.
  • 4. Step 2. Click on Preferences…
  • 5. Step 3. Click on Security
  • 6. Step 4. Write your password
  • 7. Step 5. Save the encryption
  • 8. ENCRYPTING WORD DOCUMENTS IN PC Follow these steps to encrypt Microsoft Office 2010 Word documents in a PC computer.
  • 9. Step 1: Open your document •  After opening the document, click File and then click Info.
  • 10. Step 2. Protect your document •  In the Info options, click Protect document. After that you can click on Encrypt with password. 1 2 3
  • 11. Step 3: Enter your password •  After a window opens, write your password and click OK.
  • 12. Step 4: Confirm your password •  In the next window, confirm your password and click OK.
  • 13. ENCRYPTING OPEN OFFICE TEXT DOCUMENTS Follow these steps to encrypt an Open Office text document.
  • 14. Step 1: Create a document.
  • 15. Step 2: Save your document. •  In the File option, click Save as… 1 2
  • 16. Step 3: Save with password •  In a new window, click Save with Password, then Save. 1 2
  • 17. Step 4: Write your password •  Write and confirm your password. Click OK.
  • 18. Step 5: Encrypted document. •  Close and open your document. You will need to enter your password to read it.
  • 19. Encrypted documents •  Are you ready to encrypt text documents? •  This tutorial is part of the Digital and Mobile Security Program for Journalists and Bloggers supported by the International Center for Journalists and Freedom House. •  Author: Jorge Luis Sierra, Knight International Journalism Fellow. 2013. •  Follow him on Twitter: @latinointx