{"id":19562,"date":"2016-01-05T08:01:52","date_gmt":"2016-01-05T08:01:52","guid":{"rendered":"http:\/\/blog.parallels.com\/?p=28361"},"modified":"2016-01-05T08:01:52","modified_gmt":"2016-01-05T08:01:52","slug":"encrypting-parallels-desktop-virtual-machines","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/encrypting-parallels-desktop-virtual-machines\/","title":{"rendered":"Encrypting Parallels Desktop Virtual Machines"},"content":{"rendered":"<p>Guest blog by Dhruba Jyoti Das, Parallels Support Team Do you think encryption guarantees effective security to your data? While the word \u201cguarantee\u201d might be a bit strong, encryption is a very effective method to restrict your data from unauthorized access. What\u2019s encryption? Encryption is the process of encoding information in such a way that [&#8230;]<\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/blog\/2016\/01\/05\/encrypt-parallels-desktop-virtual-machine\/\">Encrypting Parallels Desktop Virtual Machines<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/\">Parallels Blog<\/a>.<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?a=e9dFMK4CKFg:lFWAqVOBCJ0:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Guest blog by Dhruba Jyoti Das, Parallels Support Team Do you think encryption guarantees effective security to your data? While the word &ldquo;guarantee&rdquo; might be a bit strong, encryption is a very effective method to restrict your data from unauthorized access. What&rsquo;s encryption? Encryption is the process of encoding information in such a way that [&#8230;]<\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/blog\/2016\/01\/05\/encrypt-parallels-desktop-virtual-machine\/\">Encrypting Parallels Desktop Virtual Machines<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.parallels.com\/\">Parallels Blog<\/a>.<\/p>\n<div>\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?a=e9dFMK4CKFg:lFWAqVOBCJ0:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/parallels\/XFIF?d=yIl2AUoC8zA\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"author":107,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3802,3801,1938,1937,3800,2965,1644,3803],"tags":[],"class_list":["post-19562","post","type-post","status-publish","format-standard","hentry","category-encrypt-virtual-machine","category-encrypt-vm","category-parallels-desktop","category-parallels-desktop-for-mac","category-parallels-desktop-vm","category-support-post","category-tips-tricks","category-virtual-machine-encryption"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/19562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=19562"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/19562\/revisions"}],"predecessor-version":[{"id":19817,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/19562\/revisions\/19817"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=19562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=19562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=19562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}