![]() ![]() Then once the download is complete, just double click on the file and extract the content to say your “Home” folder.ģ. Under “Linux” subheading in that page, just make sure to download the package named “standard …” because if you go with the “console …” one you’ll end up without a GUI (yikes! :)).Ģ. You can install TrueCrypt in Ubuntu 12.04 Precise Pangolin, 11.10 Oneiric Ocelot, 11.04 Natty Narwhal, 10.10 and 10.04 by first downloading the package (supports 32/64bit versions) from this official TrueCrypt download page (also holds packages for other operating systems).įew installation notes for the GNU/Linux users …ġ. You can make few other tweaks using the settings window as well. But TrueCrypt does tell us that by analyzing the registry it might be possible to find some traces that expose TrueCrypt might had been run. In the portable mode, while running on another computer it literally leaves almost no trace of its existence (temp files, registry entries etc). Enable/Disable caching passwords in memory (disabled by default). Bookmark data volumes or keep then in History (disabled by default). File systems supported (for the virtual data volumes): Fat, NTFS, Ext2/3/4. Benchmark testing between different algorithms. Supports few major data encryption methods such as : AES, Serpent, TwoFish, AES-TwoFish and a few others. Add “key” files from disk or generate secure ones automatically. The benefit is that, even if you mounted the encrypted volume in TrueCrypt the data inside the hidden volume will still be invincible until you mount that hidden volume manually.Īlthough while using this feature you must be careful otherwise you can easily over-write the data in that hidden volume (read the TrueCrypt manual as it explains things more accurately). This is one of the fastest and secure methods of encryption and is also ideal if you want to easily create a portable encrypted data volumes.Ī hidden volume is a virtual data partition (hidden) inside of the visible virtual data volume. Supports encrypting both virtual data volumes (lets you create virtual disk partitions) and actual partitions. Let’s have a look at some of the features… But then again these days computers are quite powerful so if you have a powerful computer then this might not necessarily be a valid truth anymore.Īnyway, if you’re looking for a powerful software based data encryption utility that comes absolutely free and runs on GNU/Linux, MS Windows and Mac OSX (cross-platform) then TrueCrypt is certainly one of the best tools that I’ve been using for a long time. Hardware encryption might have a an advantage of being a bit faster (the encryption process) because that hardware is designed and optimized for that task. Some say Hardware encryption is better than the Software version but others disagree. Either into Hardware encryption (independent of the OS because the encrypting tool is located on a physical chip) or Software encryption (runs on top of the OS). And normally data encryption can be divided into two main categories. Data encryption is one of the best ways of protecting your sensitive data from data thefts and other security vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |