
The ultimate freeware encryption program, TrueCrypt is loaded with powerful features that those concerned with protecting their data from thievery should want--and have.
TrueCrypt provides two levels of plausible deniability, in case an adversary forces you to reveal the password: a hidden volume (steganography- more information may be found here); no TrueCrypt volume can be identified (volumes cannot be distinguished from random data). TrueCrypt uses encryption algorithms AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish. It is based on Encryption for the Masses (E4M) 2.02a, conceived in 1997.
Version 6.2 includes the I/O pipeline now uses read-ahead buffering, which improves read performance especially on solid-state drives, typically by 30-50%.
Version 6.2 includes the I/O pipeline now uses read-ahead buffering, which improves read performance especially on solid-state drives, typically by 30-50%.
Main Features:
- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time (on-the-fly) and transparent.
- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
- Provides plausible deniability, in case an adversary forces you to reveal the password:
Hidden volume (steganography) and hidden operating system. - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Download :
No comments:
Post a Comment