Free Download the Collection of 40 3D Effect Fonts
March 19, 2017 – 12:17 am | No Comment

With the beatiful fonts, you can make text designs that may be different from the usual. When used with appealing design and creativity, the text or words may seem more alive making it …

Read the full story »
Free Software Download

Funny Tech

How-To

Internet Tips

Laptop Reviews

MS Office Tips

Windows 7

Windows Vista

Home » Free Software Download

Portable TrueCrypt – A software designed to protect your important data by encrypting it

Submitted by on March 14, 2009 – 12:46 am7 Comments

Free Download

TrueCrypt is a software designed to protect your important data by encrypting it. It can also maintain an on-the-fly-encrypted volume (data storage device).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume.

Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt.

Here are some key features of “Portable TrueCrypt”:

· Creates a virtual encrypted disk within a file and mounts it as a real disk.
· Encrypts an entire partition or storage device such as USB flash drive or hard drive.
· Encrypts a partition or drive where Windows is installed (pre-boot authentication).
· Encryption is automatic, real-time (on-the-fly) and transparent.
Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
· 1) Hidden volume (steganography ? more information may be found here).
· 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
· Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

7 Comments »

Leave a comment!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.