August 4, 2016 – 5:59 pm | No Comment

Quick Search is a free local search tool to help users locate files or folders instantly by key words. It is a much faster and easy-to-use alternative to Windows Search. It searches initially when you …

Read the full story »
Free Software Download

Funny Tech

How-To

Internet Tips

Laptop Reviews

MS Office Tips

Windows 7

Windows Vista

Home » Free Software Download

Portable TrueCrypt – A software designed to protect your important data by encrypting it

Submitted by on March 14, 2009 – 12:46 am7 Comments

Free Download

TrueCrypt is a software designed to protect your important data by encrypting it. It can also maintain an on-the-fly-encrypted volume (data storage device).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume.

Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt.

Here are some key features of “Portable TrueCrypt”:

· Creates a virtual encrypted disk within a file and mounts it as a real disk.
· Encrypts an entire partition or storage device such as USB flash drive or hard drive.
· Encrypts a partition or drive where Windows is installed (pre-boot authentication).
· Encryption is automatic, real-time (on-the-fly) and transparent.
Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
· 1) Hidden volume (steganography ? more information may be found here).
· 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
· Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

7 Comments »

Leave a comment!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.