No installation is required on such a device. The program can also be used on removable devices, such as a USB Flash drive. The program will notify you when the chosen password is too weak and can easily be broken by brute force or dictionary attacks. Of course, the access to the encrypted volumes is secured by passwords. The encrypted volume size can be customized in order to have enough space for your secret files. In order to secure your data, you can choose between several strong AES (Advanced encryption Standard) algorithms such as: Rijndael, Serpent or Twofish with up to 256-bit keys and 128-bit blocks. When a volume is mounted, it can be used just as any partition already existing on the system. The wizard will also offer you additional information about algorithms or other features.Īfter the volumes have been created, they will be mounted for use and unmounted for securing data. Encrypted volumes can be created using the wizard. A perpetrator can be deceived by storing non-relevant data in the visible volume, when the important data will be kept secret and undetected. Hidden volumes can be created within a visible encrypted volume. TrueCrypt can create three types of encrypted volumes: file-hosted (container) ,partition/device-hosted or you can encrypt an entire partition or system drive.Ī very useful feature of this program is the fact that it allows you to create visible or hidden encrypted vaults. TrueCrypt is a free encryption utility designed to keep your data safe from curios eyes and prevent data theft of destruction.
0 Comments
Leave a Reply. |