Keep your friends/family or the NSA/CIA out of your important files, even if someone hacks your administrator password or gets access to your computer they will not be able to crack this encryption, unless someone has a key logger or someone watches you type in your password, check this out, it is a "must have app"
Download here
Encryption Offered :)
AES
Serpent
Twofish
AES-Twofish
AES-Twofish-Serpent
Serpent-AES
Serpent-Twofish-AES
Twofish-Serpent
TrueCrypt is a software system for Windows Vista for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g.., file names, folder names, contents of every file, free space, meta data, etc).
Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. The are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.
Let's suppose that there is an .avi video file stored on a TrueCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, TrueCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading next small portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types, not only for video files.
Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile).
Monday, April 30, 2007
Best Vista Encryption Software *Freeware*
Posted by defcon at 9:58 AM 0 comments
Labels: Encryption, Security Policies, Vista Security
Sunday, April 29, 2007
Enable Bitlocker Encryption
Windows Vista includes a new hard drive encryption feature called BitLocker Drive Encryption. BitLocker can be a very useful security feature for businesses and home users that have sensitive and confidential information stored on their computer. Unfortunately, BitLocker Drive Encryption by default requires a Trusted Platform Module (TPM Chip) version 1.2 or later installed in your computer. A lot of the computers and laptops on the market do not come with TPM chips installed since they are typically only found in premium model business computers. If you have Windows Vista Business, Ultimate or Enterprise but do not have a TPM chip, you can still use BitLocker Drive Encryption.
Hidden away in local group policy is a setting that will allow you to turn on the ability to use a USB storage device instead of a TPM key to store the encryption key. This is a great feature for users that don't have the latest high-end hardware because you can still use hard drive encryption. However, every time you turn on your computer, the USB storage device that has the encryption key located on it must be plugged in. Without it, your computer will not boot up. One BitLocker Drive Encryption is setup with a USB storage device, that USB storage device basically becomes the key to your computer.
Follow these steps to turn on the ability to use a USB storage device with BitLocker Drive Encryption on hardware that does not have a TPM device:
1. Click on the Start Button and key in gpedit.msc and hit Enter.
2. Navigate through: Computer Policy, Administrative Templates, Windows Components and BitLocker Drive Encryption.
3. Right click on Control Panel Setup: Enable advanced startup options and select Properties.
Check Enabled and hit OK.
Posted by defcon at 10:39 AM 0 comments
Labels: Bitlocker, Encryption, Security Policies