Solved

Best encryption software

Posted on 2007-04-01
7
10,654 Views
Last Modified: 2010-05-18
I want to know which encryption software is best and most trustable.

I am interested in whole disk encryption, plausible deniability  preferred.

Also, if its not open source, how bad is this?

Looking for a good answer from an encryption expert.
0
Comment
Question by:q90887
7 Comments
 
LVL 18

Expert Comment

by:PowerIT
ID: 18832824
Whole disk encryption + plausible deniability + open source = truecrypt
http://www.truecrypt.org/

J.
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 63 total points
ID: 18833110
If you want to encrypt the entire windows operating system there is only one choice:

http://www.securstar.com/products_drivecryptpp.php

- Full Disk Encryption (Encrypts parts or 100% of your HardDisk including the operating System)
- Pre-Boot authentication (BEFORE the machines boots, a password is requested to decrypt the disk and start your machine)
- Allows secure hiding of an entire operating system inside the free space of another operating system.
- Strong 256bit AES encryption
- USB-Token authentication at pre-boot level


Here are some FAQs regarding safety:

http://www.securstar.com/faq_drivecrypt.php

Tolomir

If that is not needed, take the free truecrypt, as mentioned above.
0
 
LVL 18

Expert Comment

by:PowerIT
ID: 18835232
Tolomir is right, I have to nuance my answer a bit: full drive encryption in truecrypt does not inclode the system drive. You have to seperate the operating system and data in different partitions. The system drive can not be encrypted.
A data disk or partition can.

J.
0
 
LVL 3

Assisted Solution

by:thomaswright
thomaswright earned 62 total points
ID: 18869104
It's certainly not opensource but take a look at PGP whole disk encryption:

http://www.pgp.com/products/wholediskencryption/index.html
0
 
LVL 3

Expert Comment

by:DPAIT
ID: 21063188
www.Truecrypt.org NOW has the whole disk encryption and I'm loving it!
Version 5  
open source
for a review see episode #133 here  http://www.grc.com/securitynow.htm
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Bitlocker recovery password 4 65
IRM and Office 2016 5 350
Full Laptop encryption with preboot authentication 4 81
PGP Decryption code using Bouncy Castle jars 11 178
Healthcare providers, insurance companies and other covered entities trust eFax Corporate to transmit their most sensitive documents. eFax Corporate can help your organization implement a HIPAA compliant cloud faxing solution.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question