Solved

Encrypting laptop disk with TrueCrypt

Posted on 2009-05-06
5
658 Views
Last Modified: 2013-11-17
Just bought a laptop and I have potentially sensitive information on it.  I'm running Vista Ulitimate and was considering BitLocker to encrypt the disk - however, it looks like I would have to re-partition my hard drive and reinstall the OS to meet the requirements.  I'm also not sure if the BIOS supports TPM.

I've used TrueCrypt to encrypt flash drives, which I like...   but does anyone have any feedback/thoughts/experience on encrypting entire OS volumes? is performance affected? Thanks!
0
Comment
Question by:polaris101
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 6

Expert Comment

by:jimmmg
ID: 24322016
take a look and have a free trial of this encryption software, it is helpful to me:
http://www.dicale.com/
hope it can help u
0
 
LVL 12

Accepted Solution

by:
coredatarecovery earned 250 total points
ID: 24322690
I'm running vista buisness on a laptop that is fully encrypted with truecrypt,
It did it on the fly and it took about 14 hours to fully encrypt the disk with AES.

Mine was fully loaded and is 500Gb in size so, yours may not take as long.
0
 
LVL 12

Expert Comment

by:coredatarecovery
ID: 24322696
Just backup first.
I used clonezilla to a seperate 500gb drive first, because I could not afford to lose my os if it trashed it in the attempt.

I've noticed no problems whatsoever.
0
 
LVL 2

Expert Comment

by:SadiDev
ID: 24323264
No, there is no significant change on performance. I have used true crypt (for test). There was no problem. But backup your disk first (just a preparation against something goes wrong). You can erase the backup securely after everything goes smooth, else you can restore the backup.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 24324173
I two have had no issues with truecrypt (on laptops and desktops) but laptops can often have non-standard hardware (lowest priced chipset supplier is usually used, not the best) so a backup is certainly advised.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
Video by: Tony
This video teaches viewers how to export a project from Adobe Premiere Pro and the various file types involved.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question