Solved

Easy way to encrypt key drives? User using win xp and win 7

Posted on 2011-03-15
3
337 Views
Last Modified: 2012-05-11

Is there an easy way to encrypt key drives
0
Comment
Question by:fcek
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
meb_santoso earned 500 total points
ID: 35140059
try Truecrypt - http://www.truecrypt.org/

From the website

Main Features:
    * Creates a virtual encrypted disk within a file and mounts it as a real disk.
    * Encrypts an entire partition or storage device such as USB flash drive or hard drive.
    * Encrypts a partition or drive where Windows is installed (pre-boot authentication).
    * Encryption is automatic, real-time (on-the-fly) and transparent.
    * Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
    * Encryption can be hardware-accelerated on modern processors.
    * Provides plausible deniability, in case an adversary forces you to reveal the password:
      Hidden volume (steganography) and hidden operating system.
0
 

Author Comment

by:fcek
ID: 35143306

Is it free?
I presume it has to be loaded on any PC thats to read the data afterwards?

0
 
LVL 5

Expert Comment

by:meb_santoso
ID: 35143323
it is Free.
it will run from the USB drive, and them mount your encrypted data, and aftewards make it available for the user. So yes, it will run first before you can actually read / write anything.
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now