Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Easy way to encrypt key drives? User using win xp and win 7

Posted on 2011-03-15
3
Medium Priority
?
382 Views
Last Modified: 2012-05-11

Is there an easy way to encrypt key drives
0
Comment
Question by:fcek
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
meb_santoso earned 2000 total points
ID: 35140059
try Truecrypt - http://www.truecrypt.org/

From the website

Main Features:
    * Creates a virtual encrypted disk within a file and mounts it as a real disk.
    * Encrypts an entire partition or storage device such as USB flash drive or hard drive.
    * Encrypts a partition or drive where Windows is installed (pre-boot authentication).
    * Encryption is automatic, real-time (on-the-fly) and transparent.
    * Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
    * Encryption can be hardware-accelerated on modern processors.
    * Provides plausible deniability, in case an adversary forces you to reveal the password:
      Hidden volume (steganography) and hidden operating system.
0
 

Author Comment

by:fcek
ID: 35143306

Is it free?
I presume it has to be loaded on any PC thats to read the data afterwards?

0
 
LVL 5

Expert Comment

by:meb_santoso
ID: 35143323
it is Free.
it will run from the USB drive, and them mount your encrypted data, and aftewards make it available for the user. So yes, it will run first before you can actually read / write anything.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question