TrueCrypt

Results: 88



#Item
41Crime prevention / National security / Cryptographic software / Computing / Computer security / Electronic commerce / Attacker / TrueCrypt / Lorrie Cranor / Software / Security / Computer network security

02- Introduction to Security / Usable Encryption Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:53:52
42Cryptography / System software / Password / TrueCrypt / FileVault / BitLocker Drive Encryption / KeePass / Remote backup service / Backup / Software / Cryptographic software / Disk encryption

Find.Decrypt.Open Password Recovery Kit Forensic 2015 v.2 All-in-one password recovery and encrypted evidence discovery solution Passware Kit Forensic finds encrypted files on a computer and network and decrypts them.

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2015-03-24 10:17:05
43Cryptographic software / System software / Password / TrueCrypt / BitLocker Drive Encryption / Encrypting File System / Encryption software / Disk encryption / Cryptography / Software

Handling Encrypted Evidence & Password Recovery Nataly Koukoushkina June 2010 CCFC 2010, Workshop

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2010-06-29 15:11:36
44Computer security / Data security / Encryption / TrueCrypt / Laptop theft / USB flash drive / Disk encryption hardware / Network Security & Cryptography / Disk encryption / Software / Computing

Microsoft Word - JUCC Newsletter-General-7 Data Encryption vFINAL2.doc

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-06-23 00:07:29
45System software / Computing / TrueCrypt / Deniable encryption / Comparison of disk encryption software / Software / Cryptographic software / Disk encryption

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J. St. Hilaire∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
46Disk encryption / Disk formatting / OS/2 / Data security / Hard disk drive / TrueCrypt / Disk partitioning / Data remanence / Computing / Software / System software

January 2009 Protect your personal data while engaging in IT related activities - Supplement Transmission and Storage of Important Personal Data: If recipients have electronic certificates (e-Cert), you may have your ema

Add to Reading List

Source URL: www.cuhk.edu.hk

Language: English - Date: 2009-08-25 06:36:12
47Cross-platform software / Ubuntu / SYS / USB flash drive / Operating system / Linux / TrueCrypt / Debian / Password / Software / Computer architecture / Computing

PDF Document

Add to Reading List

Source URL: en.flossmanuals.net

Language: English - Date: 2014-08-02 08:40:35
48Computer security / Electronic business / Software / Password / TrueCrypt

Queen’s University – Information Services Storing and Accessing Sensitive Information Storing and Accessing Sensitive Information Many staff will have to store and access sensitive information at some point as part

Add to Reading List

Source URL: www.qub.ac.uk

Language: English - Date: 2015-01-14 11:33:00
49Software / System software / BestCrypt / TrueCrypt / On-the-fly encryption / EncFS / Dm-crypt / Filesystem in Userspace / Filesystem-level encryption / Disk encryption / Cryptographic software / Cryptography

GROUP TEST ENCRYPTION ENCRYPTION GROUP TEST Mayank Sharma gathers the best file encryption tools

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2014-11-12 07:50:35
50Cryptography / Cross-platform software / Disk encryption / Computer security / Smart card / GNU Privacy Guard / Data security / TrueCrypt / Access control / Software / Cryptographic software / Computing

escrypt GmbH System Provider for Embedded Security A Generic Architecture and Extension of eCryptfs:

Add to Reading List

Source URL: www.linux-kongress.org

Language: English - Date: 2009-10-30 06:39:24
UPDATE