TrueCrypt

Results: 88



#Item
71Computing / System software / FreeOTFE / Dm-crypt / TrueCrypt / Fstab / Linux Unified Key Setup / File system / Backup / Software / Cryptographic software / Disk encryption

Encrypting removable storage devices Removable device encryption – R/W compatible with Linux and Windows for TF-CSIRT, 22nd Meeting – Oporto, PT

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2007-09-26 07:40:10
72Cryptography / System software / TrueCrypt / Password / IronKey / BitLocker Drive Encryption / KeePass / FileVault / Encrypting File System / Software / Cryptographic software / Disk encryption

Microsoft Word - Encryption Notes for Workshops

Add to Reading List

Source URL: www.kcl.ac.uk

Language: English - Date: 2012-10-19 06:48:44
73Rootkits / Antivirus software / Computer security / Hypervisor / Blue Pill / Mebroot / Unified Extensible Firmware Interface / BIOS / TrueCrypt / System software / Software / Malware

PDF Document

Add to Reading List

Source URL: www.aisp.sg

Language: English - Date: 2012-06-25 23:12:04
74Cross-platform software / Cryptographic software / Disk encryption / TrueCrypt / Bloom filter / Disk image / USB flash drive / Bin / Triage / Software / System software / Computing

Digital Investigation[removed]S60–S68 Contents lists available at SciVerse ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
75System software / Computing / FileVault / TrueCrypt / Personally identifiable information / Password / Encryption software / Encrypting File System / BitLocker Drive Encryption / Cryptographic software / Disk encryption / Software

Data Handling Best Practices The University of Northern Colorado is responsible for the confidentiality and integrity of their data under existing federal, state and local legislation. This document is written to convey

Add to Reading List

Source URL: www.unco.edu

Language: English - Date: 2014-02-27 18:34:44
76TrueCrypt / Key / Cipher / Symmetric-key algorithm / Public-key cryptography / Encryption / Integrated Encryption Scheme / Chosen-ciphertext attack / Disk encryption / Cryptography / Computer security / Trusted Platform Module

1 Deleting Secret Data with Public Verifiability Feng Hao, Member, IEEE, Dylan Clarke, Avelino Francisco Zorzo Abstract The problem of secure data erasure has been extensively studied in the past with a rich body of lit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-25 03:36:16
77Disk encryption / Mac OS X / Password / Personally identifiable information / Internet privacy / Telecommunications data retention / TrueCrypt / Encryption / FileVault / Software / Cryptographic software / Cryptography

Guide to Secure Data Storage A PD-Net Study Process Template Data collected in the context of PD-Net should be protected from loss, corruption, and unauthorized access. Of particular importance is the confidentiality of

Add to Reading List

Source URL: pd-net.org

Language: English - Date: 2013-05-29 09:22:29
78Computing / Scramdisk / TrueCrypt / Passphrase / Containerization / Digital container format / Object Linking and Embedding / Comparison of disk encryption software / E4M / Software / Cryptographic software / Disk encryption

ScramDisk for Linux Version[removed]User Guide and Technical Documentation Hans-Ulrich J¨uttner February 13, 2011

Add to Reading List

Source URL: sd4l.sourceforge.net

Language: English - Date: 2011-02-14 16:55:18
79System software / Computing / TrueCrypt / On-the-fly encryption / NTFS / Filesystem in Userspace / USB flash drive / File system / Deniable encryption / Software / Cryptographic software / Disk encryption

TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER’S GUIDE Version Information TrueCrypt User’s Guide, version 3.1a. Released February 7, 2005.

Add to Reading List

Source URL: docs.huihoo.com

Language: English - Date: 2008-12-05 04:23:51
80Computing / Electronic commerce / Cryptographic software / USB / Password / USB flash drive / TrueCrypt / Computer security / Antivirus software / Software / Disk encryption / Security

IT Security Practices While Departmental and Campus IT units are accountable for the security of computer networks; computer and data security is also each individual’s responsibility. In addition, researchers are ofte

Add to Reading List

Source URL: tigger.uic.edu

Language: English - Date: 2010-05-24 17:28:35
UPDATE