![]() To prevent massive data loss, TrueCrypt will prompt you to create a recovery CD. If you encrypt your entire system, it will not boot if you should forget your password. If you choose to reboot your PC during the encryption process, you may lose the entire drive. It is a lengthy process that renders your machine unusable in terms of other applications, so we suggest you do it when you do not intend to use your PC for some 20 hours at least. Technically savvy users will appreciate the full-volume encryption. No one and no program can access these files when the disc is not mounted. Once you create an encrypted disc, you can place your confidential files there, and mount and dismount it whenever the need arises. Depending on what information you need to encrypt, you need to understand the size of the encrypted volume you are about to create. Beginners are recommended creating an encrypted volume as a file within an existing disk. Two modes – the easy and the advanced allow both beginners and advanced users encrypt their private data. The program can encrypt USB flash drives and external file storage drives. The only way anyone can access the encrypted data is to have the password. Its main difference from other folder locking applications is that it cannot be tricked and hacked by booting in safe mode or booting from a CD, or terminating the process in Task Manager. ![]() As a result, we suggest beginners use the features recommended for beginning users. Otherwise, you may consider your encrypted data as good as lost. ![]() This is especially true for rookies – you have to know what you are doing, and you have to remember to keep safe your password. It is extensive and understandable to anyone in a position of requiring this software. We highly recommend reading documentation. However, the application requires attention to detail. TrueCrypt is a fit for any user irrespective of his technical skills. This is totally understandable as a user has too many technicalities to pay attention to, rather than enjoy a fancy 3D. TrueCrypt offers functionality over visual effects in its approach to GUI. Versions for Mac OS X and Linux are also available, but we'll focus on the Windows version in this review. TrueCrypt runs on Windows 2000/XP/2003/Vista/XP64/Vista64/Win 7. No bundled freeware or toolbars come with the pack. The only warning is not to let your computer hibernate while the encrypted volume is mounted, because some Russian genius already figured out the way of getting into hibernation memory files. There are no hacking applications that can break this powerful tool so far. That way, even if you give your password away and the volume mounts, the hidden volume inside it will still be invisible. TrueCrypt can fix even this by creating a hidden volume inside an encrypted disc. The only way a third party can access the TrueCrypt encrypted data is by forcing you to give away your passwords. However, in terms of globalization of espionage and governmental control over everyone, how secure those services seem? Can anyone rest assured his sensitive data is safe from third-party intrusion? If this and many other security issues concern you, TrueCrypt is the answer to your doubts. Any Dropbox, Google Drive or SkyDrive user appreciates freedom and comfort of having access to his files stored in the cloud from anywhere in the world. ![]() The application allows for the creation of a hidden operating system. A powerful, free, open source encryption tool, TrueCrypt creates encrypted volumes, encrypted discs, and it can even encrypt your entire system. If you are seriously concerned about privacy and security of your sensitive data, and have not used TrueCrypt yet, it is about time you familiarize yourself with it. ![]()
0 Comments
Leave a Reply. |