You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
Introduces seven kind of floppy disk encryption technology tool
  Add date: 07/14/2008   Publishing date: 07/14/2008   Hits: 105
Total 8 pages, Current page:1, Jump to page:
 

TruCrypt, PGP, FreeOTFE, BitLocker, DriveCrypt and 7-Zip, these encryption procedure has provided the exceptionally reliable real-time encryption function, may ensure the data security for you, avoids the data missing, stealing as well as is peeped. 

    Very little has the IT professional also to need the data security aspect training, but we hear such event frequently: The computer or the hard disk are stolen or the loss, inside saved the definite orders form data, has not undergone the encryption.

    Luckily, the real-time data encryption now no longer is some kind strange, the cost soaring technology. Some encryption procedure carries on the encryption merely to the single document, but can also inside the document, even directly found the virtual disk in the district, reads on virtual disk's any data automatically to carry on the encryption. On the modern hardware, encrypts the expenses which needs to be minimum; Does not need to use the special hardware again to carry on the encryption.

    This article introduced uses in founding and the management encryption volume application procedure, from Windows Vista the bringing BitLocker encryption procedure, to uses in encrypting the email and the immediate news performance mature PGP tabletop suite. You do not even need to spend, can obtain the entire floppy disk encryption function which is exceptionally reliable, realizes good - - under the enterprise environment, looks like the manipuility or the support serves these characteristics to be worth spending completely the purchase.

    Tool one, TrueCrypt 5.1a

    Expense: Free/opens the source

    Website: www.truecrypt.org

    TrueCrypt has the entire floppy disk which or the hypothesized volume encryption solution the enough sufficient reason becomes you to test first. Besides free and opens source these two big merits, this programming is ingenious, very easy to use, but also has the rich data protection function, is (including operating system district) carries on the encryption to the overall system one efficacious device.

    TrueCrypt enables you to be possible to choose the advanced encryption standard (AES), algorithms and so on Serpent and Twofish, these algorithms may the independent employment, may also use the different combination (named “cascade”); May also choose hash algorithms and so on Whirlpool, SHA-512 and RIPEMD-160. The actual encryption has three essential methods: May take the document the hypothesized encryption volume to install; May turns the entire disk partition or the physical driver the encryption volume; May also encrypt in the work Windows operating system volume, but has some limitations.

    The encryption volume may use the password to protect; As an option, may also use the key document to protect, thus strengthens on the safe - - for instance transportable USB driver's document, like this you may establish one kind of double factor confirmation. If founded an independent hypothesized volume, may use any size or name the convention the document. This document founds by TrueCrypt itself becomes, then passes through the formatting, guaranteed that it seems with the random data does not distinguish.

 

Other pages: : 1 * 2 * 3 * 4 * 5 * 6 * 7 * 8 * Next>>
Prev:Teaches you to explain forcefully encrypts the WinRAR document method Next:Windows system folder encryption decipher course

Comment:

Category: Home > encryption decipher