TrueCrypt is a freely available disk encryption package. It is also open-source, which allows independent developers to legally change/modify and/or expand upon the software at their discretion, so long as all applicable terms and conditions of the TrueCrypt license are met. TrueCrypt also happens to be multi-platform, so it is not operating-system dependent. It supports Windows, Mac OS X, as well as Linux distributions. TrueCrypt volumes are also platform independent and can be mounted on different operating-systems.
There are several different methods of utilizing TrueCrypt to provide encryption for sensitive files, as well as to provide a layer of privacy. TrueCrypt can be used to encrypt entire hard drives, flash drives, as well as partitions. It can be used to force pre-boot authentication, by encrypting the drive or partition that an operating-system is installed on. The end-user of TrueCrypt can also provide fake boot error messages during the pre-boot authentication phase when the encryption password is incorrectly input.
TrueCrypt also has a semi-portable mode, in which TrueCrypt does not have to be installed in order to be executed. However, this requires administrative privileges in Windows due to driver requirements and has the potential to leave behind tracks in Windows registry. If this is a problem, TrueCrypt also allows the end-user to create hidden operating systems and hidden volumes. These offer the end-user ...
... middle of paper ...
...nd Destroy and TrueCrypt are very effective software packages that are both provided free of charge. Both packages are well designed and perform their assigned tasks very well. However, like all software packages, none are without bugs and quirks, and they cannot be expected to perform properly in all environments. Thus, precautions should always be made before installation of any software packages on any system with the understanding that the end-user is the only one held liable for problems that occur due to software packages performing unexpectedly in ways that may cause damage to the end-users machines.
. TrueCrypt - Free Open-Source On-The-Fly Encryption . TrueCrypt, 14 Feb 2012. Web. 8 Mar 2012.
. Spybot - Search & Destroy. Safer Networking Ltd., 07 Mar 2012. Web. 8 Mar 2012.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Both computer forensic or forensic science and Biometrics sometimes may apply same identification methods; however, they do so for different purposes. Computer forensics or forensics science is based on history and a forensic investigator does not just pick a method in advance. In other words, forensics investigators are unaware of what they will find as evidence. In addition, the manner in which forensics tools and evidence are handled may have critical implications, which can make or break a case.... [tags: Forensic science, Computer forensics]
768 words (2.2 pages)
- In accordance with the directions of XYZ Inc. leadership this team will evaluate the ability to add a digital forensic lab to the corporate portfolio. The team plans to identify and categorize requirements in four main categories: physical and environmental requirements; technical requirements; legal requirements; and personnel requirements. The team will then develop a proposal for the XYZ digital forensic lab to meet or exceed the requirements using the same four categories. The team was given financial constraints of $750K startup costs with a $575K annual operating budget.... [tags: Forensic science, Computer forensics]
1215 words (3.5 pages)
- The following is the Forensic Psychology Comprehensive Examination for Frank Felipe "Frankie". The forensic psychologist has been hired by the court to give a pre-sentence investigative report. Before entering the room with the client; Frankie’s file has been reviewed with history and reason for evaluation. Psychological Theory and Practice Triage and Assessment On first view of Frankie; the young adult Hispanic male was dressed in inmate orange attire. This appearance was different than the mug shot where he looked ornate, theatrical in appearance.... [tags: Forensic Psychological Assessment]
2221 words (6.3 pages)
- Computer Forensic Lab Requirements When initially embarking upon the task of defining computer forensic lab requirements, it may seem that the primary focus would reside within the technological portion of the lab simply because the nature of computer forensics is highly technical and complex. However, in reality, it is the structure (physical lab requirements) and the lab policies and processes (many of which are dictated by legal requirements) that actually make a computer forensic lab what it is, rather than simply a building full of high technology equipment and software.... [tags: Computer forensics, Forensic science]
1138 words (3.3 pages)
- Forensic evidence can provide just outcomes in criminal matters. However, it is not yet an exact science as it can be flawed. It can be misrepresented through the reliability of the evidence, through nonstandard guidelines, and through public perception. Forensic science can be dangerously faulty without focus on the ‘science’ aspect. It can at times be just matching patterns based on an individual’s interpretations. This can lead to a miscarriage of justice and forever alter a person’s life due to a perceived “grey area” (Merritt C, 2010) resulting in a loss of confidence in the reliability of forensic evidence.... [tags: Forensic science, Fingerprint, CSI effect]
1204 words (3.4 pages)
- M7A1 Essay: Psychological Aspects of Digital Forensics This paper will briefly identify and explain the psychological aspects of digital forensics. It will further examine the role of psychological profiling in digital forensic investigations. Lastly, it will examine the various stresses that digital crime investigations places on the digital forensics investigator. Digital forensics is almost like observing someone’s complete psyche, you see that person’s likes and dislikes. You are viewing their hates and loves; you are finding things they don’t want to share with anyone else in the entire world.... [tags: Forensic science, Computer forensics]
957 words (2.7 pages)
- “Studying psychology is fun because you are always looking for the same things I think a writer should be looking for, which is the story behind the story.” – Christ Cleave. While this might be a romanticized view of psychology, I find the quote by Mr. Cleave accurate due to the high levels of observation and research associated with this field of study. There are more than a dozen specialized areas of psychology and include working with animals and people, studying behaviors, criminals, work environments.... [tags: Scientific method, Crime, Forensic psychology]
878 words (2.5 pages)
- Speech analysis has a type called the voice stress analysis that detects stress in the form of micro tremors in the speech of a person. It is important to note that the voice stress analysis is equivalent to polygraph. Both polygraph and stress have a common problem of not being able to point out deception. This notwithstanding, the speech analysis is apparently being used by both the Federal Bureau of Investigations and the Central Intelligence Agency of the United States. The fact that each and every person possesses a unique voiceprint makes the identification of a speaker to be theoretically possible.... [tags: Forensic Science ]
2084 words (6 pages)
- Forensic Science Introduction: Someone in a restaurant has suddenly fallen ill and a mystery powder has been discovered with the victim. As the chief investigator, your duty is to identify the mystery substance through a lab. In this lab, it will consist of five known compounds and one unknown compound. Your job is to distinguish which one out of the five substances is the mystery powder. To figure out the mystery matter you will have to compare their physical and chemical properties and match them with the appropriate compound.... [tags: Forensic Science]
1260 words (3.6 pages)
- In the Forensic Case #356228, skeletal remains of both human and animal were discovered in a hunting area. The skeletal remains were of potential victims named as either Robert Rutherford or Stephen Morton. Robert Rutherford, potential victim #1, was an African American, 65 years or age, had a pacemaker, carried a Gerber 650 knife, had unknown religious affiliations, and was 5’ft 6”inches tall. Potential victim #2, was Stephen Morton, a Caucasian 40 years of age, had a heart condition, was a hunter in the same area, also had unknown religious affiliations, carried a Gerber 650 knife, and was 5’ ft 7” inches tall.... [tags: Forensic Essay]
1475 words (4.2 pages)