Encrypt Sensitive Files Easily With TrueCrypt

Castle, Alex
May 2013
PCWorld;May2013, Vol. 31 Issue 5, p92
Product Review
The article recommends the open-source computer application TrueCrypt for encrypting one's computer files.


Related Articles

  • Typical Applications and Progress Research of Key Escrow Technology. Fan Qiang; Tan Min; Zhang Yue // Journal of Convergence Information Technology;Aug2012, Vol. 7 Issue 15, p375 

    In order to meet the requirement of information society, governments of all countries are trying to establish a security system that can be monitored to combat criminals engaged in illegal activities such as using communication encryption technology and computer technology to carry out secret...

  • Assessing Vulnerability of Mobile Messaging Apps to Man-in-the-Middle (MitM) Attack. Dudheria, Rishabh // International Journal of Computer Network & Information Security;Jul2018, Vol. 10 Issue 7, p23 

    Mobile apps are gaining in popularity and are becoming an indispensable part of our digital lives. Several mobile apps (such as messaging apps) contain personal/private information of the users. Inevitably, the compromise of accounts associated with such sensitive apps can result in disastrous...

  • Tales from the crypto. Bracco, Terre // Network World;05/22/2000, Vol. 17 Issue 21, p71 

    Evaluates the Rainbow Technologies CryptoSwift 600 and nCipher nForce 300 Cryptographic Accelerator. Functions and features; Key specifications; Capability to support data encryption transactions; Ease of use; Scalability; Overall performance.

  • ISED's encryption unit helps banks reach small merchants. J.L.P. // Bank Marketing;Feb96, Vol. 28 Issue 2, p55 

    Reports on ISED Corp.'s introduction of the secure encryption device (SED), a hardware-based encryption device that allows banks to provide small retail merchants access to electronic banking and credit/debit card transactions. Advantages.

  • OMLIS AND IBM DEBUT ENTERPRISE SECURITY TECHNOLOGY.  // Audiotex Update;Sep2015, Vol. 27 Issue 9, Special section p4 

    The article discusses the launch of the Secure Enterprise Messenger (SEM) encryption technology from International Business Machine (IBM) and Omlis.

  • ARKEIA/SGI DELIVER BACKUP SOLUTION FOR LINUX.  // UNIX Update;Apr2005, Vol. 16 Issue 4, p1 

    The article reports on the launch by Arkeia Corp. and Silicon Graphics of a turnkey, high-performance backup hardware and software solution designed for technical computing environments in the research, education and government sectors where performance, reliability and cost of data protection...

  • From Consumer to Business: Security as a Mobile App. Dunkel, Dan // SDM: Security Distributing & Marketing;Feb2010, Vol. 40 Issue 2, p44 

    The article offers the author's insight on the impact of mobile applications on security efforts and societal directions. He states that mobile applications are efficient in data mining and social network analysis. He mentions that video surveillance and mobile computing devices provide...

  • Real-time encryption could break VOD limits.  // CED;Oct2005, Vol. 31 Issue 10, p8 

    Reports that Harmonic Inc. has added real-time content encryption capabilities to its video-on-demand (VOD) transport platform, a move that should make advanced on-demand applications like network-based personal video recording much easier proposition for operators in the U.S. Overview on the...

  • Critical testing criteria: Smartphones. Garcia, Andrew // eWeek;4/19/2010, Vol. 27 Issue 8, p47 

    The article presents several factors to be considered when evaluating enterprise mobile operating system (OS) platforms. It suggests to avoid making mistake of trying the one size-fits-all approach and making a carrier decision based on price. It recommends to support for strong on-device...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics