by TrueCrypt Foundation

an official application for residencythe-Using fly encryption on a disk, file, or complete storage device prevents encrypted copies of those files or directories.

Operating system: Windows

Publisher: TrueCrypt Foundation

Antivirus check: passed

Last revision: Last week

Report misleading

An important data encryption program, it is fully consistent with what many believe cannot be compromised by proprietary means of data encryption. TrueCrypt is distributed under a free and open source license.

By using this algorithm, you can create keys with several different hashing algorithms, including those based on AES, Serpent and Twofish. An external drive can be connected to the data on the fly, and data can then be copied or emailed to another destination. Alternatively, hard drives or USB sticks can be used for the creation of encrypted partitions.

A somewhat strange development occurred in 2014, which led to the discontinuation of the program. A program remains open, though it's recommended for familiarity. For reliable data protection it is recommended to use VeraCrypt & mdash; a separate branch from TrueCrypt, which supports more algorithms and continues to be actively developed.

- In Windows applications you are able to access, and therefore install, virtual hard disks in a file by encrypting them, creating them a encrypted disk, or converting them.

- Use this technology to secure an entire storage system, such as your computer's drive or hard drive;;

- There are ways to encrypt the disk on which Windows is installed. If you plan to download something, you'll need to provide a password;

- Real encryption is on one hand, very real, and also automatically encrypted.The ability to receive and respond as needed ; ;

- At any one time, there can be two levels of probable protection provided. You will avoid showing this if the adversary requests that you include the following information:1) The hidden partition of the computer system, and2) the hide-the-system password.A TrueCrypt file cannot distinguish between data volumes and random data (you cannot identify a TrueCrypt file).

- A layer of security is maintained between an OS and the TrueCrypt disk/drive, preventing the TrueCrypt operating system from distinguishing between it and the kernel;

- Encryption algorithms: AES-A variety of antibiotics available for use in the United States. Operation mode: XTS.

- A removable disk or an extended hard drive partition can be encrypted as well as selected data on a hard drive. You can continue to work with data without needing to remove the encryption key using a virtual disk.

TrueCrypt 4.2A (1.36 MB)
TrueCrypt 4.3A (1.49 MB)
TrueCrypt 5.0A (2.38 MB)
TrueCrypt 5.1A (2.52 MB)
TrueCrypt 6.0A (2.85 MB)
TrueCrypt 6.2A (3.04 MB)
TrueCrypt 6.3A (3.2 MB)
TrueCrypt 7.0A (3.33 MB)
TrueCrypt 7.1A (3.31 MB)
The TrueCrypt data encryption software is one of the best and brightest - in its category. Free and open source, this program is distributed without a charge. Several types of encryption algorithms are used. With encryption, a Mac, PC or tecnology happens on the go, can be exported to external USB devices, har drives and more. The development program has always worked in 2014, but with no explanation it is no longer available, thus you would think it could be accessed to familiarize with similar apps that are in use today. Using up is recommended when it comes to VeraCrypt & mdash from the same developers, with ongoing support.
The application puts an application to another software engine. it does not link to the website.
Advanced RAR Password Recovery logo
Preserving ZIP and RAR archives is made easier with passwords recovering ZIP and RAR encrypted archives.
Advanced Archive Password Recovery logo
Files like ZIPs and RARs that have been archived can be recovered and unlocked by using this password recovery app.
AxCrypt logo
is a free and easy-to-use security software tool that can protect your documents.
WinLicense logo
The advanced reverse engineer is designed for developing software for Windows
SecureIT logo
Using Folders Evaporating Software on any Windows PC enables you to encrypts and compress information.