TrueCrypt 4.2

TrueCrypt Foundation - (Open Source)



Encrypting a USB key or a whole disk or even creating virtual encrypted disks, all these are possible with TrueCrypt.

TrueCrypt is a solution for storing encrypted information, allowing to create encrypted virtual disks. When mounted, the media appear in Explorer as a local disk. The application is also able to encrypt an entire volume or partition, which is very useful if there are sensitive information on the USB drive, for example. The encrypted volume is seen by the system as a typical hard and has all the features, being necessary only to enter the password associated with the volume at the time of "montage".

The software also includes hardware acceleration for encryption and decryption of AES algorithm. Enabled by default , this small revolution concerns only the recent Intel processors with the necessary capabilities : Intel Core i7- 980X , Intel Core i7 -970 , Intel Core i5- 650, Intel Core i5- 655K , Intel Core i5- 660, Intel Core i5 -661 , Intel Core i5 -670 , Intel Core i5 -680 and more, the speed of encoding and decoding being up to 8 times faster.

A volume can be mounted directly under Windows subject to provide the correct password. It is possible to create partitions and storage devices encrypted on the hard disk sectors with 4096, 2048 or 1024 bytes.

Many standard algorithms are supported by TrueCrypt, such as AES-256, Blowfish, CAST5, Serpent, Triple DES, and Twofish.

Title:
TrueCrypt 4.2
File Size:
1.3 MB
Requirements:
Windows 2000 / XP / XP64
Language:
en-us
License:
Open Source
Date Added:
17 Apr 2006
Publisher:
TrueCrypt Foundation
Homepage:
http://www.truecrypt.org
MD5 Checksum:
A8420E0E8705E8D9885B31E269B78973

New features:
- TrueCrypt volumes can now be created under Linux.
- Ability to create a dynamic container whose physical size (actual disk space used) grows as new data is added to it. (Dynamic containers are pre-allocated NTFS sparse files).
- Volume passwords/keyfiles can be changed under Linux.
- Keyfiles can be created under Linux.
- Volume headers can be backed up and restored under Linux.
- Multiple keyfiles can be selected in the file selector by holding the Control (Ctrl) or Shift key (Windows).
- It is now possible to enable and directly set keyfiles by dragging the icon of keyfile(s) or of keyfile search path(s) to the password entry window (Windows only).
- New Linux command line option: -u, --user-mount, which can be used to set default user and group ID of the file system being mounted to the user and group ID of the parent process. Some file systems (such as FAT) do not support user permissions and, therefore, it is necessary to supply a default user and group ID to the system when mounting such file systems.
- The build.sh script can now perform automatic configuration of the Linux kernel source code, which is necessary in order to compile TrueCrypt on Linux. Note that this works only if the installed version of the kernel enables/supports it.
- TrueCrypt volume properties can be viewed under Linux.
- New Mount Option: 'system'. It is possible to place paging (swap) files on a TrueCrypt volume that is mounted with this option enabled. Thus, it is possible to use TrueCrypt to on-the-fly encrypt a paging file. (Windows, command line usage)
- New Mount Option: 'persistent'. A volume mounted with this option enabled is not displayed in the TrueCrypt GUI and is prevented from being auto-dismounted (Dismount All will not dismount the volume either). (Windows, command line usage)

Improvements:
- It is now possible to mount a single TrueCrypt volume from multiple operating systems at once (for example, a volume shared over network), provided that the volume is mounted as read-only under each system (Windows).
- Current directory is never left set to a removable device after a file (e.g., a container, keyfile, header backup) stored on it is selected via file selector in TrueCrypt. Therefore, it will be possible to Safely Remove the device in such cases. (Windows)
- Improved security of set-euid mode of execution (Linux).
- Other minor improvements

Bug fixes:
- It is now possible to dismount volumes that cannot be opened (for example, after disconnecting and reconnecting a USB flash drive formatted as NTFS containing a mounted TrueCrypt volume).
- Fixed bug that sometimes caused the mount process to fail under Linux when one or more TrueCrypt volumes were already mounted.
- Command line argument buffer is now wiped upon exit (Windows, command line usage).
- Other minor bug fixes




Screenshots

Related software





User Rating:

3.7/5 from 67 users