Return to site

Full Disk Encryption Software Comparison

broken image


  1. Full Disk Encryption Windows 10
  2. Mcafee Full Disk Encryption Software
  1. Full disk encryption software is a must for many enterprises. Expert Karen Scarfone makes recommendations for selecting the best FDE solution for your organization's needs.
  2. Check Point Full Disk Encryption Software Blade vs Microsoft BitLocker: Which is better? We compared these products and thousands more to help professionals like you find the perfect solution for your business. Let IT Central Station and our comparison database help you with your research.

This is a technical feature comparison of different disk encryption software.

Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco AMP for Endpoints and Absolute Computrace, whereas WinMagic SecureDoc is most compared with Microsoft BitLocker, Symantec Endpoint Encryption and Sophos SafeGuard.

Some software also lets you buy additional objects as add-on purchases. Cost estimator - Home design software makes it easy for your dreams to outpace your realistic budget constraints. Look for software that includes a built-in cost estimator that can keep track of the projected price tag of. Build A House Software. Build-a-lot for Mac OS v.1.0. Send the housing market through the roof as you build, buy, and sell houses in the new strategy game, Build-a-lot! You can flip houses for quick cash or sit back and watch the rental income pile up. Build a house software. Home Builder Software: Comparisons of leading accounting, estimating, and project management software for homebuilders. Get free demos & quotes of the best systems. Top Home Builder Software - 2019 Reviews, Pricing & Demos. Construction Estimating Software shows any new home buyer or new home builder the cost to build a new home of any style, size, design, or quality in their city before they even shop for a home building site or new home plan. Easily realize furnished plan and render of home design, create your floor plan, find interior design and decorating ideas to furnish your house online in 3D. Home Design & FREE Floor Plan Software Online.

Full Disk Encryption Windows 10

Background information[edit]

EncryptionDeveloperFirst releasedLicensingMaintained?
Aloaha Crypt DiskAloaha2008Open source[citation needed]Yes
ArchiCrypt LiveSoftwaredevelopment Remus ArchiCrypt1998ProprietaryYes
BestCryptJetico1993[1]ProprietaryYes
BitArmor DataControlBitArmor Systems Inc.2008-05ProprietaryYes
BitLockerMicrosoft2006ProprietaryYes
Bloombase KeyparcBloombase2007ProprietaryNo[2]
BoxcryptorSecomba GmbH2011ProprietaryYes
CGDRoland C. Dowdeswell2002-10-04[3]BSDYes
CenterTools DriveLockCenterTools2008ProprietaryYes
Check Point Full Disk EncryptionCheck Point Software Technologies Ltd1999[4][5][6]ProprietaryYes
CipherShedCipherShed Project2014[7]TrueCrypt License Version 3.0[8]No
CrossCryptSteven Scherrer2004-02-10[9]GPLNo
CryFSSebastian Messmer2015LGPLv3Yes
CryhodPrim'X Technologies2010ProprietaryYes
CryptainerCypherix Software1999ProprietaryYes
Cryptic DiskExlade2003ProprietaryYes
CryptArchiverWinEncrypt?ProprietaryYes
Cryptoloop?2003-07-02[10]GPLNo
CryptomatorSkymatic UG (haftungsbeschränkt)2016-03-09GPLv3Yes
CryptoPro Secure Disk Enterprisecpsd it-services GmbH2010ProprietaryYes
CryptoPro Secure Disk for BitLockercpsd it-services GmbH2012ProprietaryYes
CryptSyncStefan Küng2012Gpl v2Yes
DiscryptorCosect Ltd.2008ProprietaryNo
DiskCryptorntldr2007GPLYes
DISK ProtectBecrypt Ltd2001ProprietaryYes
Cryptsetup / DmsetupChristophe Saout2004-03-11[11]GPLYes
Dm-crypt / LUKSClemens Fruhwirth (LUKS)2005-02-05[12]GPLYes
DriveCryptSecurStar GmbH2001ProprietaryYes[13]
DriveSentry GoAnywhere 2DriveSentry2008ProprietaryNo
E4MPaul Le Roux1998-12-18[14]Open sourceNo
e-Capsule Private SafeEISST Ltd.2005ProprietaryYes
eCryptfsDustin Kirkland, Tyler Hicks, (formerly Mike Halcrow)2005[15]GPLYes
EgoSecure HDD EncryptionEgoSecure GmbH2006ProprietaryYes
EncFSValient Gough2003[16]LGPLv3Yes
EncryptStickENC Security Systems2009ProprietaryYes
FileVaultApple Inc.2003-10-24ProprietaryYes
FileVault 2Apple Inc.2011-07-20ProprietaryYes
FREE CompuSecCE-Infosys2002ProprietaryYes
FreeOTFESarah Dean2004-10-10[17]Open sourceNo
GBDEPoul-Henning Kamp2002-10-19[18]BSDNo
GELIPawel Jakub Dawidek2005-04-11[19]BSDYes
GnuPGWerner Koch1999-09-07[20]GPLYes
gocryptfsJakob Unterwurzacher2015-10-07[21]MIT / X Consortium LicenseYes
KnoxAgileBits2010ProprietaryYes
KryptOSThe MorphOS Development Team2010ProprietaryYes
LibreCrypttdk2014-06-19[22]Open sourceNo
Loop-AESJari Ruusu2001-04-11GPLYes
McAfee Drive Encryption (SafeBoot)McAfee, LLC2007[23]ProprietaryYes
n-Crypt Pron-Trance Security Ltd2005ProprietaryYes
NetLib Encryptionizer (directory encryption)NetLib Security1987ProprietaryYes
PGPDiskPGP Corporation (acquired by Symantec in 2010)1998-09-01[24]ProprietaryYes
Private DiskDekart1993[25]ProprietaryYes
ProxyCryptv772013Open sourceYes
R-CryptoR-Tools Technology Inc2008ProprietaryYes
SafeGuard EasySophos (Utimaco)1993[26]ProprietaryYes
SafeGuard EnterpriseSophos (Utimaco)2007[27]ProprietaryYes
SafeGuard PrivateDiskSophos (Utimaco)[28]2000ProprietaryYes
SafeHouse ProfessionalPC Dynamics, Inc.1992ProprietaryYes
ScramdiskShaun Hollingworth1997-07-01Open sourceNo
Scramdisk 4 LinuxHans-Ulrich Juettner2005-08-06[29]GPLNo
SecuBoxAiko Solutions2007-02-19ProprietaryYes
SECUDE Secure NotebookSECUDE2003ProprietaryYes
SecureDocWinMagic Inc.1997ProprietaryYes
Seqrite Encryption ManagerQuick Heal Technologies Ltd.2017ProprietaryYes
Sentry 2020SoftWinter1998[30]ProprietaryNo
Softraid / RAID COpenBSD2007-11-01[31]BSDYes
SpyProof!Information Security Corp.2002ProprietaryYes
Svnd / VnconfigOpenBSD2000-12-01[32]BSDYes
Symantec Endpoint EncryptionSymantec Corporation2008ProprietaryYes
TcplayAlex Hornung2012-01-28[33]BSDYes
Trend Micro Endpoint Encryption (Mobile Armor)Trend Micro[34]2004 or earlier[35]ProprietaryYes
TrueCryptTrueCrypt Foundation2004-02-02[36]TrueCrypt License 3.1[37]No
USBCryptWinAbility Software Corp.2010ProprietaryYes
VeraCryptIDRIX2013-06-22[38]Apache License 2.0[39]

TrueCrypt License Version 3.0 (legacy code only) Drastic ds emulator apk download.

Yes
CyberSafe Top SecretCyberSoft2013ProprietaryYes
NameDeveloperFirst releasedLicensingMaintained?

Operating systems[edit]

NameWindows NTWindows Mobile (incl.Pocket PC)FreeBSDLinuxMac OS XNetBSDOpenBSDDragonFly BSDAndroidiOS
Aloaha Crypt DiskYesNoNoNoNoNoNoNo??
BestCrypt Volume EncryptionYesNoNoNo[40]YesNoNoNo??
BitArmor DataControlYesNoNoNoNoNoNoNo??
BitLockerYesNoNoPartial[41]Partial[41]NoNoNoNo?
Bloombase KeyparcYesNoNoYesYesNoNoNo??
BoxcryptorYesNoNoYesYesNoNoNoYesYes
CenterTools DriveLockYesNoNoNoNoNoNoNo??
CGDNoNoNoNoNoYesNoNo??
Check Point Full Disk EncryptionYesYesNoYes[42]YesNoNoNo??
CipherShedYesNoNo[43]YesYesNoNoNoYes[44]?
CrossCryptYes[45]NoNoNoNoNoNoNoNo?
CryFSYesNoYesYesYesYesYesYesNo?
CryhodYesNoNoYesNoNoNoNo??
CryptainerYesYes[46]NoNoNoNoNoNo??
CryptArchiverYesNoNoNoNoNoNoNo??
Cryptic DiskYesNoNoNoNoNoNoNoNoNo
CryptoloopYes[47]NoNoYesNoNoNoNo??
CryptomatorYes[48]NoNoYesYesNoNoNoYesYes
CryptoPro Secure Disk EnterpriseYesNoNoNoNoNoNoNoNo?
CryptoPro Secure Disk for BitLockerYesNoNoNoNoNoNoNoNo?
Cryptsetup / DmsetupYes[47]NoNoYesNoNoNoYes??
CryptSyncYesNoNoYesYesNoNoNoNo?
DiscryptorNoNoNoNoNoNoNoNo??
DiskCryptorYesNoNoNoNoNoNoNo??
DISK ProtectYesNoNoNoNoNoNoNo??
Dm-crypt / LUKSYes[47]Yes[49]NoYesNoNoNoYes??
DriveCryptYesNoNoNoNoNoNoNo??
DriveSentry GoAnywhere 2YesNoNoNoNoNoNoNo??
E4MYesNoNoNoNoNoNoNo??
e-Capsule Private SafeYesNoNoNoNoNoNoNo??
eCryptfsNoNoNoYesNoNoNoNo??
EgoSecure HDD EncryptionYesNoNoNoNoNoNoNo??
EncFSYes[50]Yes[51]Yes (FUSE)Yes (FUSE)Yes[50]Yes (FUSE)Yes (FUSE)Yes (FUSE)Yes[51]?
EncryptStickYesNoNoYesYesNoNoNo??
FileVaultNoNoNoNoYesNoNoNo??
FileVault 2NoNoNoPartial[52]YesNoNoNo??
FREE CompuSecYesNoNoNoNoNoNoNo??
FreeOTFEYesYesNoPartial[53]NoNoNoNoNo?
GBDENoNoYesNoNoNoNoNo??
GELINoNoYesNoNoNoNoNo??
KnoxNoNoNoNoYesNoNoNo??
LibreCryptYesNoNoPartial[54]NoNoNoNoYes[55]?
Loop-AESNoNoNoYesNoNoNoNo??
McAfee Drive Encryption (SafeBoot)YesYes[56]NoNoYesNoNoNo??
n-Crypt ProYesNoNoNoNoNoNoNo??
NetLib Encryptionizer (directory encryption)YesNoNoNoNoNoNoNoNoNo
PGPDiskYesNoNoNoYesNoNoNo??
PGP Whole Disk EncryptionYesYesNoYesYesNoNoNo??
Private DiskYesNoNoNoNoNoNoNo??
ProxyCryptYesNoNoNoNoNoNoNoNo?
R-CryptoYesNoNoNoNoNoNoNo??
SafeGuard EasyYesNoNoNoNoNoNoNo??
SafeGuard EnterpriseYesNoNoNoYesNoNoNo??
SafeGuard PrivateDiskYesNoNoNoNoNoNoNo??
SafeHouse ProfessionalYesNoNoNoNoNoNoNo??
ScramdiskYesNoNoYesNoNoNoNo??
Scramdisk 4 LinuxNoNoNoYesNoNoNoNo??
SecuBoxNoYesNoNoNoNoNoNo??
SecureDocYesNoNoYesYesNoNoNo??
Sentry 2020YesNoNoNoNoNoNoNo??
Seqrite Volume EncryptionYesNoNoNoNoNoNoNoNoNo
Softraid / RAID CNoNoNoNoNoNoYesNo??
SpyProof!YesNoNoNoNoNoNoNo??
Svnd / VnconfigNoNoNoNoNoNoYesNo??
Symantec Endpoint EncryptionYesNoNoNo[57]YesNoNoNo??
TcplayNoNoNoYesNoNoNoYesNo?
Trend Micro Endpoint EncryptionYesNoNoNoYesNoNoNoNo?
TrueCryptYesNoNo[58]YesYesNoNoNoYes[44]?
USBCryptYesNoNoNoNoNoNoNoNo?
VeraCryptYesNoYesYesYesNoNoNoYes[59]?
CyberSafe Top SecretYesNoNoNoNoNoNoNoYes?
NameWindows NTWindows Mobile (incl. Pocket PC)FreeBSDLinuxMac OS XNetBSDOpenBSDDragonFly BSDAndroidiOS

Features[edit]

  • Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established)[60] can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
  • Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
  • Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.
  • Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.[clarification needed]
  • Multiple keys: Whether an encrypted volume can have more than one active key.
  • Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.
  • Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.
  • Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
  • Filesystems: What filesystems are supported.
  • Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
NameHidden containersPre-boot authenticationSingle sign-onCustom authenticationMultiple keysPassphrase strengtheningHardware accelerationTPMFilesystemsTwo-factor authentication
Aloaha Secure StickYesNoN/AYesYesNoNoNoNTFS, FAT32Yes
ArchiCrypt LiveYes[61]NoN/ANoYes[61][62]NoNoNo?Yes[61][63]
BestCryptYesYes?NoYes[64]YesYesYesAny supported by OSYes[65]
BitArmor DataControlNoYes?NoYesYesNoNoNTFS, FAT32 on non-system volumesNo
BitLockerNoYes[66]NoYes[67]Yes[68]Yes[69]YesYes[68]Chiefly NTFS [Note 1]Yes [Note 2]
Bloombase KeyparcNoNoN/AYesYesYesYesNo??
CGDNoNoN/AYes[70]Yes[71]Yes[70]NoNoAny supported by OSYes[70]
CenterTools DriveLockNoYesYesNoNoYesNoNoAny supported by OSYes
Check Point Full Disk EncryptionYesYesYesYesYesYesYesYesNTFS, FAT32Yes
CipherShedYes
(limited to one per
'outer' container)
only on Windows[72]?Noyes with multiple keyfiles[73][74]YesYesNo[75]Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76]Yes
CryFSNoNoN/ANoNoYes[77]NoNoAny supported by OSNo
CrossCryptNoNoN/ANoNoNoNoNo?No
CryptArchiverNoNoN/ANoNo?NoNo??
Cryptic DiskYesNoNoNoYesYesYesNoAny supported by OSYes
CryhodNoYesYesNoYesYesYesNoAny supported by OSYes
CryptoloopNoYes[78]?YesNoNoYes[citation needed]NoAny supported by OS?
CryptomatorNoNoN/ANoNoYesYesNoAny supported by OSNo
CryptoPro Secure Disk EnterpriseYes with add-on Secure DeviceYesYesYesYesYesYesYesAny supported by OSYes
CryptoPro Secure Disk for BitLockerYes with add-on Secure DeviceYesYesYesYesYesYesYesAny supported by OSYes
Cryptsetup / DmsetupNoYes[78]?YesNoNoYesNoAny supported by OSYes
DiskCryptorNoYes?NoNoNoYes[79]NoOnly Windows MBR volumes; no UEFI GPT drivesYes[79]
DISK ProtectNoYes[80]YesNoYes[80]NoYesYesNTFS,FAT32Yes
Dm-crypt / LUKSNoYes[78]?YesYesYesYesPartial[81][Note 3]Any supported by OSYes
DriveCryptYes[82]YesYesYesYesYesYesNoAny supported by OSYes
DriveSentry GoAnywhere 2NoNoN/AYesNoYesNo?Any supported by OSYes
E4MNoNoN/ANoNo?NoNo?No
e-Capsule Private SafeYes[83]NoN/ANoYes[83]NoYesNo??
eCryptfsNoNoN/AYesYesYesYesYesYes[84]Yes
EgoSecure HDD EncryptionNoYesYesYesYesYesYes[85]YesNTFS, FAT32Yes
FileVaultNoNoN/ANoTwo passwords[86]Yes[86]?NoHFS+, possibly othersNo
FileVault 2NoYesYesNoYesYesYes[87]NoHFS+, possibly othersNo
FREE CompuSecNoYes?NoNoNoNoNoAny supported by OSNo
FreeOTFEYesNoN/AYes[88]Yes[89]YesYesNoAny supported by OSYes
GBDENoNo[90]N/AYesYes[91]No[91]No[90]NoAny supported by OSYes
GELINoYes[90]?YesYes[92]Yes[92]Yes[90]NoAny supported by OSYes
Loop-AESNoYes[93]?Yes[93]Yes[93]Yes[93]Yes[93]NoAny supported by OSYes[94]
McAfee Drive Encryption (SafeBoot)YesYesYesYesYesYesYes[85][95]YesAny supported by OSYes
n-Crypt ProNoNoN/ANoNoN/A[96]NoNo??
PGPDiskNoYes[97]Yes?YesYes[98]?Yes?Yes
Private DiskNoNoN/ANoYesYesNoNoAny supported by OSYes
ProxyCryptYesNoNoNoNoYesYesNoAny supported by OSYes
R-Crypto?NoN/A?????Any supported by OS?
SafeGuard EasyNoYes?NoYesYesNoYes[99]Any supported by OSYes
SafeGuard EnterpriseNoYesYesNoYesYesNoYes[99]Any supported by OSYes
SafeGuard PrivateDiskNoNoN/ANoYesYesNoYes[100]Any supported by OSYes
SafeHouse ProfessionalNoNoN/AYesYesYesNoNoAny supported by OSYes
ScramdiskYesNoN/ANoNoNoNoNo?Last update to web site 2009-07-02
Scramdisk 4 LinuxYes[101]NoN/ANoNoYes[101]NoNoext2, ext3, reiserfs, minix, ntfs, vfat/msdosNo
SecuBoxNoNoN/ANoNoYesNoNo?No
SecureDocNoYes[102]?YesYesYesYesYes?Yes
Seqrite Encryption ManagerNoYesYesNoYesYesYesNoAny supported by OSNo
Sentry 2020NoNo?NoNoNoNoNo?No
Softraid / RAID CNoNo????Yes?Any supported by OS?
Svnd / VnconfigNoNoN/ANoNoYes[103]Yes?Any supported by OS?
Symantec Endpoint EncryptionNoYesYesYesYesYesNoNoNTFS, FAT32Yes
Trend Micro Endpoint EncryptionNoYesYesYesYesYes[104]Yes[105]NoAny supported by OSYes[106]
TrueCrypt[Note 4]Yes
(limited to one per
'outer' container)
only on Windows[107]?Noyes with multiple keyfiles[74][108]YesYesNo[75]Only Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouraged[76]Yes
VeraCryptYes
(limited to one per
'outer' container)
only on Windows[109]NoNoyes with multiple keyfilesYesYesNoOnly Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouragedYes
CyberSafe Top SecretYesNoNoNoYesYesYesNoOnly Windows MBR volumes; no UEFI GPT drives, and dynamic drives discouragedYes
NameHidden containersPre-boot authenticationSingle sign-onCustom authenticationMultiple keysPassphrase strengtheningHardware accelerationTPMFilesystemsTwo-factor authentication
Software
  1. ^Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
  2. ^BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
  3. ^An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input
  4. ^The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some 'unfixed security issues' and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. http://www.zdnet.com/truecrypt-quits-inexplicable-7000029994/

Layering[edit]

  • Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
  • Partition: Whether individual disk partitions can be encrypted.
  • File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
  • Swap space: Whether the swap space (called a 'pagefile' on Windows) can be encrypted individually/explicitly.
  • Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
NameWhole diskPartitionFileSwap spaceHibernation fileRAID
Aloaha Secure StickNoNoYesNoNo?
ArchiCrypt LiveYes
(except for the boot volume)
YesYesNoNo?
BestCryptYesYesYesYesYes[114]?
BitArmor DataControlNoYesNoYesYes?
BitLockerYes
(except for the boot volume)
YesYes[115]Yes
(parent volume is encrypted)
Yes
(parent volume is encrypted)
?
Bloombase KeyparcYesYesYesYesNo?
CenterTools DriveLockYesYesYesYesYes?
CGDYesYesYes[70]YesNo?
Check Point Full Disk EncryptionYesYesYesYesYes?
CipherShedYesYesYesYesonly on Windows?
CrossCryptNoNoYesNoNo?
CryFSNoNoNoNoNo?
CryptArchiverNoNoYesNoNo?
Cryptic DiskNoYesYesNoNo?
CryhodNoYesNoYesYes
(parent volume is encrypted)
?
CryptoloopYesYesYesYesNo?
CryptomillYesN/AYesN/AN/A?
CryptoPro Secure Disk EnterpriseYesYesYes
(add-on Secure Device)
YesYes?
CryptoPro Secure Disk for BitLockerYesYesYesYesYes?
DiskCryptorYesYesNoYesYes?
Disk ProtectYesNoNoYesYes?
Dm-crypt / LUKSYesYesYes[116]YesYes[117]?
DriveCryptYesYes[82]Yes[82]YesYes?
DriveSentry GoAnywhere 2NoYesYesNoNo?
E4MNoYesYesNoNo?
e-Capsule Private SafeNoNoYes[118]NoNo?
eCryptfsNoNoYesNoNo?
EgoSecure HDD EncryptionYesYesYesYesYes?
FileVaultNoNoYes[86]Yes[119][86]Yes[119][120]
FileVault 2Yes[121]Yes[87]NoYesYes?
FREE CompuSecYesNoYesYesYes?
FreeOTFEYes
(except for the boot volume)
YesYesNoNo?
GBDEYesYesYes[122]YesNo?
GELIYesYesYes[122]YesNo?
Loop-AESYesYes[93]Yes[93]Yes[93]Yes[93]?
McAfee Drive Encryption (SafeBoot)YesYesYesYesYes[123]?
n-Crypt ProYesYesYesNoNo?
PGPDiskYesYesYesYesonly on Windows?
Private DiskNoNoYesNoNo?
ProxyCryptYesYesYesNoNo?
R-CryptoNoNoYesNoNo?
SafeGuard EasyYesYesextra moduleYesEach sector on disk is encrypted?
SafeGuard EnterpriseYesYesYesYesEach sector on disk is encrypted?
SafeGuard PrivateDiskNoNoYesNoNo?
SafeHouse ProfessionalNoNoYesNoNo?
ScramdiskNoYesYesNoNo?
Scramdisk 4 LinuxYesYesYesYesNo?
SecuBoxNoNoYesN/ANo?
SecureDocYes[102]YesYesYesYes?
Sentry 2020NoNoYesNoNo?
Seqrite Encryption ManagerYesYesYesYesYesRAID-5
Softraid / RAID CYesYesNoYes (encrypted by default in OpenBSD)[124]No?
Svnd / Vnconfig?YesYesYes (encrypted by default in OpenBSD)??
SpyProof!NoYesYesNoNo?
Symantec Endpoint EncryptionYesYesYesYesYes?
Trend Micro Endpoint EncryptionYesYesYesYesYes?
TrueCryptYes[125]YesYesYesonly on Windows[107]?
VeraCryptYesYesYesYesonly on Windows[107]?
CyberSafe Top SecretNoYesYesNoNo?
NameWhole diskPartitionFileSwap spaceHibernation fileRAID

Modes of operation[edit]

Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.

Realtek Wireless LAN Driver for Windows 10 (64-bit & 32-bit) - Desktop. A Network Adapter / WiFi Driver is software which enables communication between your computer and your network adapter or network interface card (NIC). Most modern NICs support wireless connectivity, or WiFi. Common network issues include failure to dectect or connect to the network or slow or unreliable internet connections. Apr 24, 2017  In Device Manager, select Network adapters the network adapter name. Press and hold (or right-click) the network adapter name, and then select Update driver Search automatically for updated driver software. Follow the steps, then select Close. If a new driver is found, it'll be downloaded and installed automatically. Feb 06, 2019  Purpose. This download installs base drivers, Intel® PROSet for Windows Device Manager., advanced networking services for teaming and VLANs (ANS) for Intel® Network Adapters with Windows 10. Note: The drivers contained in this download are not compatible with Windows Server. Windows wireless lan driver.

What is a Virtual Tape Library? QUADStor VTL Introduction Tape technology remains the most cost effective backup solution till date. With current tape technology, tape media have a lifetime of 30 years or more and therefor are the number one choice for data archival. A virtual tape library (VTL) is a data storage virtualization technology used typically for backup and recovery purposes. A VTL presents a storage component (usually hard disk storage) as tape libraries or tape drives for use with existing backup software. A virtual tape library (VTL) is a disk-based backup system which appears to the backup host as a real tape library system. But Backup streams are written to and restored from disk.Virtual Tape Library is a piece of software which will emulate wired verity of Tape Libraries and tape drives. For system administrators who can maintain the backup infrastructure on their own, we offer a Free version of StarWind Virtual Tape Library. StarWind VTL Free delivers the unrestricted set of features and a GUI that works only in monitoring mode. Also, the free version is supported only in the open. Free virtual tape library.

VAG KKL USB OBD cable with FTDI FT232RL Chip.(Used for VW - Must have the FTDI chip, Look at ebay. Inpa 5.0.6 download.

Mcafee Full Disk Encryption Software

  • CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
  • CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
  • CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
  • LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[126]
  • XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
  • Authenticated encryption: Protection against ciphertext modification by an attacker
NameCBC w/ predictable IVsCBC w/ secret IVsCBC w/ random per-sector keysLRWXTSAuthenticated encryption
Aloaha Crypt DiskNoNoNoYesYes?
ArchiCrypt LiveNoNoNoLegacy support[127]Yes?
BestCryptNoYesNoYes[128]Yes[129]?
BitArmor DataControlNoYesPlumb-IVNoNo?
BitLockerNo[130]Yes[130]NoNoYes, Windows 10 10547+?
Bloombase Keyparc?Yes????
CGDNoYes[131]NoNoNo?
CenterTools DriveLock??????
Check Point Full Disk EncryptionNoNoYesYesYes?
CipherShedLegacy support[132]NoNoLegacy support[133]Yes[134]?
CrossCryptYesNoNoNoNo?
CryFSNoNoYesNoNo?
CryptArchiver??????
Cryptic DiskNoNoNoNoYesNo
CryhodNoYesNoNoNo?
CryptoloopYesNoNoNoNoNo
DiskCryptorNoNoNoNoYes?
Dm-crypt / LUKSYesYesNoYes, using *-lrw-benbi[135]Yes, using *-xts-plainYes, using --integrity mode[136]
DriveCrypt??????
DriveSentry GoAnywhere 2??????
E4M???NoNo?
e-Capsule Private Safe??????
eCryptfsNoYes?NoNo?
EgoSecure HDD EncryptionNoYesNoNoNo?
FileVaultYes[86]NoNoNoNo?
FileVault 2NoNoNoNoYes[137]?
FREE CompuSecYesNoNoNoNo?
FreeOTFEYesYesNoYesYesNo
GBDENoNoYes[91]NoNo?
GELINoYes[138]NoNoYes?
Loop-AESsingle-key, multi-key-v2 modes[93]multi-key-v3 mode[93]NoNoNoNo
McAfee Drive Encryption (SafeBoot)NoYesNoNoNo?
n-Crypt Pro??NoNoNo?
PGPDisk??????
Private DiskNoYesNoNoNo?
ProxyCryptNoNoNoNoYes?
R-Crypto??????
SafeGuard Easy??????
SafeGuard Enterprise??????
SafeGuard PrivateDisk??????
SafeHouse ProfessionalYesNoNoNoNo?
ScramdiskNoYesNoNoNo?
Scramdisk 4 LinuxNoYes[139]NoYes[140]Yes[141]?
SecuBoxYesNoNoNoNo?
SecureDoc??????
Sentry 2020??????
Seqrite Encryption ManagerNoYesNoYesYes?
Softraid / RAID C????Yes[142]?
Svnd / Vnconfig??????
Symantec Endpoint EncryptionNoNoYesNoNo?
TrueCryptLegacy support[132]NoNoLegacy support[133]Yes[143]No
USBCryptNoYesNoNoYes?
VeraCryptNoNoNoNoYes?
CyberSafe Top SecretNoNoNoNoYes?
NameCBC w/ predictable IVsCBC w/ secret IVsCBC w/ random per-sector keysLRWXTSAuthenticated encryption

See also[edit]

Notes and references[edit]

  1. ^'Jetico Mission'. Jetico. Retrieved 2014-05-30.
  2. ^'Keyparc - Free Encryption for Everyone'. Bloombase. Retrieved 2014-11-28.
  3. ^Roland Dowdeswell (2002-10-04). 'CryptoGraphic Disk'. mailing list announcement. Retrieved 2007-01-14.
  4. ^'Protect guards laptop and desktop data'. Archived from the original on March 2, 2005. Retrieved 2008-09-03.
  5. ^Company and product name change to Pointsec 'Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc'. Archived from the original on 2004-08-20. Retrieved 2008-09-03.
  6. ^'Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent'. Archived from the original on 2008-08-20. Retrieved 2008-09-03.
  7. ^Niklas Lemcke (2014-12-15). 'Pre-Alpha testing started'. Retrieved 2014-12-24.
  8. ^'TrueCrypt License Version 3.0'. TrueCrypt Foundation. 2012-02-07. Retrieved 2014-12-24.
  9. ^Sarah Dean (2004-02-10). 'OTFEDB entry'. Archived from the original on 2008-12-11. Retrieved 2008-08-10.
  10. ^Initial cryptoloop patches for the Linux 2.5 development kernel: 'Archived copy'. Archived from the original on 2005-01-10. Retrieved 2006-12-24.CS1 maint: archived copy as title (link)
  11. ^dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
  12. ^Clemens Fruhwirth. 'LUKS version history'. Archived from the original on 2006-12-25. Retrieved 2006-12-24.
  13. ^SecurStar GmbH. 'DriveCrypt v5.8 Released'. Archived from the original on 2015-10-27. Retrieved 2015-10-26.
  14. ^'archived E4M documentation'. Archived from the original on 2000-05-24.
  15. ^'eCryptfs'. Retrieved 2008-04-29.
  16. ^Valient Gough (2003). 'EncFS - an Encrypted Filesystem'. README.md file. Retrieved 2007-01-14.
  17. ^'FreeOTFE version history'. Archived from the original on 2006-12-07. Retrieved 2006-12-24.
  18. ^'gbde(4) man page in FreeBSD 4.11'. GBDE manual page as it appeared in FreeBSD 4.11. Retrieved 2006-12-24.
  19. ^'geli(8) man page in FreeBSD 6.0'. GELI manual page as it first appeared in FreeBSD 6.0. Retrieved 2006-12-24.
  20. ^Release Notes. GnuPG
  21. ^'gocryptfs changelog on github'. Retrieved 2018-01-16.
  22. ^https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396. Retrieved 2015-09-14.Missing or empty |title= (help)
  23. ^'McAfee Drive Encryption'. product description. McAfee. Retrieved 2019-07-31.
  24. ^'PGP 6.0 Freeware released- any int'l links?'. Newsgroup: comp.security.pgp. Usenet:6sh4vm$jbf$1@news.cybercity.dk. Retrieved 2007-01-04.
  25. ^'Dekart Encryption software timeline'. Dekart.
  26. ^'SafeGuard Easy 4.5 Technical Whitepaper'(PDF). Utimaco. Retrieved 2009-08-10.
  27. ^'SafeGuard Enterprise Technical Whitepaper'(PDF). Utimaco. Retrieved 2009-08-10.
  28. ^Rebranded as ThinkVantage Client Security 'ThinkVantage Technologies Deployment Guide'(PDF). Lenovo. Retrieved 2008-03-05.[permanent dead link]
  29. ^'ScramDisk 4 Linux Releases'.
  30. ^'Sentry 2020 news'. Retrieved 2007-01-02.
  31. ^'OpenBSD 4.2 Changelog'.
  32. ^'OpenBSD 2.8 Changelog'.
  33. ^'bwalex/tc-play'. 2019-08-27.
  34. ^Trend Micro
  35. ^'Mobile Armor: Your Data.Secure. Everywhere'. 4 September 2004. Archived from the original on 4 September 2004.
  36. ^'TrueCrypt'.
  37. ^'TrueCrypt License Version 3.1'. TrueCrypt Foundation. 2014-05-28. Retrieved 2014-05-29.
  38. ^'VeraCrypt'.
  39. ^'Apache License 2.0'. IDRIX. 2015-06-28. Retrieved 2015-08-08.
  40. ^'Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy'.
  41. ^ ab[1] FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX
  42. ^'Archived copy'(PDF). Archived from the original(PDF) on 2015-09-23. Retrieved 2014-12-14.CS1 maint: archived copy as title (link)
  43. ^[2] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
  44. ^ ab[3] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
  45. ^CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
  46. ^[4] PocketPC freeware release- SmartPhone beta available
  47. ^ abc[5] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
  48. ^'Cryptomator - Free Cloud Encryption'.
  49. ^[6] FreeOTFE4PDA supports dm-crypt/LUKS volumes
  50. ^ ab'Safe - Protect Your Files'.
  51. ^ ab'Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS'.
  52. ^[7] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
  53. ^[8] Supports Linux volumes
  54. ^[9] Supports Linux volumes
  55. ^[10] Third party app allows a user to open LibreCrypt compatible LUKS containers
  56. ^'Endpoint Encryption Datasheet'. McAfee. Retrieved 2010-06-14.
  57. ^'Endpoint Encryption Powered by PGP Technology - Symantec'.
  58. ^[11] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
  59. ^[12] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  60. ^[13] Hidden containers description from Jetico (BestCrypt)
  61. ^ abcSecret-containers and Camouflage files ArchiCrypt Live Description
  62. ^Supports 'Guest' keys
  63. ^Using 'Archicrypt Card'
  64. ^Supported by the BestCrypt container format; see BestCrypt SDK
  65. ^Supported by the BestCrypt Volume Encryption software
  66. ^With PIN or USB key
  67. ^BitLocker Drive Encryption: Value Add Extensibility Options
  68. ^ ab'BitLocker Drive Encryption Technical Overview'. Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13.
  69. ^Recovery keys only.
  70. ^ abcdRoland C. Dowdeswell, John Ioannidis. 'The CryptoGraphic Disk Driver'(PDF). CGD Design Paper. Retrieved 2006-12-24.
  71. ^Federico Biancuzzi (2005-12-21). 'Inside NetBSD's CGD'. interview with Roland Dowdeswell. ONLamp.com. Retrieved 2006-12-24.
  72. ^'Operating Systems Supported for System Encryption'(PDF). CipherShed Documentation. CipherShed Project. Retrieved 2014-12-27.
  73. ^Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  74. ^ ab'Keyfiles'. TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28.
  75. ^ ab'Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?'. TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28.
  76. ^ ab'Future'. TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link]
  77. ^'CryFS: How it works'. Retrieved 2016-09-23.
  78. ^ abcdm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
  79. ^ ab'DiskCryptor Features'. Archived from the original on 2010-05-29. Retrieved 2010-05-25.
  80. ^ ab'DISK Protect Data Sheet'(PDF). Retrieved 2018-12-02.
  81. ^'cryptsetup Frequently Asked Questions'. Retrieved 2016-01-07.
  82. ^ abc'DriveCrypt features'. SecurStar GmbH. Retrieved 2007-01-03.
  83. ^ ab'Multi level access with separate access credentials, each enabling a different set of functional or logical operations'. EISST Ltd. Retrieved 2007-07-25.
  84. ^uses the lower filesystem (stacking)
  85. ^ ab'Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3'. Intel. Retrieved 2012-07-26.
  86. ^ abcdeJacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). 'Unlocking FileVault: An Analysis of Apple's disk encryption'(PDF). Retrieved 2012-01-03.Cite journal requires |journal= (help)
  87. ^ ab'Mac OS X 10.7 Lion: the Ars Technica review'. Ars Technica. 2011-07-20. Retrieved 2012-01-03.
  88. ^FreeOTFE has a modular architecture and set of components to allow 3rd party integration
  89. ^FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
  90. ^ abcd'FreeBSD Handbook: Encrypting Disk Partitions'. Retrieved 2006-12-24.
  91. ^ abcPoul-Henning Kamp. 'GBDE - GEOM Based Disk Encryption'(PDF). GBDE Design Document. Retrieved 2006-12-24.
  92. ^ ab'geli(8) man page in FreeBSD-current'. GELI manual page in current FreeBSD. Retrieved 2006-12-24.
  93. ^ abcdefghijkJari Ruusu. 'loop-AES README file'. Retrieved 2007-04-23.
  94. ^Using customization
  95. ^'McAfee Endpoint Encryption'(PDF). McAfee. Archived from the original(PDF) on 2010-12-17. Retrieved 2012-07-26.
  96. ^n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
  97. ^'PGP Whole Disk Encryption FAQ'. PGP Corporation. Retrieved 2006-12-24.
  98. ^PGP private keys are always protected by strengthened passphrases
  99. ^ ab'Embedded Security: Trusted Platform Module Technology Comes of Age'. Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04.
  100. ^'ThinkVantage Technologies Deployment Guide'(PDF). Lenovo. Retrieved 2008-03-05.
  101. ^ abFor Truecrypt containers
  102. ^ ab'SecureDoc Product Information'. WinMagic Inc. Archived from the original on 2008-03-13. Retrieved 2008-03-05.
  103. ^optional by using -K OpenBSD Manual Pages: vnconfig(8)
  104. ^'Endpoint Encryption'.
  105. ^'Solutions for Solid-State Drives (SSD) - Endpoint Encryption'. Archived from the original on 2014-11-29. Retrieved 2014-11-17.
  106. ^'Support for smart card readers - Endpoint Encryption'.
  107. ^ abc'Operating Systems Supported for System Encryption'. TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28.
  108. ^Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  109. ^'Operating Systems Supported for System Encryption'. VeraCrypt Documentation. IDRIX. Retrieved 2017-10-11.
  110. ^'Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy'. Archived from the original on 2009-08-29. Retrieved 2009-09-17.
  111. ^Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
  112. ^dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
  113. ^yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
  114. ^Uses proprietary e-Capsule file system not exposed to the OS.
  115. ^ abnot technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
  116. ^http://macmarshal.com/images/Documents/mm_wp_102.pdf[permanent dead link]
  117. ^'Use FileVault to encrypt the startup disk on your Mac'.
  118. ^ abFile-based volume encryption is possible when used with mdconfig(8) utility.
  119. ^'Control Break International Debuts SafeBoot Version 4.27'. September 2004. Retrieved 2015-03-05.
  120. ^http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
  121. ^however, not Windows UEFI-based computers with a GUID partition table (GPT)
  122. ^LRW_issue
  123. ^Containers created with ArchiCrypt Live version 5 use LRW
  124. ^'New features in BestCrypt version 8'. Jetico. Archived from the original on 2007-02-04. Retrieved 2007-03-02.
  125. ^'New features in version 2'. Jetico. Archived from the original on 2008-09-05. Retrieved 2009-03-01.
  126. ^ abNiels Fergusson (August 2006). 'AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista'(PDF). Microsoft. Retrieved 2008-02-22.Cite journal requires |journal= (help)
  127. ^'man 4 cgd in NetBSD-current'. NetBSD current manual page on CGD. 2006-03-11. Retrieved 2006-12-24.
  128. ^ abContainers created with TrueCrypt versions 1.0 through 4.0 use CBC.
  129. ^ abContainers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
  130. ^Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
  131. ^Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
  132. ^'cryptsetup - manage plain dm-crypt and LUKS encrypted volumes'. 2018-01-01. Retrieved 2018-05-08.
  133. ^'OS X Lion: About FileVault 2'. Retrieved 2011-01-03.
  134. ^'Linux/BSD disk encryption comparison'. Archived from the original on 2007-06-29. Retrieved 2006-12-24.
  135. ^For Scramdisk containers
  136. ^For Truecrypt 4 containers
  137. ^For Truecrypt 5 and 6 containers
  138. ^''CVS: cvs.openbsd.org: src' - MARC'.
  139. ^Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.


Software
  1. ^Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
  2. ^BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
  3. ^An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input
  4. ^The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some 'unfixed security issues' and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. http://www.zdnet.com/truecrypt-quits-inexplicable-7000029994/

Layering[edit]

  • Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table.
  • Partition: Whether individual disk partitions can be encrypted.
  • File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
  • Swap space: Whether the swap space (called a 'pagefile' on Windows) can be encrypted individually/explicitly.
  • Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
NameWhole diskPartitionFileSwap spaceHibernation fileRAID
Aloaha Secure StickNoNoYesNoNo?
ArchiCrypt LiveYes
(except for the boot volume)
YesYesNoNo?
BestCryptYesYesYesYesYes[114]?
BitArmor DataControlNoYesNoYesYes?
BitLockerYes
(except for the boot volume)
YesYes[115]Yes
(parent volume is encrypted)
Yes
(parent volume is encrypted)
?
Bloombase KeyparcYesYesYesYesNo?
CenterTools DriveLockYesYesYesYesYes?
CGDYesYesYes[70]YesNo?
Check Point Full Disk EncryptionYesYesYesYesYes?
CipherShedYesYesYesYesonly on Windows?
CrossCryptNoNoYesNoNo?
CryFSNoNoNoNoNo?
CryptArchiverNoNoYesNoNo?
Cryptic DiskNoYesYesNoNo?
CryhodNoYesNoYesYes
(parent volume is encrypted)
?
CryptoloopYesYesYesYesNo?
CryptomillYesN/AYesN/AN/A?
CryptoPro Secure Disk EnterpriseYesYesYes
(add-on Secure Device)
YesYes?
CryptoPro Secure Disk for BitLockerYesYesYesYesYes?
DiskCryptorYesYesNoYesYes?
Disk ProtectYesNoNoYesYes?
Dm-crypt / LUKSYesYesYes[116]YesYes[117]?
DriveCryptYesYes[82]Yes[82]YesYes?
DriveSentry GoAnywhere 2NoYesYesNoNo?
E4MNoYesYesNoNo?
e-Capsule Private SafeNoNoYes[118]NoNo?
eCryptfsNoNoYesNoNo?
EgoSecure HDD EncryptionYesYesYesYesYes?
FileVaultNoNoYes[86]Yes[119][86]Yes[119][120]
FileVault 2Yes[121]Yes[87]NoYesYes?
FREE CompuSecYesNoYesYesYes?
FreeOTFEYes
(except for the boot volume)
YesYesNoNo?
GBDEYesYesYes[122]YesNo?
GELIYesYesYes[122]YesNo?
Loop-AESYesYes[93]Yes[93]Yes[93]Yes[93]?
McAfee Drive Encryption (SafeBoot)YesYesYesYesYes[123]?
n-Crypt ProYesYesYesNoNo?
PGPDiskYesYesYesYesonly on Windows?
Private DiskNoNoYesNoNo?
ProxyCryptYesYesYesNoNo?
R-CryptoNoNoYesNoNo?
SafeGuard EasyYesYesextra moduleYesEach sector on disk is encrypted?
SafeGuard EnterpriseYesYesYesYesEach sector on disk is encrypted?
SafeGuard PrivateDiskNoNoYesNoNo?
SafeHouse ProfessionalNoNoYesNoNo?
ScramdiskNoYesYesNoNo?
Scramdisk 4 LinuxYesYesYesYesNo?
SecuBoxNoNoYesN/ANo?
SecureDocYes[102]YesYesYesYes?
Sentry 2020NoNoYesNoNo?
Seqrite Encryption ManagerYesYesYesYesYesRAID-5
Softraid / RAID CYesYesNoYes (encrypted by default in OpenBSD)[124]No?
Svnd / Vnconfig?YesYesYes (encrypted by default in OpenBSD)??
SpyProof!NoYesYesNoNo?
Symantec Endpoint EncryptionYesYesYesYesYes?
Trend Micro Endpoint EncryptionYesYesYesYesYes?
TrueCryptYes[125]YesYesYesonly on Windows[107]?
VeraCryptYesYesYesYesonly on Windows[107]?
CyberSafe Top SecretNoYesYesNoNo?
NameWhole diskPartitionFileSwap spaceHibernation fileRAID

Modes of operation[edit]

Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.

Realtek Wireless LAN Driver for Windows 10 (64-bit & 32-bit) - Desktop. A Network Adapter / WiFi Driver is software which enables communication between your computer and your network adapter or network interface card (NIC). Most modern NICs support wireless connectivity, or WiFi. Common network issues include failure to dectect or connect to the network or slow or unreliable internet connections. Apr 24, 2017  In Device Manager, select Network adapters the network adapter name. Press and hold (or right-click) the network adapter name, and then select Update driver Search automatically for updated driver software. Follow the steps, then select Close. If a new driver is found, it'll be downloaded and installed automatically. Feb 06, 2019  Purpose. This download installs base drivers, Intel® PROSet for Windows Device Manager., advanced networking services for teaming and VLANs (ANS) for Intel® Network Adapters with Windows 10. Note: The drivers contained in this download are not compatible with Windows Server. Windows wireless lan driver.

What is a Virtual Tape Library? QUADStor VTL Introduction Tape technology remains the most cost effective backup solution till date. With current tape technology, tape media have a lifetime of 30 years or more and therefor are the number one choice for data archival. A virtual tape library (VTL) is a data storage virtualization technology used typically for backup and recovery purposes. A VTL presents a storage component (usually hard disk storage) as tape libraries or tape drives for use with existing backup software. A virtual tape library (VTL) is a disk-based backup system which appears to the backup host as a real tape library system. But Backup streams are written to and restored from disk.Virtual Tape Library is a piece of software which will emulate wired verity of Tape Libraries and tape drives. For system administrators who can maintain the backup infrastructure on their own, we offer a Free version of StarWind Virtual Tape Library. StarWind VTL Free delivers the unrestricted set of features and a GUI that works only in monitoring mode. Also, the free version is supported only in the open. Free virtual tape library.

VAG KKL USB OBD cable with FTDI FT232RL Chip.(Used for VW - Must have the FTDI chip, Look at ebay. Inpa 5.0.6 download.

Mcafee Full Disk Encryption Software

  • CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
  • CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
  • CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
  • LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[126]
  • XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
  • Authenticated encryption: Protection against ciphertext modification by an attacker
NameCBC w/ predictable IVsCBC w/ secret IVsCBC w/ random per-sector keysLRWXTSAuthenticated encryption
Aloaha Crypt DiskNoNoNoYesYes?
ArchiCrypt LiveNoNoNoLegacy support[127]Yes?
BestCryptNoYesNoYes[128]Yes[129]?
BitArmor DataControlNoYesPlumb-IVNoNo?
BitLockerNo[130]Yes[130]NoNoYes, Windows 10 10547+?
Bloombase Keyparc?Yes????
CGDNoYes[131]NoNoNo?
CenterTools DriveLock??????
Check Point Full Disk EncryptionNoNoYesYesYes?
CipherShedLegacy support[132]NoNoLegacy support[133]Yes[134]?
CrossCryptYesNoNoNoNo?
CryFSNoNoYesNoNo?
CryptArchiver??????
Cryptic DiskNoNoNoNoYesNo
CryhodNoYesNoNoNo?
CryptoloopYesNoNoNoNoNo
DiskCryptorNoNoNoNoYes?
Dm-crypt / LUKSYesYesNoYes, using *-lrw-benbi[135]Yes, using *-xts-plainYes, using --integrity mode[136]
DriveCrypt??????
DriveSentry GoAnywhere 2??????
E4M???NoNo?
e-Capsule Private Safe??????
eCryptfsNoYes?NoNo?
EgoSecure HDD EncryptionNoYesNoNoNo?
FileVaultYes[86]NoNoNoNo?
FileVault 2NoNoNoNoYes[137]?
FREE CompuSecYesNoNoNoNo?
FreeOTFEYesYesNoYesYesNo
GBDENoNoYes[91]NoNo?
GELINoYes[138]NoNoYes?
Loop-AESsingle-key, multi-key-v2 modes[93]multi-key-v3 mode[93]NoNoNoNo
McAfee Drive Encryption (SafeBoot)NoYesNoNoNo?
n-Crypt Pro??NoNoNo?
PGPDisk??????
Private DiskNoYesNoNoNo?
ProxyCryptNoNoNoNoYes?
R-Crypto??????
SafeGuard Easy??????
SafeGuard Enterprise??????
SafeGuard PrivateDisk??????
SafeHouse ProfessionalYesNoNoNoNo?
ScramdiskNoYesNoNoNo?
Scramdisk 4 LinuxNoYes[139]NoYes[140]Yes[141]?
SecuBoxYesNoNoNoNo?
SecureDoc??????
Sentry 2020??????
Seqrite Encryption ManagerNoYesNoYesYes?
Softraid / RAID C????Yes[142]?
Svnd / Vnconfig??????
Symantec Endpoint EncryptionNoNoYesNoNo?
TrueCryptLegacy support[132]NoNoLegacy support[133]Yes[143]No
USBCryptNoYesNoNoYes?
VeraCryptNoNoNoNoYes?
CyberSafe Top SecretNoNoNoNoYes?
NameCBC w/ predictable IVsCBC w/ secret IVsCBC w/ random per-sector keysLRWXTSAuthenticated encryption

See also[edit]

Notes and references[edit]

  1. ^'Jetico Mission'. Jetico. Retrieved 2014-05-30.
  2. ^'Keyparc - Free Encryption for Everyone'. Bloombase. Retrieved 2014-11-28.
  3. ^Roland Dowdeswell (2002-10-04). 'CryptoGraphic Disk'. mailing list announcement. Retrieved 2007-01-14.
  4. ^'Protect guards laptop and desktop data'. Archived from the original on March 2, 2005. Retrieved 2008-09-03.
  5. ^Company and product name change to Pointsec 'Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc'. Archived from the original on 2004-08-20. Retrieved 2008-09-03.
  6. ^'Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent'. Archived from the original on 2008-08-20. Retrieved 2008-09-03.
  7. ^Niklas Lemcke (2014-12-15). 'Pre-Alpha testing started'. Retrieved 2014-12-24.
  8. ^'TrueCrypt License Version 3.0'. TrueCrypt Foundation. 2012-02-07. Retrieved 2014-12-24.
  9. ^Sarah Dean (2004-02-10). 'OTFEDB entry'. Archived from the original on 2008-12-11. Retrieved 2008-08-10.
  10. ^Initial cryptoloop patches for the Linux 2.5 development kernel: 'Archived copy'. Archived from the original on 2005-01-10. Retrieved 2006-12-24.CS1 maint: archived copy as title (link)
  11. ^dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/
  12. ^Clemens Fruhwirth. 'LUKS version history'. Archived from the original on 2006-12-25. Retrieved 2006-12-24.
  13. ^SecurStar GmbH. 'DriveCrypt v5.8 Released'. Archived from the original on 2015-10-27. Retrieved 2015-10-26.
  14. ^'archived E4M documentation'. Archived from the original on 2000-05-24.
  15. ^'eCryptfs'. Retrieved 2008-04-29.
  16. ^Valient Gough (2003). 'EncFS - an Encrypted Filesystem'. README.md file. Retrieved 2007-01-14.
  17. ^'FreeOTFE version history'. Archived from the original on 2006-12-07. Retrieved 2006-12-24.
  18. ^'gbde(4) man page in FreeBSD 4.11'. GBDE manual page as it appeared in FreeBSD 4.11. Retrieved 2006-12-24.
  19. ^'geli(8) man page in FreeBSD 6.0'. GELI manual page as it first appeared in FreeBSD 6.0. Retrieved 2006-12-24.
  20. ^Release Notes. GnuPG
  21. ^'gocryptfs changelog on github'. Retrieved 2018-01-16.
  22. ^https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396. Retrieved 2015-09-14.Missing or empty |title= (help)
  23. ^'McAfee Drive Encryption'. product description. McAfee. Retrieved 2019-07-31.
  24. ^'PGP 6.0 Freeware released- any int'l links?'. Newsgroup: comp.security.pgp. Usenet:6sh4vm$jbf$1@news.cybercity.dk. Retrieved 2007-01-04.
  25. ^'Dekart Encryption software timeline'. Dekart.
  26. ^'SafeGuard Easy 4.5 Technical Whitepaper'(PDF). Utimaco. Retrieved 2009-08-10.
  27. ^'SafeGuard Enterprise Technical Whitepaper'(PDF). Utimaco. Retrieved 2009-08-10.
  28. ^Rebranded as ThinkVantage Client Security 'ThinkVantage Technologies Deployment Guide'(PDF). Lenovo. Retrieved 2008-03-05.[permanent dead link]
  29. ^'ScramDisk 4 Linux Releases'.
  30. ^'Sentry 2020 news'. Retrieved 2007-01-02.
  31. ^'OpenBSD 4.2 Changelog'.
  32. ^'OpenBSD 2.8 Changelog'.
  33. ^'bwalex/tc-play'. 2019-08-27.
  34. ^Trend Micro
  35. ^'Mobile Armor: Your Data.Secure. Everywhere'. 4 September 2004. Archived from the original on 4 September 2004.
  36. ^'TrueCrypt'.
  37. ^'TrueCrypt License Version 3.1'. TrueCrypt Foundation. 2014-05-28. Retrieved 2014-05-29.
  38. ^'VeraCrypt'.
  39. ^'Apache License 2.0'. IDRIX. 2015-06-28. Retrieved 2015-08-08.
  40. ^'Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy'.
  41. ^ ab[1] FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX
  42. ^'Archived copy'(PDF). Archived from the original(PDF) on 2015-09-23. Retrieved 2014-12-14.CS1 maint: archived copy as title (link)
  43. ^[2] Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used
  44. ^ ab[3] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system
  45. ^CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
  46. ^[4] PocketPC freeware release- SmartPhone beta available
  47. ^ abc[5] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes
  48. ^'Cryptomator - Free Cloud Encryption'.
  49. ^[6] FreeOTFE4PDA supports dm-crypt/LUKS volumes
  50. ^ ab'Safe - Protect Your Files'.
  51. ^ ab'Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS'.
  52. ^[7] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes
  53. ^[8] Supports Linux volumes
  54. ^[9] Supports Linux volumes
  55. ^[10] Third party app allows a user to open LibreCrypt compatible LUKS containers
  56. ^'Endpoint Encryption Datasheet'. McAfee. Retrieved 2010-06-14.
  57. ^'Endpoint Encryption Powered by PGP Technology - Symantec'.
  58. ^[11] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used
  59. ^[12] Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)
  60. ^[13] Hidden containers description from Jetico (BestCrypt)
  61. ^ abcSecret-containers and Camouflage files ArchiCrypt Live Description
  62. ^Supports 'Guest' keys
  63. ^Using 'Archicrypt Card'
  64. ^Supported by the BestCrypt container format; see BestCrypt SDK
  65. ^Supported by the BestCrypt Volume Encryption software
  66. ^With PIN or USB key
  67. ^BitLocker Drive Encryption: Value Add Extensibility Options
  68. ^ ab'BitLocker Drive Encryption Technical Overview'. Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13.
  69. ^Recovery keys only.
  70. ^ abcdRoland C. Dowdeswell, John Ioannidis. 'The CryptoGraphic Disk Driver'(PDF). CGD Design Paper. Retrieved 2006-12-24.
  71. ^Federico Biancuzzi (2005-12-21). 'Inside NetBSD's CGD'. interview with Roland Dowdeswell. ONLamp.com. Retrieved 2006-12-24.
  72. ^'Operating Systems Supported for System Encryption'(PDF). CipherShed Documentation. CipherShed Project. Retrieved 2014-12-27.
  73. ^Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  74. ^ ab'Keyfiles'. TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28.
  75. ^ ab'Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?'. TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28.
  76. ^ ab'Future'. TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link]
  77. ^'CryFS: How it works'. Retrieved 2016-09-23.
  78. ^ abcdm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
  79. ^ ab'DiskCryptor Features'. Archived from the original on 2010-05-29. Retrieved 2010-05-25.
  80. ^ ab'DISK Protect Data Sheet'(PDF). Retrieved 2018-12-02.
  81. ^'cryptsetup Frequently Asked Questions'. Retrieved 2016-01-07.
  82. ^ abc'DriveCrypt features'. SecurStar GmbH. Retrieved 2007-01-03.
  83. ^ ab'Multi level access with separate access credentials, each enabling a different set of functional or logical operations'. EISST Ltd. Retrieved 2007-07-25.
  84. ^uses the lower filesystem (stacking)
  85. ^ ab'Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3'. Intel. Retrieved 2012-07-26.
  86. ^ abcdeJacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). 'Unlocking FileVault: An Analysis of Apple's disk encryption'(PDF). Retrieved 2012-01-03.Cite journal requires |journal= (help)
  87. ^ ab'Mac OS X 10.7 Lion: the Ars Technica review'. Ars Technica. 2011-07-20. Retrieved 2012-01-03.
  88. ^FreeOTFE has a modular architecture and set of components to allow 3rd party integration
  89. ^FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
  90. ^ abcd'FreeBSD Handbook: Encrypting Disk Partitions'. Retrieved 2006-12-24.
  91. ^ abcPoul-Henning Kamp. 'GBDE - GEOM Based Disk Encryption'(PDF). GBDE Design Document. Retrieved 2006-12-24.
  92. ^ ab'geli(8) man page in FreeBSD-current'. GELI manual page in current FreeBSD. Retrieved 2006-12-24.
  93. ^ abcdefghijkJari Ruusu. 'loop-AES README file'. Retrieved 2007-04-23.
  94. ^Using customization
  95. ^'McAfee Endpoint Encryption'(PDF). McAfee. Archived from the original(PDF) on 2010-12-17. Retrieved 2012-07-26.
  96. ^n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
  97. ^'PGP Whole Disk Encryption FAQ'. PGP Corporation. Retrieved 2006-12-24.
  98. ^PGP private keys are always protected by strengthened passphrases
  99. ^ ab'Embedded Security: Trusted Platform Module Technology Comes of Age'. Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04.
  100. ^'ThinkVantage Technologies Deployment Guide'(PDF). Lenovo. Retrieved 2008-03-05.
  101. ^ abFor Truecrypt containers
  102. ^ ab'SecureDoc Product Information'. WinMagic Inc. Archived from the original on 2008-03-13. Retrieved 2008-03-05.
  103. ^optional by using -K OpenBSD Manual Pages: vnconfig(8)
  104. ^'Endpoint Encryption'.
  105. ^'Solutions for Solid-State Drives (SSD) - Endpoint Encryption'. Archived from the original on 2014-11-29. Retrieved 2014-11-17.
  106. ^'Support for smart card readers - Endpoint Encryption'.
  107. ^ abc'Operating Systems Supported for System Encryption'. TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28.
  108. ^Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?)
  109. ^'Operating Systems Supported for System Encryption'. VeraCrypt Documentation. IDRIX. Retrieved 2017-10-11.
  110. ^'Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy'. Archived from the original on 2009-08-29. Retrieved 2009-09-17.
  111. ^Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
  112. ^dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
  113. ^yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
  114. ^Uses proprietary e-Capsule file system not exposed to the OS.
  115. ^ abnot technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
  116. ^http://macmarshal.com/images/Documents/mm_wp_102.pdf[permanent dead link]
  117. ^'Use FileVault to encrypt the startup disk on your Mac'.
  118. ^ abFile-based volume encryption is possible when used with mdconfig(8) utility.
  119. ^'Control Break International Debuts SafeBoot Version 4.27'. September 2004. Retrieved 2015-03-05.
  120. ^http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
  121. ^however, not Windows UEFI-based computers with a GUID partition table (GPT)
  122. ^LRW_issue
  123. ^Containers created with ArchiCrypt Live version 5 use LRW
  124. ^'New features in BestCrypt version 8'. Jetico. Archived from the original on 2007-02-04. Retrieved 2007-03-02.
  125. ^'New features in version 2'. Jetico. Archived from the original on 2008-09-05. Retrieved 2009-03-01.
  126. ^ abNiels Fergusson (August 2006). 'AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista'(PDF). Microsoft. Retrieved 2008-02-22.Cite journal requires |journal= (help)
  127. ^'man 4 cgd in NetBSD-current'. NetBSD current manual page on CGD. 2006-03-11. Retrieved 2006-12-24.
  128. ^ abContainers created with TrueCrypt versions 1.0 through 4.0 use CBC.
  129. ^ abContainers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
  130. ^Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
  131. ^Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/
  132. ^'cryptsetup - manage plain dm-crypt and LUKS encrypted volumes'. 2018-01-01. Retrieved 2018-05-08.
  133. ^'OS X Lion: About FileVault 2'. Retrieved 2011-01-03.
  134. ^'Linux/BSD disk encryption comparison'. Archived from the original on 2007-06-29. Retrieved 2006-12-24.
  135. ^For Scramdisk containers
  136. ^For Truecrypt 4 containers
  137. ^For Truecrypt 5 and 6 containers
  138. ^''CVS: cvs.openbsd.org: src' - MARC'.
  139. ^Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.


External links[edit]

  • DiskCryptor vs Truecrypt - Comparison in between DiskCryptor and Truecrypt
  • Buyer's Guide to Full Disk Encryption - Overview of full-disk encryption, how it works, and how it differs from file-level encryption—plus an overview of leading full-disk encryption software.
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Comparison_of_disk_encryption_software&oldid=916560178'




broken image