Access your Pro+ Content below.
Detecting the use of TrueCrypt
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Table Of Contents
- Windows Registry evidence
- TrueCrypt boot-loader
- TrueCrypt hidden volume
Access this CW+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
More CW+ ContentView All