Access your Pro+ Content below.
Detecting the use of TrueCrypt
Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Table Of Contents
- Windows Registry evidence
- TrueCrypt boot-loader
- TrueCrypt hidden volume
Access this CW+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.