Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. Access >>>
Table of contents
- Windows Registry evidence
- TrueCrypt boot-loader
- TrueCrypt hidden volume
Premium Content for Free.
More Premium Content Accessible For Free
A Computer Weekly buyer's guide to desktop computing 2020
Tablets, smartphones, cloud computing and applications delivered as a service offer compelling new ways to work. In this 11-page buyer's guide, ...
CW Europe – March 2015 Edition
This issue of CW Europe explores how Neelie Kroes, who became the Netherlands Special Envoy for Startups at the beginning of 2015, is embarking on a ...
Food giant acts fast on lean IT
In this week's Computer Weekly, we talk to the CIO from food giant Iglo – owner of Birds Eye – about how to work with outsourcers to keep IT lean and...