TechTarget

CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
April 2014

Detecting the use of TrueCrypt

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.

Table Of Contents

  • Windows Registry evidence
  • TrueCrypt boot-loader
  • TrueCrypt hidden volume

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close