Premium Content

Access "Detecting the use of TrueCrypt"

RH 3 Davies-1.jpg

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.  Access >>>

Table of contents

  • Windows Registry evidence
  • TrueCrypt boot-loader
  • TrueCrypt hidden volume

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • The Future of Corporate IT
    The-Future-of-Corporate-IT-(1370443235_562).jpg
    E-Handbook

    Business leaders have set aggressive 20% improvement targets for productivity. But IT’s traditional approach to driving productivity through process ...

  • Understanding the hard ROI of BYOD
    Understanding-the-hard-ROI-of-BYOD-(1370268531_616).jpg
    E-Handbook

    To the untrained observer, the concept of BYOD is simple: bring in consumer devices and save money. However, this is often based on the incorrect ...

  • European IT Law Briefing: Monitoring employees' use of social media
    European-IT-Law-Briefing-employees'-use-of-social-media-(1369059635_915).jpg
    E-Handbook

    This briefing from leading European law firms highlights the key legal requirements for companies monitoring employees’ social media use in France, ...