Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. Access >>>
Table of contents
- Windows Registry evidence
- TrueCrypt boot-loader
- TrueCrypt hidden volume
Premium Content for Free.
More Premium Content Accessible For Free
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.
Can national security and privacy co-exist?
In this week’s Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how ...
Cultivating IT Talent
While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses...