![]() ![]() ![]() Filesystems: What filesystems are supported. ![]() Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.Multiple keys: Whether an encrypted volume can have more than one active key.Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications. Kruptos 2 Professional is an easy to use encryption program that uses 256-bit encryption to password protect your private files and prevent them from being modified, read or even accessed without the correct password.Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords.Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.TrueCrypt License Version 3.0 (legacy code only) Trend Micro Endpoint Encryption (Mobile Armor) PGP Corporation (acquired by Symantec in 2010) NetLib Encryptionizer (directory encryption) Source Auditable for Commercial CustomersÄustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |