Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

TrueCrypt

Index TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). [1]

159 relations: Adobe Creative Suite, Adobe Photoshop, Adobe Systems, Advanced Encryption Standard, AES instruction set, Affidavit, Alex Halderman, Alexandria, Virginia, Arbitrary code execution, Ars Technica, Assembly language, Backward compatibility, BBC, BBC News Online, Berlin, Bit, BitLocker, Black Hat Briefings, Block cipher mode of operation, Boing Boing, Booting, Bruce Schneier, BSD licenses, Bus mastering, C (programming language), C++, Child pornography, Cipher, Cold boot attack, Command-line interface, Comparison of free and open-source software licenses, Computer forensics, Concordia University, Condé Nast, Copyright infringement, Cryptographic hash function, Czech Republic, Daniel Dantas (entrepreneur), Data parallelism, Data recovery, Data storage, David Miranda (politician), Democracy Now!, Deniable encryption, Dictionary attack, Digital signature, Direct memory access, Disk encryption, Disk encryption software, Disk encryption theory, ..., Disk partitioning, Dm-crypt, Domain name, DragonFly BSD, E4M, Edward Snowden, Encryption, End-of-life (product), Executable, Execution (computing), Federal Bureau of Investigation, FileHippo, FlexNet Publisher, Fork (software development), Free software, Free Software Foundation, Free software license, FreeOTFE, Freeware, Front and back ends, GitHub, Global surveillance disclosures (2013–present), GNU General Public License, Google Desktop, Guardian Media Group, Hard disk drive, Hardware keylogger, Hardware Trojan, Heathrow Airport, HTTP 301, Indictment, Information technology, InfoWorld, Institute of Electrical and Electronics Engineers, Internet, Itanium, John Doe, Keystroke logging, Lauri Love, Linux, Linux distribution, Linux Magazine, MacOS, Magistrates' court (England and Wales), Malware, Maricopa County Sheriff's Office, Master boot record, Matthew D. Green, Megabyte, Metropolitan Police Service, Microsoft Windows, Microsoft Word, Mike Masnick, Multiple encryption, Multiprocessing, National Crime Agency, NCC Group, Non-disclosure agreement, Open Source Initiative, Open-source model, Paul Le Roux, PBKDF2, Personal property, Phoenix New Times, Pipeline (computing), Plaintext, Plausible deniability, Pre-boot authentication, Privilege escalation, Proprietary software, Random-access memory, Randomness tests, Reuters, Rio de Janeiro, RIPEMD, Rootkit, Salt (cryptography), Scramdisk, Security hacker, Serpent (cipher), SHA-2, Simon Phipps (programmer), Softpedia, Software license, Source code, Source-available, SourceForge, Steve Gibson (computer programmer), Techdirt, The Guardian, The Raw Story, TheGuardian.com, Tom's Hardware, Trademark, TrueCrypt, Trusted Platform Module, Twofish, United Kingdom, United States Court of Appeals for the Eleventh Circuit, United States Department of Justice, URL redirection, Usenet, Utility software, VeraCrypt, Whirlpool (cryptography), Windows Vista, Wired (magazine), 32-bit, 64-bit computing. Expand index (109 more) »

Adobe Creative Suite

Adobe Creative Suite (CS) was a software suite of graphic design, video editing, and web development applications developed by Adobe Systems.

New!!: TrueCrypt and Adobe Creative Suite · See more »

Adobe Photoshop

Adobe Photoshop is a raster graphics editor developed and published by Adobe Systems for macOS and Windows.

New!!: TrueCrypt and Adobe Photoshop · See more »

Adobe Systems

Adobe Systems Incorporated, commonly known as Adobe, is an American multinational computer software company.

New!!: TrueCrypt and Adobe Systems · See more »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: TrueCrypt and Advanced Encryption Standard · See more »

AES instruction set

Advanced Encryption Standard instruction set (or the Intel Advanced Encryption Standard New Instructions; AES-NI) is an extension to the x86 instruction set architecture for microprocessors from Intel and AMD proposed by Intel in March 2008.

New!!: TrueCrypt and AES instruction set · See more »

Affidavit

An affidavit is a written sworn statement of fact voluntarily made by an affiant or deponent under an oath or affirmation administered by a person authorized to do so by law.

New!!: TrueCrypt and Affidavit · See more »

Alex Halderman

J.

New!!: TrueCrypt and Alex Halderman · See more »

Alexandria, Virginia

Alexandria is an independent city in the Commonwealth of Virginia in the United States.

New!!: TrueCrypt and Alexandria, Virginia · See more »

Arbitrary code execution

In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a target machine or in a target process.

New!!: TrueCrypt and Arbitrary code execution · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: TrueCrypt and Ars Technica · See more »

Assembly language

An assembly (or assembler) language, often abbreviated asm, is a low-level programming language, in which there is a very strong (but often not one-to-one) correspondence between the assembly program statements and the architecture's machine code instructions.

New!!: TrueCrypt and Assembly language · See more »

Backward compatibility

Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing.

New!!: TrueCrypt and Backward compatibility · See more »

BBC

The British Broadcasting Corporation (BBC) is a British public service broadcaster.

New!!: TrueCrypt and BBC · See more »

BBC News Online

BBC News Online is the website of BBC News, the division of the BBC responsible for newsgathering and production.

New!!: TrueCrypt and BBC News Online · See more »

Berlin

Berlin is the capital and the largest city of Germany, as well as one of its 16 constituent states.

New!!: TrueCrypt and Berlin · See more »

Bit

The bit (a portmanteau of binary digit) is a basic unit of information used in computing and digital communications.

New!!: TrueCrypt and Bit · See more »

BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

New!!: TrueCrypt and BitLocker · See more »

Black Hat Briefings

Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world.

New!!: TrueCrypt and Black Hat Briefings · See more »

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.

New!!: TrueCrypt and Block cipher mode of operation · See more »

Boing Boing

Boing Boing is a website, first established as a zine in 1988, later becoming a group blog.

New!!: TrueCrypt and Boing Boing · See more »

Booting

In computing, booting is starting up a computer or computer appliance until it can be used.

New!!: TrueCrypt and Booting · See more »

Bruce Schneier

Bruce Schneier (born January 15, 1963, is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization.

New!!: TrueCrypt and Bruce Schneier · See more »

BSD licenses

BSD licenses are a family of permissive free software licenses, imposing minimal restrictions on the use and redistribution of covered software.

New!!: TrueCrypt and BSD licenses · See more »

Bus mastering

In computing, bus mastering is a feature supported by many bus architectures that enables a device connected to the bus to initiate direct memory access (DMA) transactions.

New!!: TrueCrypt and Bus mastering · See more »

C (programming language)

C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.

New!!: TrueCrypt and C (programming language) · See more »

C++

C++ ("see plus plus") is a general-purpose programming language.

New!!: TrueCrypt and C++ · See more »

Child pornography

Child pornography is pornography that exploits children for sexual stimulation.

New!!: TrueCrypt and Child pornography · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: TrueCrypt and Cipher · See more »

Cold boot attack

In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine.

New!!: TrueCrypt and Cold boot attack · See more »

Command-line interface

A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).

New!!: TrueCrypt and Command-line interface · See more »

Comparison of free and open-source software licenses

This is a comparison of published free software licenses and open-source licenses.

New!!: TrueCrypt and Comparison of free and open-source software licenses · See more »

Computer forensics

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.

New!!: TrueCrypt and Computer forensics · See more »

Concordia University

Concordia University (commonly referred to as Concordia) is a public comprehensive university located in Montreal, Quebec, Canada on unceded Indigenous lands.

New!!: TrueCrypt and Concordia University · See more »

Condé Nast

Condé Nast Inc. is an American mass media company founded in 1909 by Condé Montrose Nast, based at One World Trade Center and owned by Advance Publications.

New!!: TrueCrypt and Condé Nast · See more »

Copyright infringement

Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

New!!: TrueCrypt and Copyright infringement · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: TrueCrypt and Cryptographic hash function · See more »

Czech Republic

The Czech Republic (Česká republika), also known by its short-form name Czechia (Česko), is a landlocked country in Central Europe bordered by Germany to the west, Austria to the south, Slovakia to the east and Poland to the northeast.

New!!: TrueCrypt and Czech Republic · See more »

Daniel Dantas (entrepreneur)

Daniel Valente Dantas is a Brazilian entrepreneur.

New!!: TrueCrypt and Daniel Dantas (entrepreneur) · See more »

Data parallelism

Data parallelism is parallelization across multiple processors in parallel computing environments.

New!!: TrueCrypt and Data parallelism · See more »

Data recovery

In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.

New!!: TrueCrypt and Data recovery · See more »

Data storage

Data storage is the recording (storing) of information (data) in a storage medium.

New!!: TrueCrypt and Data storage · See more »

David Miranda (politician)

David Michael dos Santos Miranda (born 10 May 1985 in Rio de Janeiro) is a journalist and Rio de Janeiro City Councilman affiliated to the Socialism and Liberty Party (PSOL).

New!!: TrueCrypt and David Miranda (politician) · See more »

Democracy Now!

Democracy Now! is an hour-long American TV, radio and internet news program hosted by journalists Amy Goodman and Juan González.

New!!: TrueCrypt and Democracy Now! · See more »

Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

New!!: TrueCrypt and Deniable encryption · See more »

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

New!!: TrueCrypt and Dictionary attack · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: TrueCrypt and Digital signature · See more »

Direct memory access

Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems to access main system memory (Random-access memory), independent of the central processing unit (CPU).

New!!: TrueCrypt and Direct memory access · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: TrueCrypt and Disk encryption · See more »

Disk encryption software

Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.

New!!: TrueCrypt and Disk encryption software · See more »

Disk encryption theory

Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk).

New!!: TrueCrypt and Disk encryption theory · See more »

Disk partitioning

Disk partitioning or disk slicing is the creation of one or more regions on a hard disk or other secondary storage, so that an operating system can manage information in each region separately.

New!!: TrueCrypt and Disk partitioning · See more »

Dm-crypt

dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD.

New!!: TrueCrypt and Dm-crypt · See more »

Domain name

A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet.

New!!: TrueCrypt and Domain name · See more »

DragonFly BSD

DragonFly BSD is a free and open source Unix-like operating system created as a fork of FreeBSD 4.8.

New!!: TrueCrypt and DragonFly BSD · See more »

E4M

Encryption for the Masses (E4M) is a free disk encryption software for Windows NT and Windows 9x families of operating systems.

New!!: TrueCrypt and E4M · See more »

Edward Snowden

Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and leaked classified information from the National Security Agency (NSA) in 2013 without authorization.

New!!: TrueCrypt and Edward Snowden · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: TrueCrypt and Encryption · See more »

End-of-life (product)

"End-of-life" (EOL) is a term used with respect to a product supplied to customers, indicating that the product is in the end of its useful life (from the vendor's point of view), and a vendor stops marketing, selling, or rework sustaining it.

New!!: TrueCrypt and End-of-life (product) · See more »

Executable

In computing, executable code or an executable file or executable program, sometimes simply referred to as an executable or binary, causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful.

New!!: TrueCrypt and Executable · See more »

Execution (computing)

Execution in computer and software engineering is the process by which a computer or a virtual machine performs the instructions of a computer program.

New!!: TrueCrypt and Execution (computing) · See more »

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI), formerly the Bureau of Investigation (BOI), is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency.

New!!: TrueCrypt and Federal Bureau of Investigation · See more »

FileHippo

FileHippo is a download website that offers computer software for Windows.

New!!: TrueCrypt and FileHippo · See more »

FlexNet Publisher

FlexNet Publisher (formerly known as FLEXlm) is a software license manager from Flexera Software which implements license management and is intended to be used in corporate environments to provide floating licenses to multiple end users of computer software.

New!!: TrueCrypt and FlexNet Publisher · See more »

Fork (software development)

In software engineering, a project fork happens when developers take a copy of source code from one software package and start independent development on it, creating a distinct and separate piece of software.

New!!: TrueCrypt and Fork (software development) · See more »

Free software

Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

New!!: TrueCrypt and Free software · See more »

Free Software Foundation

The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to study, distribute, create, and modify computer software, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License.

New!!: TrueCrypt and Free Software Foundation · See more »

Free software license

A free software license is a notice that grants the recipient of a piece of software extensive rights to modify and redistribute that software.

New!!: TrueCrypt and Free software license · See more »

FreeOTFE

FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE).

New!!: TrueCrypt and FreeOTFE · See more »

Freeware

Freeware is software that is available for use at no monetary cost.

New!!: TrueCrypt and Freeware · See more »

Front and back ends

In software engineering, the terms front end and back end refer to the separation of concerns between the presentation layer (front end), and the data access layer (back end) of a piece of software, or the physical infrastructure or hardware.

New!!: TrueCrypt and Front and back ends · See more »

GitHub

GitHub Inc. is a web-based hosting service for version control using Git.

New!!: TrueCrypt and GitHub · See more »

Global surveillance disclosures (2013–present)

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens.

New!!: TrueCrypt and Global surveillance disclosures (2013–present) · See more »

GNU General Public License

The GNU General Public License (GNU GPL or GPL) is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.

New!!: TrueCrypt and GNU General Public License · See more »

Google Desktop

Google Desktop is a computer program with desktop search capabilities, created by Google for Linux, Apple Mac OS X, and Microsoft Windows systems.

New!!: TrueCrypt and Google Desktop · See more »

Guardian Media Group

Guardian Media Group plc (GMG) is a British mass media company owning various media operations including The Guardian and The Observer.

New!!: TrueCrypt and Guardian Media Group · See more »

Hard disk drive

A hard disk drive (HDD), hard disk, hard drive or fixed disk is an electromechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

New!!: TrueCrypt and Hard disk drive · See more »

Hardware keylogger

Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords.

New!!: TrueCrypt and Hardware keylogger · See more »

Hardware Trojan

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit.

New!!: TrueCrypt and Hardware Trojan · See more »

Heathrow Airport

Heathrow Airport (also known as London Heathrow) is a major international airport in London, United Kingdom.

New!!: TrueCrypt and Heathrow Airport · See more »

HTTP 301

The HTTP response status code 301 Moved Permanently is used for permanent URL redirection, meaning current links or records using the URL that the response is received for should be updated.

New!!: TrueCrypt and HTTP 301 · See more »

Indictment

An indictment is a formal accusation that a person has committed a crime.

New!!: TrueCrypt and Indictment · See more »

Information technology

Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise.

New!!: TrueCrypt and Information technology · See more »

InfoWorld

InfoWorld (formerly The Intelligent Machines Journal) is an information technology media business.

New!!: TrueCrypt and InfoWorld · See more »

Institute of Electrical and Electronics Engineers

The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.

New!!: TrueCrypt and Institute of Electrical and Electronics Engineers · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: TrueCrypt and Internet · See more »

Itanium

Itanium is a family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64).

New!!: TrueCrypt and Itanium · See more »

John Doe

"John Doe", "John Roe" or "Richard Roe" (for men), "Jane Doe" or "Jane Roe" (for women), and "Baby Doe", "Janie Doe" or "Johnny Doe" (for children), or just "Doe" or "Roe" are multiple-use names that have two distinct usages.

New!!: TrueCrypt and John Doe · See more »

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

New!!: TrueCrypt and Keystroke logging · See more »

Lauri Love

Lauri Love (born 14 December 1984, United Kingdom) is a British activist charged with stealing data from United States Government computers including the US Army, Missile Defense Agency, and NASA via computer intrusion.

New!!: TrueCrypt and Lauri Love · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: TrueCrypt and Linux · See more »

Linux distribution

A Linux distribution (often abbreviated as distro) is an operating system made from a software collection, which is based upon the Linux kernel and, often, a package management system.

New!!: TrueCrypt and Linux distribution · See more »

Linux Magazine

Linux Magazine is an international magazine for Linux software enthusiasts and professionals.

New!!: TrueCrypt and Linux Magazine · See more »

MacOS

macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: TrueCrypt and MacOS · See more »

Magistrates' court (England and Wales)

In England and Wales, a magistrates' court is a lower court which holds trials for summary offences and preliminary hearings for more serious ones.

New!!: TrueCrypt and Magistrates' court (England and Wales) · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: TrueCrypt and Malware · See more »

Maricopa County Sheriff's Office

The Maricopa County Sheriff's Office (MCSO) is a local law enforcement agency that serves Maricopa County, Arizona.

New!!: TrueCrypt and Maricopa County Sheriff's Office · See more »

Master boot record

A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.

New!!: TrueCrypt and Master boot record · See more »

Matthew D. Green

Matthew Daniel Green (born 1976) is a cryptographer and security technologist.

New!!: TrueCrypt and Matthew D. Green · See more »

Megabyte

The megabyte is a multiple of the unit byte for digital information.

New!!: TrueCrypt and Megabyte · See more »

Metropolitan Police Service

The Metropolitan Police Service (MPS), commonly known as the Metropolitan Police and informally as the Met, is the territorial police force responsible for law enforcement in Greater London, excluding the "square mile" of the City of London, which is the responsibility of the City of London Police.

New!!: TrueCrypt and Metropolitan Police Service · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: TrueCrypt and Microsoft Windows · See more »

Microsoft Word

Microsoft Word (or simply Word) is a word processor developed by Microsoft.

New!!: TrueCrypt and Microsoft Word · See more »

Mike Masnick

Michael "Mike" Masnick (born December 8, 1974) is an American editor and entrepreneur.

New!!: TrueCrypt and Mike Masnick · See more »

Multiple encryption

Multiple encryption is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.

New!!: TrueCrypt and Multiple encryption · See more »

Multiprocessing

Multiprocessing is the use of two or more central processing units (CPUs) within a single computer system.

New!!: TrueCrypt and Multiprocessing · See more »

National Crime Agency

The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom.

New!!: TrueCrypt and National Crime Agency · See more »

NCC Group

NCC Group (LSE: NCC) is an information assurance firm headquartered in Manchester, United Kingdom.

New!!: TrueCrypt and NCC Group · See more »

Non-disclosure agreement

A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA) or secrecy agreement (SA), is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties.

New!!: TrueCrypt and Non-disclosure agreement · See more »

Open Source Initiative

The Open Source Initiative (OSI) is a non-profit organization dedicated to promoting open-source software.

New!!: TrueCrypt and Open Source Initiative · See more »

Open-source model

The open-source model is a decentralized software-development model that encourages open collaboration.

New!!: TrueCrypt and Open-source model · See more »

Paul Le Roux

Paul Calder Le Roux (born December 24, 1972 in Bulawayo, Rhodesia, now Zimbabwe) is a former programmer, former criminal cartel boss and informant to the US Drug Enforcement Administration (DEA).

New!!: TrueCrypt and Paul Le Roux · See more »

PBKDF2

In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 2) are key derivation functions with a sliding computational cost, aimed to reduce the vulnerability of encrypted keys to brute force attacks.

New!!: TrueCrypt and PBKDF2 · See more »

Personal property

Personal property is generally considered property that is movable, as opposed to real property or real estate.

New!!: TrueCrypt and Personal property · See more »

Phoenix New Times

The Phoenix New Times is a free alternative weekly Phoenix, Arizona newspaper, published each Thursday.

New!!: TrueCrypt and Phoenix New Times · See more »

Pipeline (computing)

In computing, a pipeline, also known as a data pipeline, is a set of data processing elements connected in series, where the output of one element is the input of the next one.

New!!: TrueCrypt and Pipeline (computing) · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: TrueCrypt and Plaintext · See more »

Plausible deniability

Plausible deniability is the ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

New!!: TrueCrypt and Plausible deniability · See more »

Pre-boot authentication

Pre-Boot Authentication (PBA) or Power-On Authentication (POA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer.

New!!: TrueCrypt and Pre-boot authentication · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: TrueCrypt and Privilege escalation · See more »

Proprietary software

Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

New!!: TrueCrypt and Proprietary software · See more »

Random-access memory

Random-access memory (RAM) is a form of computer data storage that stores data and machine code currently being used.

New!!: TrueCrypt and Random-access memory · See more »

Randomness tests

Randomness tests (or tests for randomness), in data evaluation, are used to analyze the distribution of a set of data to see if it is random (patternless).

New!!: TrueCrypt and Randomness tests · See more »

Reuters

Reuters is an international news agency headquartered in London, United Kingdom.

New!!: TrueCrypt and Reuters · See more »

Rio de Janeiro

Rio de Janeiro (River of January), or simply Rio, is the second-most populous municipality in Brazil and the sixth-most populous in the Americas.

New!!: TrueCrypt and Rio de Janeiro · See more »

RIPEMD

RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of cryptographic hash functions developed in Leuven, Belgium, by Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven, and first published in 1996.

New!!: TrueCrypt and RIPEMD · See more »

Rootkit

A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: TrueCrypt and Rootkit · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: TrueCrypt and Salt (cryptography) · See more »

Scramdisk

Scramdisk is a free on-the-fly encryption program for Windows 95, Windows 98, and Windows Me.

New!!: TrueCrypt and Scramdisk · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: TrueCrypt and Security hacker · See more »

Serpent (cipher)

Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, where it was ranked second to Rijndael.

New!!: TrueCrypt and Serpent (cipher) · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: TrueCrypt and SHA-2 · See more »

Simon Phipps (programmer)

Simon Phipps is a computer scientist and web and open source advocate.

New!!: TrueCrypt and Simon Phipps (programmer) · See more »

Softpedia

Softpedia is a website from Romania that indexes information and provides primarily software information and downloads.

New!!: TrueCrypt and Softpedia · See more »

Software license

A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software.

New!!: TrueCrypt and Software license · See more »

Source code

In computing, source code is any collection of code, possibly with comments, written using a human-readable programming language, usually as plain text.

New!!: TrueCrypt and Source code · See more »

Source-available

So-called source available software (or source-available software) is a software for which its source code is made publicly available for access.

New!!: TrueCrypt and Source-available · See more »

SourceForge

SourceForge is a Web-based service that offers software developers a centralized online location to control and manage free and open-source software projects.

New!!: TrueCrypt and SourceForge · See more »

Steve Gibson (computer programmer)

Steven "Steve" Gibson (born 26 March 1955) is an American software engineer, security researcher, and IT security proponent.

New!!: TrueCrypt and Steve Gibson (computer programmer) · See more »

Techdirt

Techdirt is an internet blog that reports on technology's legal challenges and related business and economic policy issues, in context of the digital revolution.

New!!: TrueCrypt and Techdirt · See more »

The Guardian

The Guardian is a British daily newspaper.

New!!: TrueCrypt and The Guardian · See more »

The Raw Story

The Raw Story (also stylized as RawStory) is an American online news organization founded in 2004 by John Byrne.

New!!: TrueCrypt and The Raw Story · See more »

TheGuardian.com

TheGuardian.com, formerly known as Guardian.co.uk and Guardian Unlimited, is a British news and media website owned by the Guardian Media Group.

New!!: TrueCrypt and TheGuardian.com · See more »

Tom's Hardware

Tom's Hardware is an online publication owned by Purch Group and focused on technology.

New!!: TrueCrypt and Tom's Hardware · See more »

Trademark

A trademark, trade mark, or trade-markThe styling of trademark as a single word is predominantly used in the United States and Philippines only, while the two-word styling trade mark is used in many other countries around the world, including the European Union and Commonwealth and ex-Commonwealth jurisdictions (although Canada officially uses "trade-mark" pursuant to the Trade-mark Act, "trade mark" and "trademark" are also commonly used).

New!!: TrueCrypt and Trademark · See more »

TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).

New!!: TrueCrypt and TrueCrypt · See more »

Trusted Platform Module

Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

New!!: TrueCrypt and Trusted Platform Module · See more »

Twofish

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

New!!: TrueCrypt and Twofish · See more »

United Kingdom

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain,Usage is mixed with some organisations, including the and preferring to use Britain as shorthand for Great Britain is a sovereign country in western Europe.

New!!: TrueCrypt and United Kingdom · See more »

United States Court of Appeals for the Eleventh Circuit

The United States Court of Appeals for the Eleventh Circuit (in case citations, 11th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts.

New!!: TrueCrypt and United States Court of Appeals for the Eleventh Circuit · See more »

United States Department of Justice

The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the U.S. government, responsible for the enforcement of the law and administration of justice in the United States, equivalent to the justice or interior ministries of other countries. The department was formed in 1870 during the Ulysses S. Grant administration. The Department of Justice administers several federal law enforcement agencies including the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The department is responsible for investigating instances of financial fraud, representing the United States government in legal matters (such as in cases before the Supreme Court), and running the federal prison system. The department is also responsible for reviewing the conduct of local law enforcement as directed by the Violent Crime Control and Law Enforcement Act of 1994. The department is headed by the United States Attorney General, who is nominated by the President and confirmed by the Senate and is a member of the Cabinet. The current Attorney General is Jeff Sessions.

New!!: TrueCrypt and United States Department of Justice · See more »

URL redirection

URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address.

New!!: TrueCrypt and URL redirection · See more »

Usenet

Usenet is a worldwide distributed discussion system available on computers.

New!!: TrueCrypt and Usenet · See more »

Utility software

Utility software is system software designed to help analyze, configure, optimize or maintain a computer.

New!!: TrueCrypt and Utility software · See more »

VeraCrypt

VeraCrypt is an open-source utility used for on-the-fly encryption (OTFE).

New!!: TrueCrypt and VeraCrypt · See more »

Whirlpool (cryptography)

In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function.

New!!: TrueCrypt and Whirlpool (cryptography) · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: TrueCrypt and Windows Vista · See more »

Wired (magazine)

Wired is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.

New!!: TrueCrypt and Wired (magazine) · See more »

32-bit

32-bit microcomputers are computers in which 32-bit microprocessors are the norm.

New!!: TrueCrypt and 32-bit · See more »

64-bit computing

In computer architecture, 64-bit computing is the use of processors that have datapath widths, integer size, and memory address widths of 64 bits (eight octets).

New!!: TrueCrypt and 64-bit computing · See more »

Redirects here:

Realcrypt, Tc-play, Tcplay, TruCrypt, True Crypt, True crypt, Truecrypt.

References

[1] https://en.wikipedia.org/wiki/TrueCrypt

OutgoingIncoming
Hey! We are on Facebook now! »