FixNix take on Encryption

http://www.truecrypt.org/
this is one of the open source encryption product I’ve bet upon for implementation across a corporate network.

Today while exploring to implement this for a personal usage of a high profile client through one of my friend, came across umpteen number of free/open source, commercial tools for the same.

Having said that, people are claiming they’re able to break even
such tools in the underground security/forensic networks.
http://truecryptblooz.blogspot.in/2011/09/one-day-i-forgot-my-truecrypt-password.html
http://it.slashdot.org/story/12/12/20/1850201/elcomsoft-tool-cracks-bitlocker-pgp-truecrypt-in-real-time
http://it.slashdot.org/story/12/12/20/1850201/elcomsoft-tool-cracks-bitlocker-pgp-truecrypt-in-real-time
http://www.theregister.co.uk/2012/12/20/elcomsoft_tool_decrypts_pgp/
http://code.google.com/p/truecrack/

http://www.informationweek.com/security/encryption/forensic-tool-cracks-bitlocker-pgp-truec/240145127

    GENERAL ENCRYPTION TOOLS

http://windows.microsoft.com/en-IN/windows7/products/features/bitlocker
http://technet.microsoft.com/en-us/windows/bitlocker-and-bitlocker-to-go.aspx

http://www.freeotfe.org/

http://diskcryptor.net/wiki/Main_Page/en

http://fspro.net/my-lockbox/

http://www.cloudfogger.com/en/

http://www.arg0.net/encfs
http://members.ferrara.linux.it/freddy77/encfs.html

http://www.pgpi.org/ (email encryption)
http://www.openpgp.org/

http://www.jetico.com/encryption-bestcrypt/

https://code.google.com/p/cryptonite/

http://www.withopf.com/tools/securstick/

http://www.ce-infosys.com/default.aspx

https://agilebits.com/knox

http://nemesis2.qx.net/pages/LUKSManager

http://www.winguardpro.com/

http://download.cnet.com/USB-Safeguard-Free/3000-2092_4-75115673.html

http://www.encryption-software.de/challenger/en/index.html

http://www.softpedia.com/get/Security/Encrypting/Drag-n-Crypt-ULTRA.shtml

http://www.checkpoint.com/pointsec/
http://www.checkpoint.com/products/index.html#endpoint

http://www.aescrypt.com/

http://www.axantum.com/axCrypt/

http://www.nas4free.org/

http://www.kernsafe.com/product/totalmounter.aspx

http://www.safehousesoftware.com/SafeHouseExplorer.aspx

https://agilebits.com/knox

http://diskcryptor.net/wiki/Main_Page/en

http://www.softpedia.com/get/Security/Security-Related/Advanced-File-Security.shtml

http://madebits.com/criptaes/index.php

http://ocript.sourceforge.net/

http://groups.google.com/group/installwhat

https://www.steganos.com/us/products/for-free/locknote/overview/

http://richskills.com/products/7/freeversion.asp

http://www.rohos.com/products/rohos-mini-drive/

http://file-encryption.net/

http://yadabyte.com/Yadabyte_Portables.php

http://portableapps.com/apps/utilities/toucan

http://www.androsasoft.net/

http://www.krilome.com/aprod/index-cse.html

http://www.gaijin.at/en/dlsteg.php

http://alemrantareq.blogspot.in/2010/10/file-and-folder-locker-usb-edition.html

http://embeddedsw.net/OpenPuff_Steganography_Home.html

http://www.picospace.com.au/downloads/privyCrypt/index.html

http://members.ozemail.com.au/~nulifetv/freezip/freeware/

http://www.dekart.com/products/encryption/private_disk_light/

http://www.picofactory.com/free/software/encryption-software/

http://www.yadabyte.com/Yadabyte_Portables.php

http://members.ozemail.com.au/~nulifetv/freezip/freeware/

http://sourceforge.net/projects/clipsecure/

http://www.gaijin.at/dlsteg.php

http://www.naddalim.com/tongsoft/Crypto/

http://xtort.net/freeware/xtort-software/omziff/

http://f0dder.dcmembers.com/fsekrit.index.php

http://sourceforge.net/projects/locknote/

http://www.philosoft.hu/en/removableTrezor1.html

http://www.maxa-tools.com/text2exe.php

http://www.maxa-tools.com/mcse.php

http://sector-seven.net/software/fileblender

https://sites.google.com/site/highlevelassembly/downloads/savgeed2

http://sector-seven.net/software/eclipse

http://pwgen-win.sourceforge.net/

http://gpg4usb.cpunk.de/

http://embeddedsw.net/MultiObfuscator_Cryptography_Home.html

http://panthema.net/2009/cryptote/

http://www.lassekolb.info/bfacs.htm

http://f0dder.dcmembers.com/fsekrit.index.php

http://www.dataconceal.com/

http://www.pcrx.com/system_protect/

http://sourceforge.net/projects/dcrypt/

http://rpmfusion.org/Package/realcrypt

http://code.google.com/p/steadycrypt/

http://www.kruptos2.com/

http://renzhi.ca/projects/renzhi-safe/

http://secretvaultpro.blogspot.in/

http://www.softpuls.com/masker/

http://code.google.com/p/immediatecrypt/

http://www.r-tt.com/data_security_software/

http://www.paragon-software.com/home/encrypted-disk/

http://www.yubico.com/applications/disk-encryption/

http://www.kaspersky.com/threats/free-encryption-software

http://www.trendmicro.com/us/enterprise/product-security/endpoint-encryption/index.html

http://www.cypherix.com/cryptainerle/

http://www.lumension.com/data-protection-software/disk-encryption.aspx

http://www.dekart.com/products/encryption/private_disk/

https://ssd.eff.org/tech/disk-encryption

http://www.novell.com/products/zenworks/full-disk-encryption/

http://www.exlade.com/cryptic-disk

http://www.sophos.com/en-us/products/encryption.aspx

http://www.esecurityplanet.com/mobile-security/buyers-guide-to-full-disk-encryption.html

http://www.symantec.com/drive-encryption

http://sourceforge.net/projects/secureusb/

http://www.winencrypt.com/

http://www.sophos.com/en-us/your-needs/features/email-encryption.aspx

http://www.netlib.com/

http://www.cypherix.com/

http://www.winmagic.com/

http://www.kryptel.com/products/kryptel.php

http://www.alertsec.com/

http://www.securstar.com/home.php

http://gpg4win.org/

http://www.laplink.com/index.php

http://www.jetico.com/

http://www.cryptoforge.com/

http://www.symantec.com/encryption

http://www.biternal.com/english_enigma.html

 

 

http://whatis.techtarget.com/definition/full-disk-encryption-FDE

Full-disk encryption (FDE) is encryption at the hardware level. FDE works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn’t have the key to “undo” the conversion. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. FDE can be installed on a computing device at the time of manufacturing or it can be added later on by installing a special software driver.

 

 

 

http://www.techsupportalert.com/best-free-drive-encryption-utility.htm

Encryption is a process of encoding information so that it cannot be accessed by others unless they have the key needed to decode it. Encryption is usually used to protect highly sensitive documents, but it’s also a good way to stop people from looking at your personal stuff.

Primary encryption utility categories

Why use categories here? To bring a little order to the large catalog of encryption utility reviews at this site. This particular review article is limited to “drive encryption” utilities. See related categories below.

Encryption utilities that encrypt files/folders directly: These utilitiees encrypt discrete files and/or folders directly, in contrast to utilities that encrypt and store files in volumes (archives, i.e., container files). File-based utilities may operate in batch mode or in on-the-fly mode.
Virtual-drive encryption utilities create volumes (encrypted containers/archives) which can be mounted in the file-system as virtual drives, complete with drive letters, e.g. “V:”. These drives can contain both files and folders. The computer’s file system can read, write and create documents in real time, directly in cleartext. Virtual-drive utilities operate in on-the-fly mode.
Full-drive encryption utilities – the utilities reviewed in this article – encrypt entire storage devices, e.g., hard-drives, drive partitions and USB drives. Some of the utilities in this category can also encrypt the drive that the operating system itself is installed on.
Client-side encryption utilities for the cloud: A newly emerged category. These utilities encrypt files before they are uploaded to cloud sync/storage locations. The files are encrypted in transit and while at rest in the cloud. Cloud encryption utilities employ various forms of virtualization to present cleartext client-side, and they operate in on-the-fly mode.
Cautionary Notes Operating systems are messy: Echos of your personal data — swap files, temp files, hibernation files, erased files, browser artifacts, etc — are likely to remain on any computer that you use to access the data. It is a trivial task to extract those echos.For example, when you encrypt and compress files, clear-text versions that existed before you compress/encrypt the file or clear-text copies that are created after you decrypt/decompress it remain on your hard drive. Unless you purge — not just delete — those clear-text files. 😦

The fact that an encryption program “works” does not mean that it is secure. New encryption utilities often appear after someone reads up on applied cryptography, selects or devises an algorithm – maybe even a reliable open source one – implements a user interface, tests the program to make sure it works, and thinks he’s done. He’s not. Such a program is almost certain to harbor fatal flaws.


“Functionality does not equal quality, and no amount of beta testing will ever reveal a security flaw. Too many products are merely buzzword compliant; they use secure cryptography, but they are not secure.” –Bruce Schneier, in Security Pitfalls in Cryptography


Further advice about how to use encryption are discussed in Encryption is Not Enough, including what you need to do beyond encryption to be sure your private data is not lost or exposed.

Advertisements