As said before, I am 99% sure they banned Justin. I don't think Justin is against TC. But those guys on TC don't seem to be able to take any...
Georg, your password can easily become compromised. If someone manages to sneak into your comp. Or if they plug in a hardware keylogger. Those are...
Same here. I hope they will improve it and make it lighter on resources.
Georg, you have a extremely long list of questions here. I'll try to answer to a few. 4. I use cascade for system encryption. My comp is...
KookyMan, I finally got some time and inspected the problem. It seems that I was only partially right. I have used several mp3 files as keyfiles...
I am sure that the mp3 files were not modified. I have my keyfiles safely stored on several different storage devices. And I never play them....
I can only recommend you to get rid of the Folder Lock. It's a scam. When I uninstalled it long ago it killed my truecrypt file containers. And...
Yes, it can run on Windows. http://en.wikipedia.org/wiki/VMware_Server 8)
However, what if I run http://www.vmware.com/download/server/ alone? Without ESXi? Would that work properly along with system encryption?
KookyMan, I won't use system ancryption within VM. I will only use a previous version of TC (as I can not do it on host while the whole system is...
Thanks guys. So, it's highly unlikely for that to happen. They need the equipment to cool it down to -50 °C. :o I guess only a few...
I have encrypted the whole hard disk with TrueCrypt. Now I wanted to install virtual machines ( both VirtualBox-1.6.4-Win_x86 and VMware ESXi)....
Can anybody please give a clear answer? I definitely didn't understand KookyMan's answers as they were too short. For how long the master key...
TrueCrypt 6.0a is extremely faulty. Not only that it can not create the header backups if keyfiles were used but it also can not mount volumes...
I knew about freezed RAM attack before. However, there are a few things that I do not understand. Lets assume that I do system shut down...
I could use it without reading the user guide too. But since I haven't had any previous knowledge about encryption, it is very likely that I would...
Thanks for all your posts Justin. I'm sure you haven't had an intention to promote any program when you were making your posts. TrueCrypt...
Yes, that's why everybody should use only accounts which they created on TOR while using it. If you're doing it in a proper way it's not a big...
Overwriter, you can always use TOR if you want to hide your browsing. But you also have to create email acc while using TOR. You shouldn't log in...
KookyMan, TrueCrypt isn't just another program. To use it in a proper way I had to read the user guide at least 2 times. And I also read hundreds...
I wonder what would happen in this hypothetical situation? What if I create file containers with Serpent-AES and one day AES is broken? Or, if...
Separate names with a comma.