You didn't use TrueCrypt. Don't know what you did use. You'll have to find out what program encrypted them to recover them.
Last thing I knew, Linux can not open system volumes in TrueCrypt, so no, a Linux LiveCD won't work. Headers are important because they contain...
I decided to research them just a little bit. Talk about an annonymous group. Domain Name Information is : Administrative Contact:...
So's your housekey, but if you lose it you don't demand the locksmith come and open your front door now do you? Or say that the locksmith is...
The thing is, you'd still only end up with a list of 'Suspects'. There is no way at to actually say that a given file is a TrueCrypt container....
In response to the numerous people who say 'My kid accidentally got hold of the key and caused it to self destruct' / 'left it in the computer and...
They'll still do it. If I had a nickel for every time a gov't did something that was doomed to fail (and does) I'd not have to have my crappy job.
Followed that link, and they are claiming to have a program that can find TrueCrypt containers. I'd love to know how, considering a TC file is...
Oh yes... Great thread... Thats why I'm still using 5.1a.
I have been reading these, and I have to say, I don't consider Nero a worst experience. I think nero has become a disappointment, along with...
Contact the service provider.
Right, sorry. 5.1a is the current (and last) version of the v5 series, so thats the one to get.
Last time I knew, 5.1 has no problems in the backup department, however because of a fundimental design change of the containers, v5 is not...
over a DSL network? Everyone has access to the partition, as well as the port that it is operating over and any vulnerabilities that the OS is...
You know, the Guttman Wipe is not necessary either. a simple random data pass will eliminate it. If you did a 35 pass wipe and still recovered...
Some of this just confused me, but let me weed out the parts that I think I understand. Something to keep in mind is that TC's goal is to have...
SecMonk, Before you call me a troll (a complete first for me on any forum) I was not referring to only this posting. The TC Forums have started...
David - Lets see. TC Forum closes immediately a thread that points out a shortcomming in TC. Why does this not surprise me anymore? I'm still...
War - Are you using a hidden container, and if so, is that hidden container using a keyfile? If no to either of these, the keyfile bug...
I heard once that as a flashdrive gets old and its read-write cycles are running out, sometimes the (free) space on the drive will start to...
Except it comes down to the question, is it easier and more profitable to continue with "business as usual", or to actually rewrite large parts of...
Just make an image from within the running OS, like with Acronis True Image... Dont' do it from a boot disk, do it from the running system and it...
Racoon's here now so hopefully he'll see this and respond first hand.
Actually, it would Huangker. He's talking about having the password entered in for the outer container, so you have direct access to the disk and...
Jandy, he needs to go from machine to machine, so unless he can arrange to have all those machines installed ahead of time, which is unlikely.
Separate names with a comma.