There is a theoretical limit to how fast a password can be guessed based on the laws of physics. For details, search "Von Neumann Limit" The...
Make a backup of your system disk and then give it a try! There is also an option to skip the rescue disk if you use the command line. Truecrypt...
I understand why people frequently request a self destruct function but what I don't understand is why drivecrypt or anyone else would actually...
Not sure that the ACLU lawsuits are the way to go but I do agree that searching laptops at the border is useless. Sure, you occasionally catch...
Security and privacy methods will always be changing. It's an ever evolving arms race. Once quantum computing becomes commonplace, quantum...
Not sure how effective file hiding programs would be. The first line of defense is of course to make sure your clean install is really clean....
You could just encrypt the VM with system encryption. Booting or accessing the VM in any way still requires a password. The only privacy issue...
LockBox, What do you mean by "password portfolio"? Do you predefine a few hundred passwords that you rotate through? About the regular...
The main thing about security is to take time and think about what you are trying to protect. "Protect agents data theft" is too general. You...
Usually your ISP or company has a SMTP server that will allow you to send emails with customized FROM: address. I have used Bmail in the past for...
I have thought of this from time to time and still don't have a robust solution. I do one thing that takes care of some of it. I use a formula...
I have used truecrypt FDE for several years now and never had a problem. Sure, if your hard disk crashes, it will be much more difficult to...
truecrypt can not load keyfiles when booting and encrypted system. Only keyboard input can be used for password. This is yet another reason that...
This seems to be the sticking point that will eventually make truecrypt obsolete. Reminds me of the way Microsoft used DOS to load windows98....
"Is it still impossible to use TC travelers mode on a non-admin machine without TC installed?" If you can't login as admin you can't load the...
There are ways to block such attacks. With truecrypt you can create a "rescue" disk that contains a copy of the boot loader and volume header. If...
As I recall, truecrypt can be run from a batch file with command lines to auto mount a container....
What is your "data drive"? Is your laptop disk split into two partitions or are you talking about an external drive? The most important part of...
Not sure how important retinal scans would be in a public place. There is much discussion about false positives but I can't find anything about...
You are correct that high speed brute force is useless for a remote attack. This sort of attack only applies in the case where your adversary has...
TrueCrypt has recommended passwords with 20 or more characters for years. A 20 char pw is not brute force(able) using any currently known...
I was watching the "PBS News Hour" and some "security expert" showed video of someone on a hi-rise roof top with a 6 foot antenna pointed down at...
I don't know if this is an old trick but I recently posted a couple of items on Craigslist and immediately received a number of email responses....
I couldn't find anything about this using simple internet searches, then I had an idea. If I create an encrypted folder somewhere then have...
Truecrypt 7 released today. Unfortunately the changelog hardly justifies a whole number version increment. Should have been 6.4x or so.... New:...
Separate names with a comma.