Hi Hurst:) Thank you very much for taking the time to help the Eraser Project. I was hoping to make this a comprehensive list, do you know...
Hi :) Thank you LowWaterMark for letting me post adverts for help here. We have had a couple of replies from Wilders Security Forums which...
Hi:) I was just wondering if anyone here has a special interest in data overwriting patterns or has any inside knowledge of overwriting...
Hi Chris :) Thank you very much for showing an interest in helping Eraser V6, you are just the sort of person we wanted. In fact it is almost...
Hi kareldjag:) Thank you for the excellent post and very useful links. I also agree very much that too much importance is given to the...
Thank you Easter, we need skilled people ASAP, please don’t forget to get in touch. This may not be a problem, how many years have you been...
I am guessing he must have his own methods.
Thank you for your kind words.;D I am also looking for people to help out with the Eraser V6 documentation (User Help File) etc. Would you be...
Hello. I assume most security minded people have heard of the secure overwriting tool called Eraser. As with most classics Eraser V5 has...
Yeah, it is implementing the freely available tool HDDerase and making a hardware / firmware version of it. You can achieve exactly the same...
I think you are misunderstanding what header backups I am talking about. Hidden container ones.
There are some good suggestions there DavidXanatos. I would like to see them implemented into TC. I hope they haven’t forgotten the CD/DVD...
AAAARRRGGGHHHH !!!!! Header backups still not working !! How long has that been a bug ?
Hi KookyMan Interesting find, well done !! I have just checked an old version I have of Truecrypt 5.1a Downloaded 18 March 2008. SHA...
I see you have added these last two little gems since my post. To be honest after reading your rant I wish I hadn’t taken the time to try to...
It is common knowledge to anyone who has taken the time to read the link I provided you with. Yes, if they have the master key. In fact if...
It’s common knowledge. You are misunderstanding what the password and keyfile you are using actually do. You are wasting your time with...
Hi truthseeker Sorry, but it doesn’t work like that. The key obtained from RAM is the decryption key. The keyfile and password you are...
Re: Thoughts. Like I said…::) :)
Hi KookyMan Wow, thank you for taking the time to write and post that full explanation !:D I see why people are getting fed up with the TC...
Hi Nagib:) I do use TOR and that is why I would like a secure login on the forum to prevent the exit node from viewing my username and...
Oh, do tell me more !!!!;D
Hi Thank you for your reply. I understand that some people may ask why the certificate is not signed but I wonder if those users would...
I have been on forums that do, especially the security ones. Isn’t this a chance for wilderssecurity to lead by example ?
Hi KookyMan:) I understand you hesitancy with Truecrypt V6. What scares me is Truecrypt has had quite a few bugs over the years with a very...
Separate names with a comma.