January 01, 2007
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: TrueCrypt is great for file encryption and it's free
- Weaknesses: TrueCrypt cannot, at present, encrypt the boot OS drive in a Windows XP environment
- Verdict: TrueCrypt is still evolving, and more functionality may be coming soon. It might become a viable alternative to commercial packages in the future. Remember, though, this is not a whole disk encryption product
As a big fan of open- source software, we were hoping that TrueCrypt would give the commercial products a run for the money not spent. Unfortunately, TrueCrypt is not really whole drive encryption software as it was defined for this category.
TrueCrypt can encrypt an entire drive - however, that drive cannot be the drive from which the operating system boots. TrueCrypt is capable of encrypting external USB drives, flash drives and MP3 players, but it cannot encrypt the partition on which Windows XP resides.
The installation was quite straightforward, and the documentation was written well enough so that we could determine in just a few pages that TrueCrypt was not able to perform entire disk encryption in the way the other products in this category could.
A quick Google search yielded a support page for TrueCrypt. This explained why it could not encrypt the operating system hard drive: the product does not have a software agent that would interrupt the boot process to require authentication for the encryption software to decrypt the drive.
TrueCrypt's documentation mentions that this functionality may be coming in a future release, so it may be a case of watch this space.
This product is good at what it does in terms of encrypting external (non-boot) drives, but as far as protecting your operating system, this open source offering just does not have that ability yet.
Since the software is free, it does provide good value. In addition, if you are operating on a thin budget, TrueCrypt is the best option for file encryption.
Many users create a boot partition that, perhaps, contains applications along with a second partition for data only. That part can be fully encrypted using TrueCrypt, or you can create encrypted containers for various folders.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- The information security implications of M&A deals
- Cyber-security must reflect risk not just regulation
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success