From: REM on

We're installing it on all of our laptops to prevent any medical data
from falling into the wrong hands. It absolutely rocks!

This has to be the best open source program that I've ever used.

Just 240 laptops more to go... :)


From: Bear Bottoms on
REM <REMbranded(a)netscape.com> wrote in
news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com:
>
> We're installing it on all of our laptops to prevent any medical data
> from falling into the wrong hands. It absolutely rocks!
>
> This has to be the best open source program that I've ever used.
>
> Just 240 laptops more to go... :)

For my purposes, TrueCrypt is fine as I never use public computers.

http://www.hotbutteredit.com/video/software/truecrypt/encrypt_data_using_tr
uecrypt.htm

http://zi.ma/d3a8d4

--
Bear Bottoms
Freeware website: http://bearware.com
From: Frank Hahn on
REM <REMbranded(a)netscape.com> wrote in
news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com:

>
> We're installing it on all of our laptops to prevent any medical data
> from falling into the wrong hands. It absolutely rocks!
>
> This has to be the best open source program that I've ever used.
>
> Just 240 laptops more to go... :)
>
We encrypted approximately 70 laptops a year or so ago. It was spread over
several months because we tried to work around work schedules, etc.

Just remember that if something happens to the operating system and/or hard
drive, more often than not, you may not be able to get any data from the
drive. Decrypting the hard drive from the created CD takes a long time.

Also, if you are familiar with how to create a Bart PE disk, you can find
plugins for Truecrypt online. I have used that several times to boot the
laptops that would not start otherwise, mount the encrypted drive, and then
get data copied off to a USB drive.

Good luck.

--
Frank Hahn
From: Craig on
On 01/24/2010 06:45 AM, Frank Hahn wrote:
> REM<REMbranded(a)netscape.com> wrote in
> news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com:
>
>>
>> We're installing it on all of our laptops to prevent any medical data
>> from falling into the wrong hands. It absolutely rocks!
>>
>> This has to be the best open source program that I've ever used.
>>
>> Just 240 laptops more to go... :)
>>
> We encrypted approximately 70 laptops a year or so ago. It was spread over
> several months because we tried to work around work schedules, etc.
>
> Just remember that if something happens to the operating system and/or hard
> drive, more often than not, you may not be able to get any data from the
> drive. Decrypting the hard drive from the created CD takes a long time.
>
> Also, if you are familiar with how to create a Bart PE disk, you can find
> plugins for Truecrypt online. I have used that several times to boot the
> laptops that would not start otherwise, mount the encrypted drive, and then
> get data copied off to a USB drive.
>
> Good luck.
>

Thanks for posting that, Frank... I hadn't thought about recovery issues.

--
-Craig
From: VanguardLH on
Frank Hahn wrote:

> REM <REMbranded(a)netscape.com> wrote in
> news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com:
>
>>
>> We're installing it on all of our laptops to prevent any medical data
>> from falling into the wrong hands. It absolutely rocks!
>>
>> This has to be the best open source program that I've ever used.
>>
>> Just 240 laptops more to go... :)
>>
> We encrypted approximately 70 laptops a year or so ago. It was spread over
> several months because we tried to work around work schedules, etc.
>
> Just remember that if something happens to the operating system and/or hard
> drive, more often than not, you may not be able to get any data from the
> drive. Decrypting the hard drive from the created CD takes a long time.
>
> Also, if you are familiar with how to create a Bart PE disk, you can find
> plugins for Truecrypt online. I have used that several times to boot the
> laptops that would not start otherwise, mount the encrypted drive, and then
> get data copied off to a USB drive.
>
> Good luck.

I would think that if the .tc container has files in it that are important
that the .tc file itself should be included in your regular backups. Even
if your OS or hard disk crashes, you restore the .tc file from your backups
and just use the same password you were using before to open the container.

If you're using TC to encrypt a whole partition, I would think that your
backups would still be reading the decrypted files just like you are when
you are accessing that partition. As with any backups with sensitive
information, they should be encrypted (which is wholly separate of the
encryption of TC).

If you don't backup, you deem your data as worthless or reproducible. Since
"medical data" infers a company, the company should be backing up their
data. Since this also for a company, they should already have in place the
sysprep or images they use to restore their workstations which take a short
time to bring the host back to its initial state, and then restore the .tc
file from backups or use TC to encrypt the partition and then do a restore
of files from the backups into that partition.