From: REM on 23 Jan 2010 14:18 We're installing it on all of our laptops to prevent any medical data from falling into the wrong hands. It absolutely rocks! This has to be the best open source program that I've ever used. Just 240 laptops more to go... :)
From: Bear Bottoms on 23 Jan 2010 14:28 REM <REMbranded(a)netscape.com> wrote in news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com: > > We're installing it on all of our laptops to prevent any medical data > from falling into the wrong hands. It absolutely rocks! > > This has to be the best open source program that I've ever used. > > Just 240 laptops more to go... :) For my purposes, TrueCrypt is fine as I never use public computers. http://www.hotbutteredit.com/video/software/truecrypt/encrypt_data_using_tr uecrypt.htm http://zi.ma/d3a8d4 -- Bear Bottoms Freeware website: http://bearware.com
From: Frank Hahn on 24 Jan 2010 09:45 REM <REMbranded(a)netscape.com> wrote in news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com: > > We're installing it on all of our laptops to prevent any medical data > from falling into the wrong hands. It absolutely rocks! > > This has to be the best open source program that I've ever used. > > Just 240 laptops more to go... :) > We encrypted approximately 70 laptops a year or so ago. It was spread over several months because we tried to work around work schedules, etc. Just remember that if something happens to the operating system and/or hard drive, more often than not, you may not be able to get any data from the drive. Decrypting the hard drive from the created CD takes a long time. Also, if you are familiar with how to create a Bart PE disk, you can find plugins for Truecrypt online. I have used that several times to boot the laptops that would not start otherwise, mount the encrypted drive, and then get data copied off to a USB drive. Good luck. -- Frank Hahn
From: Craig on 24 Jan 2010 14:03 On 01/24/2010 06:45 AM, Frank Hahn wrote: > REM<REMbranded(a)netscape.com> wrote in > news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com: > >> >> We're installing it on all of our laptops to prevent any medical data >> from falling into the wrong hands. It absolutely rocks! >> >> This has to be the best open source program that I've ever used. >> >> Just 240 laptops more to go... :) >> > We encrypted approximately 70 laptops a year or so ago. It was spread over > several months because we tried to work around work schedules, etc. > > Just remember that if something happens to the operating system and/or hard > drive, more often than not, you may not be able to get any data from the > drive. Decrypting the hard drive from the created CD takes a long time. > > Also, if you are familiar with how to create a Bart PE disk, you can find > plugins for Truecrypt online. I have used that several times to boot the > laptops that would not start otherwise, mount the encrypted drive, and then > get data copied off to a USB drive. > > Good luck. > Thanks for posting that, Frank... I hadn't thought about recovery issues. -- -Craig
From: VanguardLH on 24 Jan 2010 15:21 Frank Hahn wrote: > REM <REMbranded(a)netscape.com> wrote in > news:tmiml5tukaogkf1gqt3kcvrcomho7hkrli(a)4ax.com: > >> >> We're installing it on all of our laptops to prevent any medical data >> from falling into the wrong hands. It absolutely rocks! >> >> This has to be the best open source program that I've ever used. >> >> Just 240 laptops more to go... :) >> > We encrypted approximately 70 laptops a year or so ago. It was spread over > several months because we tried to work around work schedules, etc. > > Just remember that if something happens to the operating system and/or hard > drive, more often than not, you may not be able to get any data from the > drive. Decrypting the hard drive from the created CD takes a long time. > > Also, if you are familiar with how to create a Bart PE disk, you can find > plugins for Truecrypt online. I have used that several times to boot the > laptops that would not start otherwise, mount the encrypted drive, and then > get data copied off to a USB drive. > > Good luck. I would think that if the .tc container has files in it that are important that the .tc file itself should be included in your regular backups. Even if your OS or hard disk crashes, you restore the .tc file from your backups and just use the same password you were using before to open the container. If you're using TC to encrypt a whole partition, I would think that your backups would still be reading the decrypted files just like you are when you are accessing that partition. As with any backups with sensitive information, they should be encrypted (which is wholly separate of the encryption of TC). If you don't backup, you deem your data as worthless or reproducible. Since "medical data" infers a company, the company should be backing up their data. Since this also for a company, they should already have in place the sysprep or images they use to restore their workstations which take a short time to bring the host back to its initial state, and then restore the .tc file from backups or use TC to encrypt the partition and then do a restore of files from the backups into that partition.
|
Next
|
Last
Pages: 1 2 3 4 Prev: what's the difference between these 2 programs? Next: Mouse Speed Switcher |