Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Part of a Group Review

TrueCrypt review

Article comments

If you aren't running Windows 7, or you want to use something other than a Microsoft product (and don't want to spend any money), TrueCrypt from the TrueCrypt Developers Association is pretty hard to beat.

The product matches the features offered by Microsoft's BitLocker and offers a couple of interesting additional features, such as the ability to create a virtual encrypted volume that is mounted as a drive letter or associated with a virtual folder. In other words, you can store all of your critical data files on a separate, encrypted disk volume and then access those data files by associating a drive letter with the volume and entering the associated passkey. That way you can allow others to use your PC while your sensitive data is protected from prying eyes.

That method offers several advantages. First off, you can "hide" the encrypted volumes, so other users don't even know that they exist. You can also segregate your data files, only encrypting what you deem important. And finally, you do not need to encrypt your application or operating system files, which means the system won't take as much of a performance hit.

TrueCrypt uses several different encryption algorithms, including AES, Serpent and Twofish. Those algorithms can be combined in many different ways to create complex encryption schemes — those looking to delve into the technical details of TrueCrypt's encryption algorithms can check out the dozens of pages of information on its web site. I downloaded version 6.3 from the site; installation was a matter of minutes.

When I launched the application, I was presented with a concise management console that was very easy to navigate. It offered a list of drive letters (which could be associated with encrypted volumes), as well as several buttons used to mount and dismount encrypted volumes. The top of the screen offers several pull-down menus, which include features such as encrypting the system volume, creating rescue media, building keys and so on. Simply put, anything that TrueCrypt could do was right at my fingertips.

One of the first things I chose to do was encrypt my complete hard drive on my system. Selecting that option launched a wizard that made the process ridiculously easy. Like BitLocker, the encryption process ran in the background. It took about two hours to encrypt the contents of the Toshiba Portege system, almost an hour faster than BitLocker. Also, TrueCrypt used negligible amounts of CPU time, as little as 2% or 3% of processor utilization.

TrueCrypt offers the ability to create a virtual encrypted volume

TrueCrypt offers a couple of interesting additional features, such as the ability to create a virtual encrypted volume that is mounted as a drive letter or associated with a virtual folder.

TrueCrypt offers several other features that are worth noting. First of all, the product comes with extensive context-sensitive help function, which does an excellent job of illustrating its capabilities and nuances — in fact, its help is as good as that from the two other products, which have commercial vendors. Secondly, I found TrueCrypt's approach to mounting encrypted devices to be a logical and manageable process.

Simply put, when you want to access an encrypted volume, you just mount that volume with a drive letter. All you need to do then is type in your passkey to access the data. You can also make those connections persistent and automatic, so that you will not have to enter passwords or manually map drives whenever you insert an encrypted device or access an encrypted volume. While that does make things a little simpler, automating password or key entry can defeat the purpose of encryption on a portable system. However, automation does work well with removable media — that way, when traveling with a key drive, the data is fully protected and only available when plugged into a system that contains the proper passkey.

I tested TrueCrypt's ability to work with removable media by encrypting four USB key drives. While the process was not quite as automated as with BitLocker, it still proved easy. All I had to do was insert the USB drive, select the device from the TrueCrypt menu and then launch the encryption wizard.

Unlike BitLocker, TrueCrypt does not include any type of a reader application — that means any system that needs to read the encrypted removable media must have TrueCrypt installed. TrueCrypt automatically works with TPM and adheres to the standard.

TrueCrypt also offers a plethora of configuration settings, default options and operational choices. For example, users worried about forgetting their passkeys can create rescue media that will grant them access to an encrypted volume if needed. TrueCrypt works with Microsoft Windows 7/Vista/XP/2000; it is also available for Apple Mac OS X and Linux systems, making it a good choice for users who work with multiple platforms.

In fact, the number of choices can be overwhelming. Luckily, TrueCrypt's extensive documentation helps you to navigate through the choices — and it's safe to say that the majority of users will only use the basic features of the product.


More from Techworld

More relevant IT news


Joe Z said: HorribleAll I wanted to do was create an encrypted USB Flash Drive 25 count em tries later requiring multiple reboots and reformats I succeeded twice at creating an encrypted USB device When I tried to do it a 3rd time I wasam unable to replicate the process This app is sht

Michael Young said: The law is split among Federal Court districts right now and has not yet reached the level of the Supreme Court So literally refusal to decrypt is OK in part of the country and will get you jailed for contempt in other parts of the US

sabrina D said: As its a open source application too but i am not that much satisified with truecrypt

Paulb said: It is a criminal offence to supply encryption technology in the US that the US governmentagencies cannot decrypt If they can do it so can anyone else determined enough to do so These systems are valid only for keeping the wife and kids out of your porncollection They serve no valid business use whatsoever and just give a false senseof security - which is worse than none at all

ed said: For example users worried about forgetting their passkeys can create rescue media that will grant them access to an encrypted volume if needed This is quite incorrect as the rescue disk only works for restoring the header of a damaged volume but you still have to know the correct password its not stored in the rescue disk

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *