Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.TrueCrypt License Version 3.0 (legacy code only) Trend Micro Endpoint Encryption (Mobile Armor) PGP Corporation (acquired by Symantec in 2010) NetLib Encryptionizer (directory encryption) Source Auditable for Commercial CustomersÄustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) This is a technical feature comparison of different disk encryption software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |