====== 7 TrueCrypt Alternatives By Krati Dubey Aug 28, 2013 ====== From: http://www.techshout.com/alternatives/2013/28/truecrypt-alternatives/ ====== VeraCrypt ====== From: https://veracrypt.codeplex.com/ Also: https://www.idrix.fr/Root/content/category/7/32/60/ HowTo: https://www.howtogeek.com/108501/the-how-to-geek-guide-to-getting-started-with-truecrypt/ VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format ====== ciphershed ====== From: Forked to CipherShed: https://ciphershed.org/ Last release 2016 CipherShed is free (as in free-of-charge and free-speech) encryption software for keeping your data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. Learn more about how CipherShed works and the project behind it. ====== Folder Lock 7 ====== http://www.newsoftwares.net/folderlock/features You create Encrypted storages to keep your important files encrypted. These storage 'Lockers' are dynamic, smaller in size when created and grow as your need increases. All the data remains encrypted even when you are accessing your files. Decryption process takes place in memory leaving no traces or recoverability of the file on your system Auto Protection setting allows you to set duration of inactivity on your PC to perform certain tasks while the application is running. The setting provides several data protection options like Closing Lockers, Logging out from various other features when the duration of inactivity is over. Furthermore, you can set the application to Exit, Log Off PC , or Shutdown the PC. This setting is useful if you fear access to your files while you're away from your PC at home or office. ====== AxCrypt ====== http://www.axantum.com/AxCrypt/Default.html AxCrypt - Password Protect Files With Strong Encryption AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files. We have received 2,544,844 registrations, so it is tried and proven! AxCrypt is a great complement to services such as Dropbox, Live Mesh, SkyDrive and Box.net . ====== steganos ====== http://www.steganos.com/us/products/data-security/safe/features/ Encrypted virtual safes protect documents, photos and videos on PCs and laptops. Each data vault – any number of which can be set up – holds up to 1,000 GB = 1 terabyte! The size of safes can also be modified at a later stage by using the practical slide control. Similar to trucrypt. Has free space shredder. ====== freeotfe ====== http://www.freeotfe.org/features.html Highly portable - Not only does FreeOTFE offer "portable mode", eliminating the need for it to be installed before use, it also offers FreeOTFE Explorer - a system which allows FreeOTFE volumes to be accessed not only without installing any software, but also on PCs where no administrator rights are available. This makes it ideal for use (for example) with USB flash drives, and when visiting Internet Cafés (AKA Cybercafés), where PCs are available for use, but only as a "standard" user. ====== truecrypt ====== Forked to cipherShed: https://ciphershed.org/ http://www.truecrypt.org/ Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. ====== kruptos2 ====== http://www.kruptos2.co.uk/index.html Password protect any file Quickly and safely encrypt your photos, movies, documents or any other files. Once encrypted only you can open your private files using your password. Double-click integration Kruptos 2 Professional will automatically re-encrypt your file when you're finished editing so you don't have to worry about your file being left unsecured. ====== AFS4 Advanced File Security ====== http://www.osborn-software.net/1click_encryption.php Experience encryption to be easier than ever: Just 1-Click is necessary and all your files will get encrypted directly and safely and will be protected against any unauthorized access. Straightforward and fast! Are you fed up with always forgetting your 12-place password or to re-enter it always again? With USB-Key you can use your USB drive as a key to your password. No forgetting or mistyping anymore! Even the world's best encryption is completely useless if you don't delete your sensitive data (e.g. temp folders, pagefile) safe and securely. With "Secure Windows Shutdown" it's super simple: just select the path or directory you want to get removed safely and afterwards windows will be shutdown automatically. ====== LURKS ====== From: https://gitlab.com/cryptsetup/cryptsetup/ Cryptsetup is utility used to conveniently setup disk encryption based on DMCrypt kernel module. These include plain dm-crypt volumes, LUKS volumes, loop-AES and TrueCrypt (including VeraCrypt extension) format. Project also includes veritysetup utility used to conveniently setup DMVerity block integrity checking kernel module and, since version 2.0, integritysetup to setup DMIntegrity block integrity kernel module. LUKS Design LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it does not only facilitate compatibility among distributions, but also provides secure management of multiple user passwords. In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, enabling the user to transport or migrate his data seamlessly. ====== cryptoforge ====== http://www.cryptoforge.com/strong-encryption.htm The command-line interface allows quick integration into automated processes, scripts and other systems, providing both interactive and non-interactive server running modes. Complementing the command line interface, a built-in visual tool allows you to build command-line parameters without having to learn the syntax for these parameters. The file encryption module enables you to encrypt, decrypt, and shred -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer or My Computer with right-click ease. The file encryption module handles files of any type and size, on any kind of medium, like hard drives, removable drives, USB PenDrives, tape drives, network drives, etcetera. ====== My Lockbox ====== http://fspro.net/my-lockbox/ Freeware version enables you to hide, lock and password protect almost any folder on your computer. You can use My Lockbox to hide your private data from prying eyes - your files will be not accessible both from local and remote users. ====== LocK-A-FoLdeR ====== http://code.google.com/p/lock-a-folder/ is a lightweight and easy to use program that allows you to hide and lock up any folders on your computer, making them invisible and inaccessible to anyone but yourself. After you create a master password, simply select the folder(s) you want to hide and click a button to make them disappear. To unlock a folder, enter your password and select the folder that you want to unlock. ====== Masker ====== http://www.softpuls.com/masker/ Masker is a program that encrypts your files so that a password is needed to open them, and then it hides files and folders inside of carrier files, such as image files, video, program or sound files. The strong encryption up to 448-bit and password protection makes the hidden data inaccessible for unauthorized users! Only you using your password are able to open and extract your hidden files. You can hide any files, and even whole folders with sub-folders! The carrier file will remain fully functional! Images can be viewed, sounds can be played and videos can be displayed on the monitor. You can transfer the carrier file through the internet and the hidden files inside will be transfered simultaneously with the carrier file, because they are the part of the carrier file. Use Masker to keep you sensitive secret files secure hidden and super-protected! ====== WinGuard Pro 2012 ====== http://www.winguardpro.com/ Feature Built-in programs: around 20 common programs built-in for locking Lock Programs, Applications, EXE Files with a Password Encrypt Files and Folders 128 bit AEs Password Lock Web Browser, inc. Internet Explorer, Chrome and FireFox Screen blank in emergencies, leaving only a password box Lock more features, like; Desktop, Windows Explorer, My Computer, Internet Access and Downloading and more ====== Encrypted Notes ====== opensource encrypted notepad Encrypted Notes is a very simple to use application providing state of the art industrial-strength encryption to users who want nothing more than to store sensitive information in text documents. Users can be completely at ease in the security provided by Encrypted Notes because it follows best practices in dealing with encryption algorithms and does not try to do anything that is not standard procedure. This is important because "being too clever" is one of the most common reasons for security failures in the application of cryptography. ====== Cryptzone’s free encryption ====== http://www.cryptzone.com/free-encryption/ Cryptzone’s free encryption solution combines secure encryption of USB flash drives, email encryption and file & folder encryption in one, free solution. Based on Cryptzone’s advanced encryption solutions Secured eUSB, Secured eMail and Secured eFile, this free encryption product delivers high levels of security with ease of use. it does not require new servers or other upgrades to existing infrastructure. ====== SteadyCrypt ====== http://code.google.com/p/steadycrypt/ "SteadyCrypt is a java-based open source encryption tool for quickly encrypting confidential files to prevent unauthorized usage. As far as features, tools and encryption algorithm are concerned, it is not comparable to widely used TrueCrypt, but users who wont like to follow lengthy procedure in TrueCrypt to create encrypted containers, will find it useful. Being a java-based application, it can work on any OS platform where JRE is installed. Moreover, it supports simple drag & drop behavior to specify folders and files which are to be encrypted. The encrypted containers are secured with a master password which has to entered after installing the application. ====== Espionage ====== http://www.taoeffect.com/espionage/ Espionage is the most advanced encryption solution for Mac OS X, yet easiest to use Protect Individual Folders Until now it has been surprisingly difficult to password protect a folder on Mac OS X. Now, Espionage is here to solve that problem for good. By encrypting only what is necessary, Espionage lets you stay secure while avoiding the penalties of encrypting too much. ====== DiskCryptor ====== From: https://diskcryptor.net/wiki/Main_Page 1.1.846.118 Stable 09.07.2014