software:encryption
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| software:encryption [2014/10/12 20:51] – [Folder Lock 7] superwizard | software:encryption [2017/11/03 22:56] (current) – superwizard | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== 7 TrueCrypt | + | ====== 7 TrueCrypt |
| From: http:// | From: http:// | ||
| + | |||
| + | ====== VeraCrypt ====== | ||
| + | |||
| + | From: https:// | ||
| + | |||
| + | Also: https:// | ||
| + | |||
| + | HowTo: https:// | ||
| + | |||
| + | VeraCrypt picks up from where TrueCrypt left and it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. | ||
| + | VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. It can load TrueCrypt volume and it offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format | ||
| + | |||
| ====== ciphershed ====== | ====== ciphershed ====== | ||
| - | From: Forked to yberShed: https:// | + | From: Forked to CipherShed: https:// |
| + | Last release 2016 | ||
| CipherShed is free (as in free-of-charge and free-speech) encryption software for keeping your | CipherShed is free (as in free-of-charge and free-speech) encryption software for keeping your | ||
| data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. Learn | data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. Learn | ||
| Line 51: | Line 64: | ||
| ====== truecrypt ====== | ====== truecrypt ====== | ||
| - | Forked to yberShed: https:// | + | Forked to cipherShed: https:// |
| http:// | http:// | ||
| Line 86: | Line 99: | ||
| With " | With " | ||
| + | ====== LURKS ====== | ||
| + | |||
| + | From: https:// | ||
| + | |||
| + | |||
| + | Cryptsetup is utility used to conveniently setup disk encryption based | ||
| + | on DMCrypt kernel module. | ||
| + | |||
| + | These include plain dm-crypt volumes, LUKS volumes, loop-AES | ||
| + | and TrueCrypt (including VeraCrypt extension) format. | ||
| + | |||
| + | Project also includes veritysetup utility used to conveniently setup | ||
| + | DMVerity block integrity checking kernel module | ||
| + | and, since version 2.0, integritysetup to setup | ||
| + | DMIntegrity block integrity kernel module. | ||
| + | |||
| + | |||
| + | LUKS Design | ||
| + | |||
| + | LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, | ||
| + | only facilitate compatibility among distributions, | ||
| + | In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, | ||
| + | enabling the user to transport or migrate his data seamlessly. | ||
| ====== cryptoforge ====== | ====== cryptoforge ====== | ||
| Line 161: | Line 197: | ||
| Until now it has been surprisingly difficult to password protect a folder on Mac OS X. Now, Espionage is here to solve that problem for good. By encrypting only what is necessary, Espionage lets you stay secure while avoiding the penalties of encrypting too much. | Until now it has been surprisingly difficult to password protect a folder on Mac OS X. Now, Espionage is here to solve that problem for good. By encrypting only what is necessary, Espionage lets you stay secure while avoiding the penalties of encrypting too much. | ||
| + | |||
| + | |||
| + | ====== DiskCryptor ====== | ||
| + | |||
| + | From: https:// | ||
| + | |||
| + | |||
| + | 1.1.846.118 Stable 09.07.2014 | ||
| + | |||
| + | |||
software/encryption.1413147090.txt.gz · Last modified: by superwizard
