Nowadays, Data security is a sensitive topic. The increasing number of operating system features and Web services introduces more and more options for accessing, modifying—and, at the same time, losing—data.
I know that there are already many solutions to protect your data. However, most of these solutions come with a catch. They either require you to purchase software or hardware, or require you to change the way you work on your system. In addition, not all security solutions are truly secure, as there are sometimes ways around security features, which compromise your data. External hard drives with built-in encryption sometimes have intended or unintended backdoors; other examples are mentioned above.
I have to say that the best things in life are free, and Truecrypt may be one true security plan in place for protecting your data. It has been around as an OpenSource encryption tool for a few years.
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention.
When you encrypt files on your hard disk, not only do you want to scramble the files, but sometimes you want to prevent others from discovering that the files even exist, a sleight-of-hand known as steganography. When comes to this point, TrueCrypt is a real winner and comes at a price that can’t be beat. Not only does Truecrypt use strong encryption when it creates encrypted volumes (including 256-bit AES and 448-bit Blowfish), it also creates hidden volumes that are indistinguishable from random data.
Main Features of TrueCrypt:
* Creates a virtual encrypted disk within a file and mounts it as a real disk.
* Encrypts an entire partition or storage device such as USB flash drive or hard drive.
* Encrypts a partition or drive where Windows is installed (pre-boot authentication).
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
* Encryption can be hardware-accelerated on modern processors.
* Provides plausible deniability, in case an adversary forces you to reveal the password:
* Hidden volume (steganography) and hidden operating system.
I recommend you downloading and trying TrueCrypt for a security solution. If you take the time to learn how to use Truecrypt’s steganographic features, the program will do a great job of protecting your data from snoops.