SHARE
Facebook X Pinterest WhatsApp

Can Your Computer Keep a Secret?

Very few things in life cause more work-related stress than a missing notebook computer, removable drive or other storage device. Those that have misplaced those items are wondering, “Who is looking at my data or accessing my files?” After all, a stolen storage device is how identity theft or corporate espionage can start. Aside from […]

Written By
thumbnail Frank Ohlhorst
Frank Ohlhorst
Feb 29, 2008
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Very few things in life cause more work-related stress than a missing notebook computer, removable drive or other storage device. Those that have misplaced those items are wondering, “Who is looking at my data or accessing my files?” After all, a stolen storage device is how identity theft or corporate espionage can start.

Aside from keeping your devices locked away in a vault, there is another option to protect that data: encryption. Sure, encryption technology has been around for some time, and even today’s OSes (think Windows Vista BitLocker) incorporate the technology, but how many people do you know that actually use any of the current encryption technologies to properly protect transportable storage devices?

For most, the answer is “not many.” Well why, is that? It’s a combination of complexity and ignorance that halts encryption.

TrueCrypt V4.3a from TrueCrypt Software may very well be the answer to those thorny questions. Designed to establish and maintain an on-the-fly-encrypted drive (basically, automatic encryption), TrueCrypt prevents any data from an encrypted volume from being retrieved without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (that is, file names, folder names, contents of every file and free space).

What helps to make the product unique when compared with others is that unlike other folder-locking applications, TrueCrypt cannot be circumvented by booting in safe mode or booting from a CD (or even worse, by terminating the process in Task Manager), the only way to access the data is to mount it using TrueCrypt.

If you’re looking to secure your volumes quickly and safely, give TrueCrypt a try! More info can be found over at http://winbyte.de/.

Recommended for you...

Video: How Scale Computing and Velasea Power 6,000+ Surveillance Cameras at Resorts World Las Vegas
Katie Bavoso
Jul 25, 2025
Video: How Simply NUC and Scale Computing Are Powering the Edge with Future-Proofed Hardware
Katie Bavoso
Jul 23, 2025
Top Tech Vendors Powering the Modern Enterprise
Sam Ingalls
May 26, 2022
How Qualcomm and Lenovo Plan to Solve Enterprises’ Apple Problem
Rob Enderle
Dec 3, 2021
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.