• people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used...
    16 KB (2,145 words) - 16:00, 30 December 2023
  • Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...
    28 KB (3,504 words) - 06:43, 27 March 2024
  • This is a technical feature comparison of different disk encryption software. Hidden containers: Whether hidden containers (an encrypted container (A)...
    70 KB (2,827 words) - 22:38, 29 April 2024
  • Disk encryption software is a computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy...
    10 KB (1,333 words) - 07:10, 26 March 2024
  • Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited...
    15 KB (1,775 words) - 23:01, 8 May 2024
  • experience—the user powers up and logs into Windows as usual. The key used for disk encryption is sealed (encrypted) by the TPM chip and will only be released to...
    35 KB (3,309 words) - 12:15, 6 April 2024
  • In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is...
    24 KB (2,854 words) - 00:51, 3 May 2024
  • cyberattack or a data breach. Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes form in...
    13 KB (1,402 words) - 04:09, 3 May 2024
  • Thumbnail for Encryption
    In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext...
    33 KB (3,575 words) - 16:40, 8 May 2024
  • Thumbnail for Evil maid attack
    via an external USB flash drive – and therefore bypassing TrueCrypt disk encryption. D. Defreez, a computer security professional, first mentioned the...
    15 KB (1,717 words) - 15:16, 13 April 2024
  • Private Disk is a disk encryption application for the Microsoft Windows operating system, developed by Dekart SRL. It works by creating a virtual drive...
    6 KB (566 words) - 00:44, 16 February 2022
  • operating system. With full disk encryption, the entire disk is encrypted (except for the bits necessary to boot or access the disk when not using an unencrypted...
    10 KB (1,112 words) - 04:52, 26 March 2024
  • attacks. Since cold boot attacks target random-access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective...
    38 KB (4,247 words) - 02:29, 16 December 2023
  • Thumbnail for VeraCrypt
    VeraCrypt (category Disk encryption)
    utility for on-the-fly encryption (OTFE). The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can...
    37 KB (3,197 words) - 00:05, 16 March 2024
  • PGP Virtual Disk is a disk encryption system that allows one to create a virtual encrypted disk within a file. Older versions for Windows NT were freeware...
    816 bytes (100 words) - 19:33, 22 October 2020
  • Linux Unified Key Setup (category Disk encryption)
    The Linux Unified Key Setup (LUKS) is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux. LUKS implements...
    14 KB (1,169 words) - 04:54, 7 May 2024
  • Windows Data Protection API (DPAPI) OpenDocument encryption used in OpenOffice.org WinZip's AES Encryption scheme. Keeper for password hashing. LastPass...
    10 KB (705 words) - 22:01, 12 June 2023
  • Thumbnail for Trusted Platform Module
    from a trusted combination of hardware and software), and to store disk encryption keys. One of Windows 11's operating system requirements is TPM 2.0...
    79 KB (6,479 words) - 08:37, 8 May 2024
  • files stored on them, making the encryption process seamless to the user. CrossCrypt is based on FileDisk, virtual disk driver for Windows NT/2000/XP that...
    3 KB (283 words) - 18:32, 29 December 2023
  • service provider, regardless of whether server-side disk encryption is used. Server-side disk encryption simply prevents unauthorized users from viewing this...
    27 KB (2,810 words) - 22:14, 1 May 2024
  • Dm-crypt (category Disk encryption)
    superuser. The fact that disk encryption (volume encryption) software like dm-crypt only deals with transparent encryption of abstract block devices...
    12 KB (1,061 words) - 13:43, 1 March 2024
  • FileVault (category Disk encryption)
    FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers. FileVault...
    13 KB (1,537 words) - 14:17, 11 April 2024
  • Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing...
    48 KB (5,724 words) - 22:43, 29 April 2024
  • GBDE, standing for GEOM Based Disk Encryption, is a block device-layer disk encryption system written for FreeBSD, initially introduced in version 5.0...
    4 KB (483 words) - 15:23, 28 June 2023
  • Sentry 2020 (category Disk encryption)
    Sentry 2020 is a commercial software program for "transparent" disk encryption for PC and PDA. It has two compatible versions, one for desktop Windows...
    1 KB (88 words) - 15:26, 13 January 2024
  • TrueCrypt (category Disk encryption)
    source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, or encrypt a partition or the whole...
    65 KB (6,401 words) - 05:50, 3 May 2024
  • authentication. Full disk encryption outside of the operating system level Encryption of temporary files Data at rest protection Encryption of cloud servers...
    6 KB (628 words) - 08:29, 7 December 2021
  • ECryptfs (category Disk encryption)
    filesystem) is a package of disk encryption software for Linux. Its implementation is a POSIX-compliant filesystem-level encryption layer, aiming to offer...
    4 KB (284 words) - 21:17, 28 August 2023
  • Thumbnail for Hardware-based encryption
    implementation, such as in the Spectre exploit. Disk encryption hardware Hardware-based full disk encryption Hardware security module Intel® 64 and IA-32...
    14 KB (1,242 words) - 02:29, 25 May 2022
  • live system or from backups and used to decrypt the databases. Disk encryption Encryption Hardware security module "SQL Server TDE vs CLE". Retrieved 2017-06-02...
    6 KB (640 words) - 15:21, 10 November 2023