Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Michael Barnes
For what? They have my physical property (all the one's and zero's on the drive). Besides, won't matter; they won't be able to discover hidden volumes if set up correctly.

Password for what?

While I may not be able to decrypt the files, I can usually tell pretty quickly if someone has been using encryption software, even if the software is on a thumb drive and not on the computer itself. The software will leave traces in the registry, in the page file, in the master file table, etc. If you can find when the encryption software was invoked and then find the names of files accesses shortly afterward, you can often find the encrypted containers (especially true for TrueCrypt). That doesn't mean you can decrypt them - just that you can locate them and show that encryption software was used to protect them.

108 posted on 07/11/2011 1:44:12 PM PDT by CA Conservative
[ Post Reply | Private Reply | To 93 | View Replies ]


To: CA Conservative

But who is to say if it is the PC’s owner doing the encrypting or a trojan virus?


129 posted on 07/11/2011 4:19:35 PM PDT by B4Ranch (Allowing Islam into America is akin to injecting yourself with AIDS to prove how tolerant you are...)
[ Post Reply | Private Reply | To 108 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson