If you have an account, please:
Log in
Stay Informed

Here's something that

I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

▸ Simple to add and manage gift lists for yourself, your kids, or your business

▸ Secret gift coordination

▸ Duplicate gift protection


Think something's here that shouldn't be? contact me!

How can I help you?
Contact Jeremy

Truecrypt – Free Encryption Utility to Protect Your Files

Encryption made easy

In cases where your computer is stolen or if you are worried about anyone you know accessing certain folders and files on your computer, you might want to protect them behind strong encryption.

Truecrypt lets you create an encrypted file container that works like a folder, but looks as if it were a file full of random data. To use the encrypted container, you select it in Truecrypt, enter your password (which should be a very strong one), and the program will "mount" the file as if it were a removable hard drive on your system.

While mounted, you can copy files and folder to and from your "drive" and organize them as if it were a second hard drive or thumb drive plugged into your computer. When you're done, you "dismount" the container and it returns to its strongly encrypted state while looking like a simple file full of random data.

It's easy to set up and use as the documentation is very straighforward and includes a step-by-step walkthrough with pictures.

Share This

Have a Comment or Question?

No Comments Yet to “Truecrypt – Free Encryption Utility to Protect Your Files”

» Comments RSS Feed


However the link you have on your above web page
–> http://truecrypt.sourceforge.net/

States that True Crypt 1) is not secure 2) is no longer supported, and 3) you should instead use BitLocker.

    I’ve heard Truecrypt is out, but I would never use Bitlocker which is tied to the operating system and therefore very risky. Veracrypt is Truecrypt’s replacement.

How to Steal Identities - Why It's So Easy
Credit Freeze
Out and About Defense
The Identity Theft Victim's Mini-Guide to Recovery
The Geek Privacy Principle
Nothing to Hide
Data Abuse
RFID - Radio Frequency IDentification
Privacy Alias/Persona
Out and About Defense
Online Addiction
The Consequences of Posting Online
Photo Safety
Tricks and Scams
Account Hijacking
Trusting Companies
Bad Passwords
Password Tips and Tricks
Password Protection
Password Mugging
Computer Security
E-mail Safety
Kids and Computers
Shopping Online
All About Warranties