Many software packages have been discussed throughout this course regarding their usefulness and application in a computer forensic environment. I chose to write about encryption and anti-spyware software. Specifically I will talk about TrueCrypt and Spybot – Search and Destroy. TrueCrypt is a disk encryption package available for free. It is also open source, which allows independent developers to legally change/modify and/or expand the software at their discretion, as long as all applicable terms and conditions of the TrueCrypt license are met. TrueCrypt is also cross-platform, so it is not dependent on the operating system. It supports Windows, Mac OS TrueCrypt volumes are also platform independent and can be mounted on different operating systems. There are several methods for using TrueCrypt to provide encryption for sensitive files, as well as to provide a level of privacy. TrueCrypt can be used to encrypt entire hard drives, flash drives, and partitions. It can be used to force pre-boot authentication by encrypting the drive or partition on which an operating system is installed. The end user of TrueCrypt may also be given false boot error messages during the pre-boot authentication phase when the encryption password is entered incorrectly. TrueCrypt also has a semi-portable mode, where TrueCrypt does not need to be installed to run. However, this requires administrative privileges in Windows due to driver requirements and can leave traces in the Windows registry. If this is a concern, TrueCrypt also allows the end user to create hidden operating systems and hidden volumes. These offer the end user... middle of the paper......nd Destroy and TrueCrypt are very effective software packages that both come free. Both packages are well designed and perform their assigned tasks very well. However, like all software packages, none are free from bugs and quirks and cannot be expected to work properly in all environments. Therefore, precautions should always be taken before installing any software package on any system, with the understanding that the end user is solely held responsible for problems that occur due to software packages functioning unexpectedly in in such a way as to cause damage to the final system. user machines. TrueCrypt: Free, on-the-fly open source encryption. TrueCrypt, February 14, 2012. Web. March 8, 2012. .. Spybot - Search and Destroy. Safer Networking Ltd., 7 March 2012. Web. 8 March 2012. .
tags