<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>truecrypt Archives - Reactual</title>
	<atom:link href="https://reactual.com/tag/truecrypt/feed" rel="self" type="application/rss+xml" />
	<link>https://reactual.com/tag/truecrypt</link>
	<description>Useful Tools and Products</description>
	<lastBuildDate>Fri, 04 Dec 2015 21:06:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://reactual.com/wp-content/uploads/2022/10/cropped-D5LAqfLWwAIaiJG-1-32x32.jpeg</url>
	<title>truecrypt Archives - Reactual</title>
	<link>https://reactual.com/tag/truecrypt</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Best Drive Encryption Solutions For Macs</title>
		<link>https://reactual.com/software/drive-encryption-solutions-macs.html</link>
					<comments>https://reactual.com/software/drive-encryption-solutions-macs.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Fri, 29 Jul 2011 20:36:52 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[actually]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[ars technica]]></category>
		<category><![CDATA[best drive encryption]]></category>
		<category><![CDATA[best mac encryption]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[choice]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[drive encryption mac]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[encrypted virtual drives]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[encryption software review]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[filevault 2]]></category>
		<category><![CDATA[free encryption mac]]></category>
		<category><![CDATA[hand]]></category>
		<category><![CDATA[Home]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[Life]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[mac encryption software]]></category>
		<category><![CDATA[Macs]]></category>
		<category><![CDATA[Mag]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[Mini]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[pack]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[pgp whole disk encryption]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[reviews]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[screen]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[sound]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[Step]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Tightly]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[whole disk encryption]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3523</guid>

					<description><![CDATA[<p>There are a growing number of options for Mac drive encryption software. Those interested in the security of drive encryption—which locks down the entire disk behind a nearly impenetrable passcode—are fortunate to have so many programs from which to choose. The best drive encryption solutions meet or exceeds industry-standard security while working transparently and with [&#8230;]</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-solutions-macs.html">The Best Drive Encryption Solutions For Macs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are a growing number of options for Mac drive encryption software. Those interested in the security of drive encryption—which locks down the entire disk behind a nearly impenetrable passcode—are fortunate to have so many programs from which to choose. The best drive encryption solutions meet or exceeds industry-standard security while working transparently and with little negative performance impact.</p>
<p>We’ve combed through reviews on websites such as SC Magazine, SecureMac.com, Computerworld, CNET, Techworld, Lifehacker, Ars Technica, The Mac Lawyer, and AnandTech in order to come up with the top rated encryption solutions:</p>
<p><a name="pgp"></a></p>
<figure id="attachment_3525" aria-describedby="caption-attachment-3525" style="width: 435px" class="wp-caption aligncenter"><a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1"><img fetchpriority="high" decoding="async" class="size-full wp-image-3525" src="https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption.png" alt="PGP Whole Disk Encryption" width="435" height="233" srcset="https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption.png 435w, https://reactual.com/wp-content/uploads/2011/07/PGP-Whole-Disk-Encryption-300x160.png 300w" sizes="(max-width: 435px) 100vw, 435px" /></a><figcaption id="caption-attachment-3525" class="wp-caption-text">PGP Whole Disk Encryption</figcaption></figure>
<h2>PGP Whole Disk Encryption ($140)</h2>
<p>Top Review Sources:</p>
<ul>
<li>SC Magazine: 5.0/5.0 “Best Buy”</li>
<li>SecureMac.com: 5.0/5.0 “After&#8230;installing the product you are a few clicks away from being fully encrypted. The decryption process is just as easy.”</li>
<li>Computerworld: “PGP Whole Disk Protection is a very good choice for protecting the data on a hard drive”</li>
</ul>
<p><a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1" target="_blank">Symantec’s PGP Whole Disk Encryption</a> is a robust full-disk encryption program targeted at business users. The initial encryption process can be lengthy—large drives with lots of files can take several hours to secure. The good news is that you’ll be able to continue your work as PGP Whole Disk Encryption performs its duties in the background. It is also nice that setting up the initial encryption takes just a few steps that are logically and simply presented. PGP Whole Disk Encryption is capable of using a handful of ciphers, including AES, CAST, TripleDES, IDEA, and TwoFish. After the initial encryption process is complete, PGP Whole Disk Encryption operates transparently, encrypting and decrypting files on the fly. Performance impact is negligible, and the only clear indication that the program is working is the authentication screen at startup. Extras include the ability to create encrypted self-extracting files and a file shredding tool for permanent deletion. PGP Whole Disk Encryption can create encrypted virtual drives on unencrypted volumes, plus it will encrypt removable media.</p>
<p>PGP Whole Disk Encryption can be purchased on the <a href="https://www.symantec.com/business/products/purchasing.jsp?pcid=pcat_info_risk_comp&amp;pvid=wd_encryption_1" target="_blank">official website</a>.</p>
<p><a name="truecrypt"></a></p>
<figure id="attachment_3526" aria-describedby="caption-attachment-3526" style="width: 512px" class="wp-caption aligncenter"><a href="https://www.truecrypt.org/downloads"><img decoding="async" class="size-full wp-image-3526" src="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1.jpg" alt="TrueCrypt" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-200x200.jpg 200w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt1-480x480.jpg 480w" sizes="(max-width: 512px) 100vw, 512px" /></a><figcaption id="caption-attachment-3526" class="wp-caption-text">TrueCrypt</figcaption></figure>
<h2>TrueCrypt (Free)</h2>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.5/5.0 “Loaded with powerful features”</li>
<li>Techworld: “TrueCrypt&#8230;offers a plethora of configuration settings, default options and operational choices”</li>
<li>Lifehacker: “Our favorite solution for keeping your private files safe, sound, and hidden”</li>
</ul>
<p><a href="https://www.truecrypt.org/downloads" target="_blank">TrueCrypt</a> is feature-packed and free. The program provides full disk encryption via an easy-to-use interface. You’ll be able to choose from three ciphers: AES, Serpent, and Twofish. Initial drive encryption can take many hours, but your Mac remains useable during that time. System performance will be affected during this process, but after it is done, TrueCrypt works seamlessly in the background. The only time you’ll be prompted by TrueCrypt is at the password screen at startup. Not only can you use TrueCrypt to lock down your entire hard drive, you can use it to secure removable drives and create encrypted virtual drives as well. TrueCrypt’s help files are comprehensive and well-written; patient beginners will have few problems learning how to get the most out of the program.</p>
<p>Download TrueCrypt for free on the <a href="https://www.truecrypt.org/downloads" target="_blank">publisher’s site</a>.</p>
<p><a name="filevault"></a></p>
<figure id="attachment_3527" aria-describedby="caption-attachment-3527" style="width: 512px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-3527" src="https://reactual.com/wp-content/uploads/2011/07/FileVault-2.jpg" alt="FileVault 2" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/FileVault-2.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-150x150.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/FileVault-2-100x100.jpg 100w" sizes="(max-width: 512px) 100vw, 512px" /><figcaption id="caption-attachment-3527" class="wp-caption-text">FileVault 2</figcaption></figure>
<h2>FileVault 2 (Free)</h2>
<p>Pros:</p>
<ul>
<li>Seamless integration into OS X</li>
<li>Can store your recovery key with Apple</li>
</ul>
<p>Cons:</p>
<ul>
<li>OS X 10.7 Lion required</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Ars Technica: “Disk encryption that actually works”</li>
<li>The Mac Lawyer: “Essentially a complete win-win for business users”</li>
<li>AnandTech: “The new FileVault is a pretty great deal for individuals”</li>
</ul>
<p>Starting with version 10.3 Panther, OS X has included an encryption tool called FileVault. FileVault is able to encrypt the home directory, but is unable to perform a full disk encryption. With version 10.7 Lion, FileVault 2 debuts. A big improvement of FileVault 2 is the ability to encrypt an entire disk. Like the original FileVault, FileVault 2 is tightly integrated into OS X, making it easy to use. During the setup process, FileVault 2 provides a recovery key—a string of characters essential to unlocking your drive if you forget the passcode. You have the option of sharing the recovery key with Apple; if you can’t remember your passcode or recovery key, your last line of defense is to call Apple and answer security questions that you create during the FileVault 2 setup process. After setup, FileVault 2 will restart your computer and begin the drive encryption process. System performance will be diminished, but you’ll be able to work on your computer if you need to. Once the initial encryption is complete, FileVault 2 will encrypt and decrypt files as you work and your system speed should not be significantly impacted. FileVault 2 employs XTS-AES 128-bit encryption.</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-solutions-macs.html">The Best Drive Encryption Solutions For Macs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/drive-encryption-solutions-macs.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Top Rated Drive Encryption Software For PCs</title>
		<link>https://reactual.com/software/drive-encryption-software-pcs.html</link>
					<comments>https://reactual.com/software/drive-encryption-software-pcs.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sat, 23 Jul 2011 15:37:26 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[200]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[available]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[best drive encryption]]></category>
		<category><![CDATA[bitlocker]]></category>
		<category><![CDATA[boot]]></category>
		<category><![CDATA[cell]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[comes]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disk encryption]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[edge]]></category>
		<category><![CDATA[edition]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[encryption algorithms]]></category>
		<category><![CDATA[encryption review]]></category>
		<category><![CDATA[encryption software]]></category>
		<category><![CDATA[External]]></category>
		<category><![CDATA[external drive]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file encryption software]]></category>
		<category><![CDATA[free zonealarm]]></category>
		<category><![CDATA[hard drives]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[hour]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[interface]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[Laptop]]></category>
		<category><![CDATA[learning curve]]></category>
		<category><![CDATA[LED]]></category>
		<category><![CDATA[levels]]></category>
		<category><![CDATA[light]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[Machine]]></category>
		<category><![CDATA[Mag]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[maker]]></category>
		<category><![CDATA[Mate]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[microsoft bitlocker]]></category>
		<category><![CDATA[mode]]></category>
		<category><![CDATA[Money]]></category>
		<category><![CDATA[Multi]]></category>
		<category><![CDATA[New]]></category>
		<category><![CDATA[offer]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[pack]]></category>
		<category><![CDATA[PC encryption]]></category>
		<category><![CDATA[PC Magazine]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[pot]]></category>
		<category><![CDATA[price]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[reliable]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[Rice]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[running]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[speed]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[tee]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Tightly]]></category>
		<category><![CDATA[tom s hardware]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[Top Review Sources]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[Ultimate]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[volume]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<category><![CDATA[ZoneAlarm]]></category>
		<category><![CDATA[zonealarm datalock]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=3407</guid>

					<description><![CDATA[<ul>
<li><a href="https://reactual.com/?p=3407#truecrypt">TrueCrypt (Free)</a></li>
<li><a href="https://reactual.com/?p=3407#zonealarm">ZoneAlarm DataLock ($37)</a></li>
<li><a href="https://reactual.com/?p=3407#microsoft">Microsoft BitLocker (Free)</a></li>
</ul>
<p>The post <a href="https://reactual.com/software/drive-encryption-software-pcs.html">The Top Rated Drive Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Commercial drive encryption software is a popular way to encrypt the contents of a disk drive and prevent unauthorized access. Information is encrypted via algorithms that vary in formula but function in similar ways. Most commonly, the encrypted information is accessed via a passcode. As its name suggests, drive encryption protects an entire volume; those looking to encrypt only select folders or files, to have different passcodes, to have varying levels of encryption across a drive should consider file encryption software instead.</p>
<p>After researching expert and user opinions on sites such as CNET, Tom’s Hardware, Techworld, PC Magazine, ITPRO, V3.co.uk, Computerworld, and 4sysops, we’ve compiled a list of the top rated drive encryption software for PCs:</p>
<p><a name="truecrypt"></a></p>
<figure id="attachment_3408" aria-describedby="caption-attachment-3408" style="width: 512px" class="wp-caption aligncenter"><a href="https://www.truecrypt.org/downloads"><img loading="lazy" decoding="async" class="size-full wp-image-3408" src="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt.jpg" alt="TrueCrypt" width="512" height="512" srcset="https://reactual.com/wp-content/uploads/2011/07/TrueCrypt.jpg 512w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-150x150.jpg 150w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-300x300.jpg 300w, https://reactual.com/wp-content/uploads/2011/07/TrueCrypt-100x100.jpg 100w" sizes="auto, (max-width: 512px) 100vw, 512px" /></a><figcaption id="caption-attachment-3408" class="wp-caption-text">TrueCrypt</figcaption></figure>
<h2>TrueCrypt (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Low performance impact</li>
<li>Works across platforms</li>
</ul>
<p>Cons:</p>
<ul>
<li>Learning curve can be steep</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>CNET: 4.5/5.0 “The ultimate freeware encryption program”</li>
<li>Tom’s Hardware: “We recommend downloading and trying TrueCrypt even if you are not looking for a security solution”</li>
<li>Techworld: “TrueCrypt is a real winner and comes at a price that can&#8217;t be beat”</li>
</ul>
<p><a href="https://www.truecrypt.org/downloads" target="_blank">TrueCrypt</a> is a major name in drive encryption software. Once installed, this free software allows the user to encrypt his or her entire drive, a process that initially can take several hours (the computer remains useable during the process). The user can select from three different encryption algorithms (AES, Serpent, and Twofish) or a combination of the three. Once fully encrypted, TrueCrypt continues to automatically protect new information in real time; a single master passcode is all that you need to boot your computer and go about your normal activities. TrueCrypt’s automatic encryption feature is likely to have little noticeable impact on system performance unless you have an older system or are using multi-level encryption—an extra security measure unnecessary for most users. In the event you need to remove TrueCrypt, the decryption process is clean and hassle-free.</p>
<p>TrueCrypt provides the option of partial drive and external drive (including USB flash) encryption. Additionally, TrueCrypt works across platforms, which is great for those who also use Macintosh or Linux. The learning curve for beginners can be steep; the user interface isn’t fully intuitive and there are dangers in using the software without adequate knowledge. However, TrueCrypt’s online documentation is excellent and provides adequate instruction for those willing to invest the time.</p>
<p>TrueCrypt is available for download on the <a href="https://www.truecrypt.org/downloads" target="_blank">manufacturer’s website</a>.</p>
<p><a name="zonealarm"></a></p>
<figure id="attachment_3409" aria-describedby="caption-attachment-3409" style="width: 250px" class="wp-caption aligncenter"><a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20"><img loading="lazy" decoding="async" class="size-full wp-image-3409" src="https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock.jpg" alt="ZoneAlarm DataLock" width="250" height="378" srcset="https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock.jpg 250w, https://reactual.com/wp-content/uploads/2011/07/ZoneAlarm-DataLock-198x300.jpg 198w" sizes="auto, (max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-3409" class="wp-caption-text">ZoneAlarm DataLock</figcaption></figure>
<h2>ZoneAlarm DataLock ($37)</h2>
<p>Pros:</p>
<ul>
<li>Solid protection from an established brand</li>
<li>24/7 password recovery hotline</li>
<li>Simple encryption process</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>PC Magazine: 4.5/5.0 “Its makers have considered just about every possible eventuality to ensure that you don&#8217;t lock yourself out of the encrypted data”</li>
<li>ITPRO: 5.0/6.0 “Using DataLock is about as simple as it comes”</li>
<li>V3.co.uk: 4.0/5.0 “Good value for money”</li>
</ul>
<p>ZoneAlarm is a familiar and reliable name in internet security. The company’s <a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20" target="_blank">DataLock</a> software offers full-disk protection by means of 256-bit AES encryption and a password prompt at startup. A stand-out feature of ZoneAlarm DataLock is the 24-hours-a-day, seven-days-a-week hotline for password recovery. While forgetting your master passcode should be avoided at all costs when using any software encryption program, it is good to know that DataLock provides a convenient means of unlocking your system should you need it. As part of the quick and straightforward setup process, you will create security questions and answers that you’ll have to know in order to recover your password via DataLock’s hotline.</p>
<p>Initial encryption can take hours for hard drives packed with information, but your computer remains useable and subsequent encryption is performed on-the-fly with negligible performance impact. The clean user interface will be familiar to anyone used to using other ZoneAlarm products. Encryption with DataLock is largely set-it-and-forget-it. Note that DataLock is for laptops only; if the software does not find a battery connected to your computer, it will not install.</p>
<p>ZoneAlarm DataLock can be purchased through <a href="https://www.amazon.com/Zone-Labs-101239-Zonealarm-Datalock/dp/B0041RXTOM?tag=reactual-20" target="_blank">Amazon</a>.</p>
<p><a name="microsoft"></a></p>
<figure id="attachment_3411" aria-describedby="caption-attachment-3411" style="width: 264px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-3411" src="https://reactual.com/wp-content/uploads/2011/07/Microsoft-BitLocker.png" alt="Microsoft BitLocker" width="264" height="256" /><figcaption id="caption-attachment-3411" class="wp-caption-text">Microsoft BitLocker</figcaption></figure>
<h2>Microsoft BitLocker (Free)</h2>
<p>Pros:</p>
<ul>
<li>Free</li>
<li>Transparent operation</li>
<li>Seamless incorporation with Windows</li>
</ul>
<p>Cons:</p>
<ul>
<li>Only available for certain editions of Windows</li>
<li>Not as feature-rich as other disk encryption utilities</li>
</ul>
<p>Top Review Sources:</p>
<ul>
<li>Computerworld: “Encryption is difficult to implement properly&#8230;and Microsoft deserves kudos for making it possible to do this in such a tightly integrated way in Windows”</li>
<li>4sysops: “It greatly simplifies the encryption of a system drive”</li>
<li>PC Magazine: “BitLocker reaches its full potential on computers that include&#8230;a Trusted Platform Module (TPM)”</li>
</ul>
<p>Microsoft’s BitLocker is a free drive encryption utility available for the Enterprise and Ultimate editions of Windows Vista and 7, as well as Windows Server 2008 and Server 2008 R2. Though BitLocker is free, users running versions of Windows other than those listed above are not able to install it. For those using compatible versions of Windows, BitLocker is a strong-performing disk encryption utility. It employs 128-bit AES encryption and several modes of authentication, including entering a PIN at startup, using a passcode saved on a USB flash drive, or utilizing your computer’s Trusted Platform Module (TPM). TPM is an emerging, hardware-based technology that uses a special microchip to verify system integrity before bootup. The TPM stores a key used to unlock the system; if an attacker removes your hard drive, he or she will be unable to read its contents because the drive has been separated from the TPM. Likewise, if the Windows startup process is altered, the TPM will prevent the operating system from loading.</p>
<p>Once activated, BitLocker encrypts new files on-the-fly with very little performance impact. While all disk encryption software takes a slight edge off a computer’s overall speed, BitLocker is one of the least cumbersome. On Windows 7 machines, you also have access to BitLocker To Go, a utility that allows you to encrypt removable media.</p>
<p>The post <a href="https://reactual.com/software/drive-encryption-software-pcs.html">The Top Rated Drive Encryption Software For PCs</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/drive-encryption-software-pcs.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>An Introduction To Online Privacy Tools: Part 2</title>
		<link>https://reactual.com/software/internet-security-tools-part-2.html</link>
					<comments>https://reactual.com/software/internet-security-tools-part-2.html#respond</comments>
		
		<dc:creator><![CDATA[Justin Thomas]]></dc:creator>
		<pubDate>Sun, 22 May 2011 18:08:56 +0000</pubDate>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Arc]]></category>
		<category><![CDATA[Coffee]]></category>
		<category><![CDATA[com]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[Cons]]></category>
		<category><![CDATA[Crashplan]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Designed]]></category>
		<category><![CDATA[Direct]]></category>
		<category><![CDATA[Drive]]></category>
		<category><![CDATA[drive encryption]]></category>
		<category><![CDATA[Ear]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[file sharing]]></category>
		<category><![CDATA[filter]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hard drives]]></category>
		<category><![CDATA[Home]]></category>
		<category><![CDATA[Ice]]></category>
		<category><![CDATA[include]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[king]]></category>
		<category><![CDATA[layer]]></category>
		<category><![CDATA[Low]]></category>
		<category><![CDATA[mac]]></category>
		<category><![CDATA[Macs]]></category>
		<category><![CDATA[made]]></category>
		<category><![CDATA[makes]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Men]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[one]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[per]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[pot]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[pro]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[products]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[rated]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[RTi]]></category>
		<category><![CDATA[series]]></category>
		<category><![CDATA[Service]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[soft]]></category>
		<category><![CDATA[support]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[tablet]]></category>
		<category><![CDATA[tablets]]></category>
		<category><![CDATA[tee]]></category>
		<category><![CDATA[the]]></category>
		<category><![CDATA[Thunder]]></category>
		<category><![CDATA[Tool]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Top]]></category>
		<category><![CDATA[top rated]]></category>
		<category><![CDATA[truecrypt]]></category>
		<category><![CDATA[usb]]></category>
		<category><![CDATA[use]]></category>
		<category><![CDATA[used]]></category>
		<category><![CDATA[Useful]]></category>
		<category><![CDATA[vers]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[wall]]></category>
		<category><![CDATA[Ware]]></category>
		<category><![CDATA[way]]></category>
		<category><![CDATA[website]]></category>
		<category><![CDATA[Wide]]></category>
		<category><![CDATA[wireless]]></category>
		<category><![CDATA[word]]></category>
		<category><![CDATA[work]]></category>
		<category><![CDATA[Works]]></category>
		<category><![CDATA[x]]></category>
		<guid isPermaLink="false">https://reactual.com/?p=7246</guid>

					<description><![CDATA[<p>This the second article in our series "Internet Privacy Tools For Everyone". This this part we focus on VPNs, Secure Email and other security tips.</p>
<p>The post <a href="https://reactual.com/software/internet-security-tools-part-2.html">An Introduction To Online Privacy Tools: Part 2</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This the second article in our series &#8220;An Introduction To Online Privacy Tools&#8221; (see the first part <a href="https://reactual.com/software/security-goals.html">here</a>).</p>
<h2>Install a VPN (Virtual Private Network)</h2>
<p><a href="https://reactual.com/wp-content/uploads/2011/11/vpn-feature.jpg" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption=""><img loading="lazy" decoding="async" class="alignnone size-large wp-image-4193" title="" src="https://reactual.com/wp-content/uploads/2011/11/vpn-feature-640x234.jpg" alt="" width="550" height="201" srcset="https://reactual.com/wp-content/uploads/2011/11/vpn-feature-640x234.jpg 640w, https://reactual.com/wp-content/uploads/2011/11/vpn-feature-655x240.jpg 655w, https://reactual.com/wp-content/uploads/2011/11/vpn-feature-300x110.jpg 300w, https://reactual.com/wp-content/uploads/2011/11/vpn-feature.jpg 900w" sizes="auto, (max-width: 550px) 100vw, 550px" /></a></p>
<p>Using a VPN or &#8220;virtual private network&#8221; is the best way to make your internet activities private. Until recently, VPNs were mostly used by companies to secure their employee&#8217;s network connections. There are now VPN services designed for personal use.</p>
<p>When you are connected to a VPN, all the data leaving your computer is encrypted. This makes it very difficult for hackers and eavesdroppers to monitor your internet connections.</p>
<p>This is particularly important if you use WiFi hotspots (in the local coffee shop or at a university for example). When you use a public WiFi you are broadcasting all of your data “in the clear” with typically no security whatsoever. This can include your emails, IM messages, web searches, and any other data sent or received over the wireless network.</p>
<p>Note that a VPN is different from a <a href="https://en.wikipedia.org/wiki/Proxy_server">web proxy</a>, which only redirects your browser connections. A VPN encrypts and redirects <em>all</em> your internet connections.</p>
<p>VPNs are also useful for keeping your online identity private. The web sites you visit and your online activities become reasonably anonymous, because your online connections are being routed through an anonymous computer. In fact, many people use VPNs to help them bypass censorship and limits imposed on them by their government.</p>
<p>If your work or school may also impose restrictions of your internet usage, a VPN can provide a secure tunnel to an unrestricted internet. Similarly, VPNs allow you to internationalize your online presence. Many websites (like Hulu) restrict content to specific countries, which can be frustrating if you are traveling away from your home country. Many people also use VPNs to help them bypass censorship and limits imposed on them by their government.</p>
<h2>Which VPNs To Use?</h2>
<p>There are many VPN services out there, here the VPN some recommendations:</p>
<ul>
<li>VPNs that focus privacy, and do not log your IP address and connections: <a href="https://www.privateinternetaccess.com/pages/buy-vpn/REACTUAL001">Private Internet Access</a> and <a href="https://www.ipvanish.com/?a_aid=greycoder">IPVanish</a></li>
<li>VPNs with servers in many countries: <a href="https://hidemyass.com/vpn/r2112">HMA</a> and <a href="https://www.astrill.com/a272e39ea">Astrill</a></li>
</ul>
<h2>Encrypt Your Email and Instant Messages</h2>
<p><a href="https://reactual.com/wp-content/uploads/2012/05/secure_email.jpg" data-rel="lightbox-image-1" data-rl_title="" data-rl_caption=""><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-7291" title="" src="https://reactual.com/wp-content/uploads/2012/05/secure_email-265x300.jpg" alt="" width="265" height="300" srcset="https://reactual.com/wp-content/uploads/2012/05/secure_email-265x300.jpg 265w, https://reactual.com/wp-content/uploads/2012/05/secure_email.jpg 490w" sizes="auto, (max-width: 265px) 100vw, 265px" /></a></p>
<p>Encrypt emails you&#8217;d like to remain private. You can use <a href="https://www.mozilla.org/en-US/thunderbird/">Thunderbird</a> + <a href="https://enigmail.mozdev.org/home/index.php.html">Enigmail</a> to send encrypted email (using PGP). Use a secure Instant Message client or a plugin that supports OTR (<a href="https://en.wikipedia.org/wiki/Off-the-record_messaging">Off-The-Record messaging</a>). You can use <a href="https://www.ekiga.org/">Ekiga</a>, a free video, phone and instant message application, or you can use the free instant message client <a href="https://adium.im/">Audium</a> that supports OTR (Off-The-Record messaging).</p>
<h2>Secure Your Computers</h2>
<p>Set up your computer&#8217;s firewall. Only login in as an admin user when necessary. Use a strong passwords for your user accounts. Set your computer to log you out after 15 minutes. Encrypt your hard drives where possible. Some Mac and Linux installations have drive encryption built  into the operating system &#8212; you can turn on this encryption quite easily. You can also use <a href="https://www.truecrypt.org/">Truecrypt</a>, a piece of free software that can create encrypted drive disks that appear on your system as a regular files.</p>
<h2>Secure Your Home Network</h2>
<p>When setting up a wireless network use WPA2 encryption, use MAC address identification, set you network to not announce itself.</p>
<p>Set up you your router&#8217;s firewall &#8212; only open necessary ports.</p>
<h2>Secure Your Mobile Devices</h2>
<p><a href="https://reactual.com/wp-content/uploads/2012/05/iphoneLock.jpg" data-rel="lightbox-image-2" data-rl_title="" data-rl_caption=""><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7290" title="" src="https://reactual.com/wp-content/uploads/2012/05/iphoneLock.jpg" alt="" width="490" height="320" srcset="https://reactual.com/wp-content/uploads/2012/05/iphoneLock.jpg 490w, https://reactual.com/wp-content/uploads/2012/05/iphoneLock-300x195.jpg 300w" sizes="auto, (max-width: 490px) 100vw, 490px" /></a></p>
<p>Secure your mobile devices with passwords, set them to log out after 5-15 minutes of inactivity. You can use a VPN on these phones and tablets. The process is a bit more tedious (mobile devices tend to disconnect VPNs quite often) but it does work.</p>
<h2>Other Security Tools and Tips</h2>
<p>Install a virus detector and malware (trojan horses, spyware, adware) detector. See our previous articles for recommended products: &#8220;<a href="https://reactual.com/software/mac-antispyware-utilities-2011.html">The Top Rated Anti-Spyware Utilities For Macs</a>&#8221; or &#8220;<a href="https://reactual.com/software/antivirus-software-pcs.html">The Top Rated Anti-Virus Software For PCs</a>&#8220;.</p>
<p>If you are interested in monitoring the internet connections by made by your computer, you can install a network monitor. This is another good way to discover malware on your system, but it requires you to do manual monitoring and researching. You can use the free <a href="https://www.softpedia.com/get/Network-Tools/Bandwidth-Tools/NetMonitor.shtml">Net Monitor</a> for Windows or the <a href="https://www.littlesnitch.com">Little Snitch</a> ($30) for Macs.</p>
<p>Internet browsers and the plugins like Flash leave traces of your online activities on your computer. This files are not cleared away, even if you tell you browser to reset or if you clear your browser cookies and caches. You can install a computer &#8220;cleanser&#8221; to delete these additional logs and caches. A good example of a cleanser for Mac is <a href="https://www.titanium.free.fr/forums.php">Onyx</a> (free).</p>
<p>Considering setting your computers to use <a href="https://www.opendns.com/">OpenDNS</a> for your DNS (domain name service). OpenDNS features phishing protection and misspelling correction, and optional <a title="Content filtering" href="https://en.wikipedia.org/wiki/Content_filtering">content filtering</a>.</p>
<p>You can back-up or store files securely in the &#8220;Cloud&#8221; using a paid service like <a href="https://www.crashplan.com">Crashplan</a>. This service can encrypt you files with 448 bit Blowfish encryption (very strong), and store them encrypted on Crashplan&#8217;s servers. You keep the encryption key &#8212; Crashplan never sees or stores the key.</p>
<p>Don&#8217;t open emails from questionable sources, and don&#8217;t install applications from questionable sources, especially those found on file sharing services (they tend to have malware, viruses or trojans). If you use a torrent client, set the client to use secure connections where possible, and set it to change to random ports if possible.</p>
<p><a href="https://www.torproject.org/">Tor</a> is free software that routes Internet traffic through a worldwide volunteer network of servers. Like a VPN it can create private internet connections. <a href="https://www.torproject.org/">Tor</a> isn&#8217;t as comprehensive as a VPN because it only works with the applications set to use Tor as a proxy. Tor tend to create slower internet connections than a VPN, but it is a free service, and it is can be run in tandem with a VPN for an extra layer of privacy.</p>
<div>If you need a high level of online privacy, use a secure, read-only <a href="https://www.debian.org/">Debian GNU/Linux</a> installation like Tails. <a href="https://tails.boum.org/">Tails</a> is free operating-system designed to be used from a DVD or a USB stick independently of the computer&#8217;s original operating system. Tails can be run in &#8220;read-only&#8221; installation, meaning it does not write any files to disk. This provides a high level of privacy because the operating system leave no traces of the user&#8217;s activities, and there&#8217;s little chance of the user being monitored by key-loggers and other tracking software.</div>
<p>The post <a href="https://reactual.com/software/internet-security-tools-part-2.html">An Introduction To Online Privacy Tools: Part 2</a> appeared first on <a href="https://reactual.com">Reactual</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://reactual.com/software/internet-security-tools-part-2.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 

Served from: reactual.com @ 2026-04-12 06:14:51 by W3 Total Cache
-->