Version Information
HASH ALGORITHMS ................................................................................................................... 78
Download 0.88 Mb. Pdf ko'rish
|
TrueCrypt User Guide
- Bu sahifa navigatsiya:
- SUPPORTED OPERATING SYSTEMS....................................................................................... 79
- SECURITY MODEL ....................................................................................................................... 83
HASH ALGORITHMS ................................................................................................................... 78
RIPEMD-160 ......................................................................................................................... 78 SHA-512 ................................................................................................................................ 78 Whirlpool ............................................................................................................................... 78 SUPPORTED OPERATING SYSTEMS....................................................................................... 79 COMMAND LINE USAGE ............................................................................................................ 80 Syntax .................................................................................................................................... 82 Examples ................................................................................................................................ 82 SECURITY MODEL ....................................................................................................................... 83 SECURITY REQUIREMENTS AND PRECAUTIONS ............................................................. 86 Data Leaks.............................................................................................................................. 86 Paging File ............................................................................................................................. 87 Memory Dump Files .............................................................................................................. 87 Hibernation File ..................................................................................................................... 88 Unencrypted Data in RAM .................................................................................................... 89 Physical Security .................................................................................................................... 89 Malware ................................................................................................................................. 90 Multi-User Environment ........................................................................................................ 90 Authenticity and Integrity ...................................................................................................... 91 Choosing Passwords and Keyfiles ......................................................................................... 91 Changing Passwords and Keyfiles ......................................................................................... 92 Trim Operation ....................................................................................................................... 92 Wear-Leveling ....................................................................................................................... 93 Reallocated Sectors ................................................................................................................ 93 Defragmenting ....................................................................................................................... 94 Journaling File Systems ......................................................................................................... 94 Volume Clones ....................................................................................................................... 95 Additional Security Requirements and Precautions ............................................................... 95 Download 0.88 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling