|
HASH ALGORITHMS ................................................................................................................... 78TrueCrypt User Guide
HASH ALGORITHMS ................................................................................................................... 78
RIPEMD-160 ......................................................................................................................... 78
SHA-512 ................................................................................................................................ 78
Whirlpool ............................................................................................................................... 78
SUPPORTED OPERATING SYSTEMS....................................................................................... 79
COMMAND LINE USAGE ............................................................................................................ 80
Syntax .................................................................................................................................... 82
Examples ................................................................................................................................ 82
SECURITY MODEL ....................................................................................................................... 83
SECURITY REQUIREMENTS AND PRECAUTIONS ............................................................. 86
Data Leaks.............................................................................................................................. 86
Paging File ............................................................................................................................. 87
Memory Dump Files .............................................................................................................. 87
Hibernation File ..................................................................................................................... 88
Unencrypted Data in RAM .................................................................................................... 89
Physical Security .................................................................................................................... 89
Malware ................................................................................................................................. 90
Multi-User Environment ........................................................................................................ 90
Authenticity and Integrity ...................................................................................................... 91
Choosing Passwords and Keyfiles ......................................................................................... 91
Changing Passwords and Keyfiles ......................................................................................... 92
Trim Operation ....................................................................................................................... 92
Wear-Leveling ....................................................................................................................... 93
Reallocated Sectors ................................................................................................................ 93
Defragmenting ....................................................................................................................... 94
Journaling File Systems ......................................................................................................... 94
Volume Clones ....................................................................................................................... 95
Additional Security Requirements and Precautions ............................................................... 95
Dostları ilə paylaş: |
|
|