Encrypting files and drives
The menu item zC | erase data in a device gives particularly security-conscious zuluCrypt users the option of deleting existing data physically from a container. For this purpose, it overwrites the entire container contents with random characters, making a reconstruction of previously existing data impossible. The container itself is kept. To enable the secure delete function, you must first unmount the encrypted drives. You cannot purge unnecessary data files from mounted drives.
ZuluCrypt gives users a small but powerful encryption program that is suitable for every need due to its diversity of functions. In the lab, the software was very stable and ran without the slightest problem. The program impressed with its fast speed: creating encrypted drives with multiple-gigabyte sizes was achieved within a short time, and even deleting larger containers took just a few seconds.
The biggest shortcoming of zuluCrypt turned out to be the lack of distribution packages, which makes the installation process cumbersome and time-consuming. However, once you have overcome these hurdles, zuluCrypt gives you a highly useful tool that can significantly increase the security of your personal information.
Buy this article as PDF
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.