Difference between pages "Full Volume Encryption" and "Talk:Tools:File Analysis"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
 
(Are file hash analysis tools suitable for this page?)
 
Line 1: Line 1:
'''Full Volume Encryption''', or FVE, is a method for encrypting a single partition, either physical or virtual, on a hard drive. It is different than [[Full Disk Encryption]] as parts of the disk are left unencrypted.
+
Perhaps a few introductory words as to what kind of file analysis is intended would be helpful.
 
+
I was looking for a mention of the http://www.fileadvisor.bit9.com service, and could not decide
== Implementations ==
+
if it was suitable for this page, or if it should go somewhere else. It's a collection of
 
+
file hashes, very useful for deciding if a file is reasonably well known by its file hash.[[User:Athulin|Athulin]] 02:41, 29 October 2007 (PDT)
; [[BitLocker]]
+
: Included with certain versions of [[Microsoft]] [[Windows|Windows Vista]].
+
 
+
; [[FreeOTFE]]
+
: A free and open source FVE program for Microsoft [[Windows]] and [[Microsoft Windows Mobile|Windows Mobile]] PDAs.
+
 
+
; [[TrueCrypt]]
+
: A free and open source FVE program for Microsoft [[Windows]].
+
 
+
==External Links==
+
* [http://secude.com/htm/805/en/White_Paper_Section%3A_Full_Disk_Encryption.htm White Papers on Full Volume Encryption]
+
 
+
[[Category:Encryption]]
+
[[Category:Anti-Forensics]]
+
[[Category:Disk encryption]]
+

Revision as of 04:41, 29 October 2007

Perhaps a few introductory words as to what kind of file analysis is intended would be helpful. I was looking for a mention of the http://www.fileadvisor.bit9.com service, and could not decide if it was suitable for this page, or if it should go somewhere else. It's a collection of file hashes, very useful for deciding if a file is reasonably well known by its file hash.Athulin 02:41, 29 October 2007 (PDT)