Overclock.net › Forums › Software, Programming and Coding › Networking & Security › TrueCrypt vs Bitlocker Question
New Posts  All Forums:Forum Nav:

TrueCrypt vs Bitlocker Question

post #1 of 15
Thread Starter 
I'm using Win 7 x64, I have 4x internal SATA3 HDD's and 1x external USB3 HDD which is used for backup.

Security is my main focus, in case anything from my house were to be stolen as some of my data is sensitive. In the past I have used Bitlocker to secure my external USB drive (backup), but I'm now keen on securing every drive I use and Bitlocker seems convenient, but I do question the strength of the security from topics I have read.

Can anyone throw me some pro's and cons in using Bitlocker.
Edited by Milamber - 5/6/12 at 9:01pm
post #2 of 15
BitLocker uses your computer's TPM device, if it has one. If it does not, you'll be forced to use a USB memory stick to keep your key on. You can choose to use the USB option instead of the TPM.

- Pro for TPM - easy to use. turn the PC on and it's ready to use.
- Con for TPM - windows is super easy to get into even when a password is used. attacker can steal your whole computer and get into your system if they know what they're doing. it's not an advanced attack.

- Pro for USB - take the drive with you wherever you go, attacker can't get in if you shutdown your PC when you leave your place.
- Con for USB - if you lose the drive, you lose the key. you could, of course, print the key and keep it in a fireproof box. if you leave the USB drive with the PC, then it's like the "Con for TPM" scenario.

[tin-foil-hat] "We have been able to provide police, law enforcement, and private investigators with a tool that allows bypassing BitLocker encryption for seized computers.” source: http://www.thetechherald.com/articles/New-software-will-break-BitLocker-encryption/8538/ [/tin-foil-hat]

edit: Volume-level encryption, which BitLocker employs and so can TrueCrypt (in addition to containers and partition-level encryption), is not as good as Full Disk Encryption, but still good. The most popular use of TrueCrypt is creating encrypted containers within unencrypted (or encrypted) partitions.

- Pro's to TrueCrypt - it's vetted and regarded as one of the best platforms to use. good, long passwords stored in your brain are hard to brute force.
- Con's to TrueCrypt - don't forget your password. theoretically, and especially if a short password is in use, the container can be brute-forced fairly easily. Longer passwords are better than more complicated passwords when it comes to encrypted containers. (see *However* below)

*However* TrueCrypt also supports the use of keyfiles, which means you can create an encrypted volume, partition, or container, store the keyfile on a USB memory stick, and store a good, long password in your brain. the container in this scenario can't be brute-forced without the keyfile, but you need the keyfile and the corresponding password to unlock the container.
Edited by yawnbox - 5/7/12 at 12:44am
X6
(7 items)
 
  
CPUGraphicsRAMHard Drive
Intel Xeon X5650 NVIDIA Quadro 4000 Kingston  Kingston SSDNow V+100 SVP100S2/512G 
KeyboardMouse
Filco Majestouch w/ Cherry MX Blue Razer Diamondback 
  hide details  
Reply
X6
(7 items)
 
  
CPUGraphicsRAMHard Drive
Intel Xeon X5650 NVIDIA Quadro 4000 Kingston  Kingston SSDNow V+100 SVP100S2/512G 
KeyboardMouse
Filco Majestouch w/ Cherry MX Blue Razer Diamondback 
  hide details  
Reply
post #3 of 15
Quote:
Originally Posted by yawnbox View Post

BitLocker uses your computer's TPM device, if it has one. If it does not, you'll be forced to use a USB memory stick to keep your key on. You can choose to use the USB option instead of the TPM.
- Pro for TPM - easy to use. turn the PC on and it's ready to use.
- Con for TPM - windows is super easy to get into even when a password is used. attacker can steal your whole computer and get into your system if they know what they're doing. it's not an advanced attack.
- Pro for USB - take the drive with you wherever you go, attacker can't get in if you shutdown your PC when you leave your place.
- Con for USB - if you lose the drive, you lose the key. you could, of course, print the key and keep it in a fireproof box. if you leave the USB drive with the PC, then it's like the "Con for TPM" scenario.
[tin-foil-hat] "We have been able to provide police, law enforcement, and private investigators with a tool that allows bypassing BitLocker encryption for seized computers.” source: http://www.thetechherald.com/articles/New-software-will-break-BitLocker-encryption/8538/ [/tin-foil-hat]
BitLocker is a partition level encryption tool. So is TrueCrypt if you use it that way, but instead TrueCrypt can one-up that with full-volume encryption (still not FDE, but better than partition encryption). But the most popular use of TrueCrypt is creating encrypted containers.
- Pro's to TrueCrypt - it's vetted and regarded as one of the best platforms to use. good, long passwords stored in your brain are hard to brute force.
- Con's to TrueCrypt - don't forget your password. theoretically, and especially if a short password is in use, the container can be brute-forced fairly easily. Longer passwords are better than more complicated passwords when it comes to encrypted containers. (see *However* below)
*However* TrueCrypt also supports the use of keyfiles, which means you can create an encrypted volume, partition, or container, store the keyfile on a USB memory stick, and store a good, long password in your brain. the container in this scenario can't be brute-forced without the keyfile, but you need the keyfile and the corresponding password to unlock the container.


Additionally, truecrypt is open source which means that people (tinfoilhats) have gone through it with a fine-tooth comb and have not discovered any backdoors. This is important especially if you are hiding stuff that may be deemed illegal.

;D
    
CPUMotherboardGraphicsRAM
Intel 2500k ASUS P6P67 Evo evga 670 gtx Patriot 2x 4GB 
Hard DriveHard DriveOptical DriveCooling
Intel SSD WD Green LG BluRay Burner H60 
OSMonitorPowerCase
Windows 7 Ultimate Achievia 27" 1440p Seasonic X650 Gold Thermaltake Element V Black Edition 
MouseAudio
Razer Naga Klipsch 2.1 
  hide details  
Reply
    
CPUMotherboardGraphicsRAM
Intel 2500k ASUS P6P67 Evo evga 670 gtx Patriot 2x 4GB 
Hard DriveHard DriveOptical DriveCooling
Intel SSD WD Green LG BluRay Burner H60 
OSMonitorPowerCase
Windows 7 Ultimate Achievia 27" 1440p Seasonic X650 Gold Thermaltake Element V Black Edition 
MouseAudio
Razer Naga Klipsch 2.1 
  hide details  
Reply
post #4 of 15
Thread Starter 
Quote:
Originally Posted by yawnbox View Post

BitLocker uses your computer's TPM device, if it has one. If it does not, you'll be forced to use a USB memory stick to keep your key on. You can choose to use the USB option instead of the TPM.
- Pro for TPM - easy to use. turn the PC on and it's ready to use.
- Con for TPM - windows is super easy to get into even when a password is used. attacker can steal your whole computer and get into your system if they know what they're doing. it's not an advanced attack.
- Pro for USB - take the drive with you wherever you go, attacker can't get in if you shutdown your PC when you leave your place.
- Con for USB - if you lose the drive, you lose the key. you could, of course, print the key and keep it in a fireproof box. if you leave the USB drive with the PC, then it's like the "Con for TPM" scenario.
[tin-foil-hat] "We have been able to provide police, law enforcement, and private investigators with a tool that allows bypassing BitLocker encryption for seized computers.” source: http://www.thetechherald.com/articles/New-software-will-break-BitLocker-encryption/8538/ [/tin-foil-hat]
edit: Volume-level encryption, which BitLocker employs and so can TrueCrypt (in addition to containers and partition-level encryption), is not as good as Full Disk Encryption, but still good. The most popular use of TrueCrypt is creating encrypted containers within unencrypted (or encrypted) partitions.
- Pro's to TrueCrypt - it's vetted and regarded as one of the best platforms to use. good, long passwords stored in your brain are hard to brute force.
- Con's to TrueCrypt - don't forget your password. theoretically, and especially if a short password is in use, the container can be brute-forced fairly easily. Longer passwords are better than more complicated passwords when it comes to encrypted containers. (see *However* below)
*However* TrueCrypt also supports the use of keyfiles, which means you can create an encrypted volume, partition, or container, store the keyfile on a USB memory stick, and store a good, long password in your brain. the container in this scenario can't be brute-forced without the keyfile, but you need the keyfile and the corresponding password to unlock the container.

Far out, that was one of the best responses I have had to a post, thanks! +REP

I don't have illegal content, just personal information including work related matters - for passwords I use LastPass with a Yubi USB Key for digital fingerprint, so my pwds are nice and safe. I have had to edit my registry to bypass TPM since my samsung drive doesn't support it.

I guess I will use Trucrypt. Is AES SHA512 the best option for speed?
post #5 of 15
Quote:
Originally Posted by Milamber View Post

Far out, that was one of the best responses I have had to a post, thanks! +REP
I don't have illegal content, just personal information including work related matters - for passwords I use LastPass with a Yubi USB Key for digital fingerprint, so my pwds are nice and safe. I have had to edit my registry to bypass TPM since my samsung drive doesn't support it.
I guess I will use Trucrypt. Is AES SHA512 the best option for speed?

legal or illegal, it's your data. keep it yours.

you don't need to worry about AES processing. your Intel chip ( http://ark.intel.com/products/52210 ) has a specialized AES instruction set.

you can read about that here: http://en.wikipedia.org/wiki/AES_instruction_set
X6
(7 items)
 
  
CPUGraphicsRAMHard Drive
Intel Xeon X5650 NVIDIA Quadro 4000 Kingston  Kingston SSDNow V+100 SVP100S2/512G 
KeyboardMouse
Filco Majestouch w/ Cherry MX Blue Razer Diamondback 
  hide details  
Reply
X6
(7 items)
 
  
CPUGraphicsRAMHard Drive
Intel Xeon X5650 NVIDIA Quadro 4000 Kingston  Kingston SSDNow V+100 SVP100S2/512G 
KeyboardMouse
Filco Majestouch w/ Cherry MX Blue Razer Diamondback 
  hide details  
Reply
post #6 of 15
Quote:
Originally Posted by yawnbox View Post

legal or illegal, it's your data. keep it yours.
you don't need to worry about AES processing. your Intel chip ( http://ark.intel.com/products/52210 ) has a specialized AES instruction set.
you can read about that here: http://en.wikipedia.org/wiki/AES_instruction_set

Yeah, this.

To this day I have no idea why everyone with SB chips doesn't use full disk encryption. The performance hit is zero apart from under certain circumstances, and the benefits are obvious.

The first reply was excellent, and all that I'd add is that with TC you can encrypt disks/containers with cascades (combinations of algorithms with different keys).
space heater
(27 items)
 
Miner1
(16 items)
 
Old bladecentre
(19 items)
 
CPUMotherboardGraphicsRAM
Intel 2500k 4.7GHz  Asus P8P67 Pro(B3) 2 x Club3D 280X 3GB 16GB g.skill 1600MHz C9 
Hard DriveHard DriveHard DriveHard Drive
Samsung 840 Pro 256GB Samsung F3 1TB 2 x WD Blue 1TB RAID0 2 x 3TB Seagate Barracuda 
Optical DriveCoolingOSMonitor
LiteOn IHAS124 Noctua NH-D15 8.1 Enterprise Acer GD245HQ (120hz) 
MonitorMonitorMonitorMonitor
LG W2420P LG IPS231P HP ZR24w LG 32LH3000 (w/IPS) 
KeyboardPowerCaseMouse
Razer Blackwidow Antec TruePower New 750W Corsair 750D Modified original G5 
AudioAudioAudioAudio
Asus Xonar PCIe Sennheiser HD595 Tannoy Mercury 5 NAD C165BEE 
AudioAudio
Bowers & Wilkins 683 Cambridge Audio DACMagic+ 
CPUMotherboardGraphicsGraphics
E6750 P5NESLI+ Club3D 280X XFX 5870 
GraphicsGraphicsRAMHard Drive
XFX 5870 XFX 5870 4GB 320GB 
OSPower
Linux Corsair AX1200 
CPUCPUCPUCPU
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 
CPUCPUMotherboardGraphics
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 6 x HP BL460C  None 
RAMHard DriveOSPower
6 x 16gb 1333mhz 6 x 2 x 73GB 10,000rpm SCSI Linux 6 x hotswap 2250W PSUs 
CaseOther
HP C7000 Blade Chassis 16 x Gigabit (pass thru from backplane) 
  hide details  
Reply
space heater
(27 items)
 
Miner1
(16 items)
 
Old bladecentre
(19 items)
 
CPUMotherboardGraphicsRAM
Intel 2500k 4.7GHz  Asus P8P67 Pro(B3) 2 x Club3D 280X 3GB 16GB g.skill 1600MHz C9 
Hard DriveHard DriveHard DriveHard Drive
Samsung 840 Pro 256GB Samsung F3 1TB 2 x WD Blue 1TB RAID0 2 x 3TB Seagate Barracuda 
Optical DriveCoolingOSMonitor
LiteOn IHAS124 Noctua NH-D15 8.1 Enterprise Acer GD245HQ (120hz) 
MonitorMonitorMonitorMonitor
LG W2420P LG IPS231P HP ZR24w LG 32LH3000 (w/IPS) 
KeyboardPowerCaseMouse
Razer Blackwidow Antec TruePower New 750W Corsair 750D Modified original G5 
AudioAudioAudioAudio
Asus Xonar PCIe Sennheiser HD595 Tannoy Mercury 5 NAD C165BEE 
AudioAudio
Bowers & Wilkins 683 Cambridge Audio DACMagic+ 
CPUMotherboardGraphicsGraphics
E6750 P5NESLI+ Club3D 280X XFX 5870 
GraphicsGraphicsRAMHard Drive
XFX 5870 XFX 5870 4GB 320GB 
OSPower
Linux Corsair AX1200 
CPUCPUCPUCPU
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 
CPUCPUMotherboardGraphics
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 6 x HP BL460C  None 
RAMHard DriveOSPower
6 x 16gb 1333mhz 6 x 2 x 73GB 10,000rpm SCSI Linux 6 x hotswap 2250W PSUs 
CaseOther
HP C7000 Blade Chassis 16 x Gigabit (pass thru from backplane) 
  hide details  
Reply
post #7 of 15
Thread Starter 
So far my SSD is encrypted and my WD Green 2TB is nearly done, took 23hrs... I plan on having my other 3 drives sorted by middle of next week. I checked the drive temps and they are still good.

367

353
Edited by Milamber - 5/9/12 at 7:13am
post #8 of 15
Quote:
Originally Posted by Milamber View Post

So far my SSD is encrypted and my WD Green 2TB is nearly done, took 23hrs... I plan on having my other 3 drives sorted by middle of next week. I checked the drive temps and they are still good.
367
353

Be careful encrypting SSDs.

Most SSDs encrypt data before writing anyway, and as far as I know, encryption still messes with the wear levelling.
space heater
(27 items)
 
Miner1
(16 items)
 
Old bladecentre
(19 items)
 
CPUMotherboardGraphicsRAM
Intel 2500k 4.7GHz  Asus P8P67 Pro(B3) 2 x Club3D 280X 3GB 16GB g.skill 1600MHz C9 
Hard DriveHard DriveHard DriveHard Drive
Samsung 840 Pro 256GB Samsung F3 1TB 2 x WD Blue 1TB RAID0 2 x 3TB Seagate Barracuda 
Optical DriveCoolingOSMonitor
LiteOn IHAS124 Noctua NH-D15 8.1 Enterprise Acer GD245HQ (120hz) 
MonitorMonitorMonitorMonitor
LG W2420P LG IPS231P HP ZR24w LG 32LH3000 (w/IPS) 
KeyboardPowerCaseMouse
Razer Blackwidow Antec TruePower New 750W Corsair 750D Modified original G5 
AudioAudioAudioAudio
Asus Xonar PCIe Sennheiser HD595 Tannoy Mercury 5 NAD C165BEE 
AudioAudio
Bowers & Wilkins 683 Cambridge Audio DACMagic+ 
CPUMotherboardGraphicsGraphics
E6750 P5NESLI+ Club3D 280X XFX 5870 
GraphicsGraphicsRAMHard Drive
XFX 5870 XFX 5870 4GB 320GB 
OSPower
Linux Corsair AX1200 
CPUCPUCPUCPU
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 
CPUCPUMotherboardGraphics
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 6 x HP BL460C  None 
RAMHard DriveOSPower
6 x 16gb 1333mhz 6 x 2 x 73GB 10,000rpm SCSI Linux 6 x hotswap 2250W PSUs 
CaseOther
HP C7000 Blade Chassis 16 x Gigabit (pass thru from backplane) 
  hide details  
Reply
space heater
(27 items)
 
Miner1
(16 items)
 
Old bladecentre
(19 items)
 
CPUMotherboardGraphicsRAM
Intel 2500k 4.7GHz  Asus P8P67 Pro(B3) 2 x Club3D 280X 3GB 16GB g.skill 1600MHz C9 
Hard DriveHard DriveHard DriveHard Drive
Samsung 840 Pro 256GB Samsung F3 1TB 2 x WD Blue 1TB RAID0 2 x 3TB Seagate Barracuda 
Optical DriveCoolingOSMonitor
LiteOn IHAS124 Noctua NH-D15 8.1 Enterprise Acer GD245HQ (120hz) 
MonitorMonitorMonitorMonitor
LG W2420P LG IPS231P HP ZR24w LG 32LH3000 (w/IPS) 
KeyboardPowerCaseMouse
Razer Blackwidow Antec TruePower New 750W Corsair 750D Modified original G5 
AudioAudioAudioAudio
Asus Xonar PCIe Sennheiser HD595 Tannoy Mercury 5 NAD C165BEE 
AudioAudio
Bowers & Wilkins 683 Cambridge Audio DACMagic+ 
CPUMotherboardGraphicsGraphics
E6750 P5NESLI+ Club3D 280X XFX 5870 
GraphicsGraphicsRAMHard Drive
XFX 5870 XFX 5870 4GB 320GB 
OSPower
Linux Corsair AX1200 
CPUCPUCPUCPU
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 
CPUCPUMotherboardGraphics
Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) Xeon E5410 (12M Cache, 2.33 GHz, 1333 MHz FSB) 6 x HP BL460C  None 
RAMHard DriveOSPower
6 x 16gb 1333mhz 6 x 2 x 73GB 10,000rpm SCSI Linux 6 x hotswap 2250W PSUs 
CaseOther
HP C7000 Blade Chassis 16 x Gigabit (pass thru from backplane) 
  hide details  
Reply
post #9 of 15
I dont know if it was mentioned but truecrypt doesnt support GPT partitions, not a huge deal yet, but worth knowing. And from a corporate view point, Bitlocker can be centrally managed, of course thats not an issue here biggrin.gif
Mini Me
(13 items)
 
  
CPUMotherboardGraphicsHard Drive
i7 4770k Gigabyte M5 Sniper EVGA GTX 780 Classified Corsair Neutron GTX 480GB 
Optical DriveOSMonitorMonitor
LG BD-RE Windows 8 Professional Dell U2311H Dell U2713HM 
KeyboardPowerCaseMouse
Razer blackwindow ultimate Kingwin 1000w Lazer platinum Caselabs Mercury S5 Razer Deathadder 
  hide details  
Reply
Mini Me
(13 items)
 
  
CPUMotherboardGraphicsHard Drive
i7 4770k Gigabyte M5 Sniper EVGA GTX 780 Classified Corsair Neutron GTX 480GB 
Optical DriveOSMonitorMonitor
LG BD-RE Windows 8 Professional Dell U2311H Dell U2713HM 
KeyboardPowerCaseMouse
Razer blackwindow ultimate Kingwin 1000w Lazer platinum Caselabs Mercury S5 Razer Deathadder 
  hide details  
Reply
post #10 of 15
Quote:
Originally Posted by yawnbox View Post

BitLocker uses your computer's TPM device, if it has one. If it does not, you'll be forced to use a USB memory stick to keep your key on. You can choose to use the USB option instead of the TPM.
- Pro for TPM - easy to use. turn the PC on and it's ready to use.
- Con for TPM - windows is super easy to get into even when a password is used. attacker can steal your whole computer and get into your system if they know what they're doing. it's not an advanced attack.
- Pro for USB - take the drive with you wherever you go, attacker can't get in if you shutdown your PC when you leave your place.
- Con for USB - if you lose the drive, you lose the key. you could, of course, print the key and keep it in a fireproof box. if you leave the USB drive with the PC, then it's like the "Con for TPM" scenario.
[tin-foil-hat] "We have been able to provide police, law enforcement, and private investigators with a tool that allows bypassing BitLocker encryption for seized computers.” source: http://www.thetechherald.com/articles/New-software-will-break-BitLocker-encryption/8538/ [/tin-foil-hat]
edit: Volume-level encryption, which BitLocker employs and so can TrueCrypt (in addition to containers and partition-level encryption), is not as good as Full Disk Encryption, but still good. The most popular use of TrueCrypt is creating encrypted containers within unencrypted (or encrypted) partitions.
- Pro's to TrueCrypt - it's vetted and regarded as one of the best platforms to use. good, long passwords stored in your brain are hard to brute force.
- Con's to TrueCrypt - don't forget your password. theoretically, and especially if a short password is in use, the container can be brute-forced fairly easily. Longer passwords are better than more complicated passwords when it comes to encrypted containers. (see *However* below)
*However* TrueCrypt also supports the use of keyfiles, which means you can create an encrypted volume, partition, or container, store the keyfile on a USB memory stick, and store a good, long password in your brain. the container in this scenario can't be brute-forced without the keyfile, but you need the keyfile and the corresponding password to unlock the container.

The attack which is described here is not a true vulnerability of the encryption. It is simply a dump of the RAM via a firewire cable, in which the attacker needs the PC to be on, or have access to the hibernation file. I suspect that the attack would not work on Mac or Linux machines (obviously not for bitlocker, but for Truecrypt.) The way to prevent this software attack would be to not use hibernation / standby and disabling your firewire ports if you use Windows.
Anyone, even those without this expensive software can perform a key retrieval attack using a cold boot attack.
SFG II
(17 items)
 
  
CPUMotherboardGraphicsRAM
Core i7 920 Asus P6T Sapphire Radeon 6850 6GB Crucial DDR3 1333 
Hard DriveHard DriveHard DriveOS
OCZ Vertex 2 HITACHI Deskstar 5K3000 SAMSUNG EcoGreen F4 Linux Mint 12 
OSOSMonitorKeyboard
Windows 7 Home premium Backtrack 5 Dual 22" Samsung SyncMaster 2253LW Saitek Eclipse 
PowerCaseMouse
PC Power&Cooling Silencer 610 NZXT Phantom Black Logitech M505 Wireless 
  hide details  
Reply
SFG II
(17 items)
 
  
CPUMotherboardGraphicsRAM
Core i7 920 Asus P6T Sapphire Radeon 6850 6GB Crucial DDR3 1333 
Hard DriveHard DriveHard DriveOS
OCZ Vertex 2 HITACHI Deskstar 5K3000 SAMSUNG EcoGreen F4 Linux Mint 12 
OSOSMonitorKeyboard
Windows 7 Home premium Backtrack 5 Dual 22" Samsung SyncMaster 2253LW Saitek Eclipse 
PowerCaseMouse
PC Power&Cooling Silencer 610 NZXT Phantom Black Logitech M505 Wireless 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security
Overclock.net › Forums › Software, Programming and Coding › Networking & Security › TrueCrypt vs Bitlocker Question