테크넷 마스터 김재벌입니다.
강력한 볼륨 암호화 제품인 트루크립트 7.0 릴리즈 되었습니다.
이번 제품부터는 하드웨어 가속기능의 AES 가 지원되고 즐겨찾기 및 관리 기능등이 일부 추가되었습니다.
또한, 512바이트 섹터가 아닌 1024 , 2048 등의 섹터지원도 가능해 졌네요.
아래는 추가된 기능입니다.
7.0
July 19, 2010
New features:
-
Hardware-accelerated AES (for more information, see the chapter Hardware Acceleration).
Note: If you want to disable hardware acceleration, select Settings > Performance and disable the option 'Accelerate AES encryption/decryption by using the AES instructions of the processor'. -
A volume can now be configured to be automatically mounted whenever its host device gets connected to the computer (provided that the correct password and/or keyfiles are supplied). (Windows)
Note: For example, if you have a TrueCrypt container on a USB flash drive and you want to configure TrueCrypt to mount it automatically whenever you insert the USB flash drive into the USB port, follow these steps: 1. Mount the volume. 2. Right-click the mounted volume in the drive list in the main TrueCrypt window and select 'Add to Favorites'. 3. The Favorites Organizer window should appear. In it, enable the option 'Mount selected volume when its host device gets connected' and click OK.
Also note that TrueCrypt will not prompt you for a password if you have enabled caching of the pre-boot authentication password (Settings > 'System Encryption') and the volume uses the same password as the system partition/drive. The same applies to cached non-system volume passwords. -
Partition/device-hosted volumes can now be created on drives that use a sector size of 4096, 2048, or 1024 bytes (Windows, Linux). Note: Previously only file-hosted volumes were supported on such drives.
-
Favorite Volumes Organizer (Favorites > 'Organize Favorite Volumes' or 'Organize System Favorite Volumes'), which allows you to set various options for each favorite volume. For example, any of them can be mounted upon logon, as read-only or removable medium, can be assigned a special label (which is shown within the user interface instead of the volume path), excluded from hotkey mount, etc. The order in which favorite volumes are displayed in the Favorites Organizer window can be changed and it is the order in which the volumes are mounted (e.g. when Windows starts or by pressing the 'Mount Favorite Volumes' hotkey). For more information, see the chapters Favorite Volumes and System Favorite Volumes. (Windows)
-
The Favorites menu now contains a list of your non-system favorite volumes. When you select a volume from the list, you are asked for its password (and/or keyfiles) (unless it is cached) and if it is correct, the volume is mounted. (Windows)
Security improvements:
-
In response to our public complaint regarding the missing API for encryption of Windows hibernation files, Microsoft began providing a public API for encryption of hibernation files on Windows Vista and later versions of Windows (for more information, see the section TrueCrypt 5.1a in this version history). Starting with this version 7.0, TrueCrypt uses this API to encrypt hibernation and crash dump files in a safe documented way. (Windows 7/Vista/2008/2008R2)
Note: As Windows XP and Windows 2003 do not provide any API for encryption of hibernation files, TrueCrypt has to modify undocumented components of Windows XP/2003 in order to allow users to encrypt hibernation files. Therefore, TrueCrypt cannot guarantee that Windows XP/2003 hibernation files will always be encrypted. Therefore, if you use Windows XP/2003 and want the hibernation file to be safely encrypted, we strongly recommend that you upgrade to Windows Vista or later and to TrueCrypt 7.0 or later. For more information, see the section Hibernation File.
Improvements:
-
Many minor improvements. (Windows, Mac OS X, and Linux)
Bug fixes:
-
Minor bug fixes. (Windows, Mac OS X, and Linux)
Removed features:
-
TrueCrypt no longer supports device-hosted volumes located on floppy disks. Note: You can still create file-hosted TrueCrypt volumes on floppy disks.
'security > 해킹 보안' 카테고리의 다른 글
인터넷진흥원에서 발간한 패스워드 선택 및 이용안내서 입니다. (0) | 2010.07.20 |
---|---|
Windows Shell 취약점으로 인한 원격코드 실행 문제점 (0) | 2010.07.20 |
sslstrip 공격 실습 (0) | 2010.07.20 |
윈도우 로그 관리 및 분석 방법 (0) | 2010.07.08 |
윈도우용 스머프 공격 도구 (smurf2k) (5) | 2010.07.03 |