WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues. OldApps provides these older versions for software research purposes. 

TrueCrypt
旧版本 TrueCrypt 7.1a
所选取版本
TrueCrypt 7.1a
支持的系统
旧的系统版本
Windows XP, Vista, 7, 8
许可
Open Source
发布日期
07 February, 2012 (9 years ago )

Sponsored Links

下载 TrueCrypt 7.1a
TrueCrypt 7.1a

TrueCrypt 7.1a (3.31 MB)

okay 53 scans reported this version clean

Sponsored Links

系统要求 TrueCrypt 7.1a
  • Windows XP
  • Windows XP x64
  • Windows Vista
  • Windows Vista x64
  • Windows 7
  • Windows 7 x64
程序信息 TrueCrypt 7.1a
版本名称:
TrueCrypt 7.1a

文件大小:
3.31 MB

发布日期:
07 February, 2012 (9 years ago)

MD5 校验码:
7A23AC83A0856C352025A6F7C9CC1526

SHA1 校验码:
7689D038C76BD1DF695D295C026961E50E4A62EA

版本历史 TrueCrypt 7.1a
  • Minor improvements and bug fixes (Windows, Mac OS X, and Linux).
TrueCrypt 截图

此软件不含截图

关于 TrueCrypt

TrueCrypt is a source-available freeware application used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file or encrypt a partition.

TrueCrypt is a free open source on-the-fly encryption (OTFE) program for Microsoft Windows XP/2000/2003/Vista and Linux. It allows one to create a virtual encrypted disk (TrueCrypt volume) within a file and then mount it as a real disk. TrueCrypt can also encrypt an entire hard disk partition or a storage device/medium, such as floppy disk or USB memory stick. Thus, TrueCrypt creates device-hosted TrueCrypt volumes. Everything stored on a TrueCrypt volume is entirely encrypted (i.e., including file names and folder names). TrueCrypt volumes behave as real physical disk drives. This means that it is possible, for example, to repair the encrypted filesystem with chkdsk, defragment mounted volumes created by TrueCrypt, etc.

TrueCrypt Features

  • Creates a virtual encrypted disk within a file and mounts it as a real disk.
  • Encrypts an entire hard disk partition or a storage device such as USB flash drive.
  • Encryption is automatic, real-time (on-the-fly) and transparent.
  • Provides two levels of plausible deniability, in case an adversary forces you to reveal the password.
  • Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: LRW.

更新 : TrueCrypt 更新