Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Microsoft

Screenshots: Five encryption tools for Windows

By matthewnawrocki May 16, 2013, 1:01 AM PDT

Image
1
of 10

a1_TrueCrypt_1.png
a1_TrueCrypt_1.png
Screenshots: Five encryption tools for Windows

TrueCrypt 1

TrueCrypt 1

ntThis gallery is also available as a post in the TechRepublic Five Apps Blog.

n

ntOn any given installation of Windows Vista or 7 Ultimate or Windows 8 Pro, there is a neat little built-in feature for encrypting drives called BitLocker. Although it has its uses, like operations involving the encryption of your system drive, a Trusted Platform Module or TPM chip is required. Some business-grade laptops and desktop motherboards supply this hardware, but not everyone has access to a TPM.

n

ntPerhaps full disk encryption is not the goal here, and you want to encrypt files on an individual basis rather than partitions, or you want to create virtual mountable “encrypted disk” files that you can tote around and attach at will, whenever you need to drop or grab a file. Whatever your end goal, I will show you five apps for disk and file encryption that will get the job done handily, no matter the task.

n

ntThis blog post is also available as TechRepublic Screenshot Gallery.

n

ntnn

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

TrueCrypt 2

TrueCrypt 2

ntFive Apps

n

nt1. TrueCrypt

n

ntMake no mistake; TrueCrypt is one of the most popular freeware alternatives to BitLocker for whole-disk encryption. You can protect all of your drives with high-grade AES and Blowfish encryption schemes, prevent pesky snoops from peeking inside files and even incorporate highly secure boot-strapping. If you are extra paranoid, TrueCrypt can even create a dummy partition with a separate key you can divulge under duress, keeping your confidential partition from ever seeing the light of day. As an added bonus, TrueCrypt is multi-platform and not simply limited to Windows machines.

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

Kruptos 2 Professional 1

Kruptos 2 Professional 1

nt2. Kruptos 2 Professional

n

ntIf you are looking for something that takes care of file encryption, Kruptos 2 Professional does a nice job here with its easy to use interface and quick performance. You can also create encrypted ZIPs and self-extracting EXE files as well as secure deletions so that files cannot be recovered so easily. Before running the application, it’s advisable to run it as Administrator in order to avoid any file-write errors that could come up in some directories.

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

Kruptos 2 Professional 2

Kruptos 2 Professional 2

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

Privacy Drive 1

Privacy Drive 1

nt3. Privacy Drive

n

ntFor whipping up secure data containers that can be mounted to your computer for easy and secure access, in a way similar to TrueCrypt’s encrypted containers, Privacy Drive accomplishes the task. It has a clean and simple user interface that incorporates fancy pie graphs for encrypted disk space information and other extras.

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

Privacy Drive 2

Privacy Drive 2

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

GNU Privacy Guard (GnuPG) 1

GNU Privacy Guard (GnuPG) 1

nt4. GNU Privacy Guard (GnuPG)

n

ntIf you insist on only using fully open-source software, GNU Privacy Guard seems fairly competent at handling file encryption. The software seems to be spread out over many tools, but the Windows GUI portion of GnuPG seemed easy enough to get around. You can also manage root certs for S/MIME emails and a key manager to keep all your custom keys safe for use.

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

GNU Privacy Guard (GnuPG) 2

GNU Privacy Guard (GnuPG) 2

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

AxCrypt 1

AxCrypt 1

nt5. AxCrypt

n

ntSome encryption tools opt for the extremely sparse and no-frills approach to design by residing exclusively in the right-click context menu for Windows Explorer. This is where AxCrypt comes in. Simply select files you want to encrypt, right-click and select your preferred encrypt / decrypt operation you wish to perform. Just because it might appear simple looking, doesn’t mean that it lacks in features though. It feels just as competent as most of the previous apps listed.

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

Screenshots: Five encryption tools for Windows

AxCrypt 2

AxCrypt 2

nt 

n

ntAlso read:

n

    nt

  • nttReview: Sophos Free Encryption
  • nt

  • nttEasy-to-use encryption add-on secures your Google Docs
  • nt

  • nttSecure your personal cloud information with BoxCryptor
  • n

n

ntCredit: Images by Matthew Nawrocki for TechRepublic

  • Microsoft
  • Account Information

    Share with Your Friends

    Screenshots: Five encryption tools for Windows

    Your email has been sent

Share: Screenshots: Five encryption tools for Windows
Image of matthewnawrocki
By matthewnawrocki
An avid technology writer and an IT guru, Matthew is here to help bring the best in software, hardware and the web to the collective consciousness of TechRepublic's readership. In addition to writing for TechRepublic, Matthew currently works as a Cus
  • Account Information

    Contact matthewnawrocki

    Your message has been sent

  • |
  • See all of matthewnawrocki's content

TechRepublic Premium

  • TechRepublic Premium

    Checklist: How to manage your backups

    PURPOSE Backups are essential to any IT job. Some consider backups as the most critical tasks in an administrator’s day. Why? Because when a backup is done correctly (and performed regularly), recovering from a disaster is less of a nightmare and more of an inconvenience. Without those backups, your business could be non-operational for some ...

    Downloads
    Published:  May 29, 2023, 4:00 PM EDT Modified:  May 30, 2023, 3:04 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Prompt engineer

    PURPOSE Recruiting a prompt engineer with the right combination of industry knowledge, organizational awareness, experience and technical expertise will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides an adjustable framework your business can use to find the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS, ...

    Published:  May 29, 2023, 4:00 PM EDT Modified:  May 30, 2023, 8:37 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Office relocation checklist

    PURPOSE New office launches and site relocations run the range from straightforward to overly complex. For intricate, sophisticated new office deployments and larger site moves, TechRepublic Premium’s Office relocation checklist can help plan, monitor and execute such projects. From the checklist: LIST REQUIRED OF EQUIPMENT AND SERVICES Begin by creating a simple list of required ...

    Downloads
    Published:  May 25, 2023, 4:00 PM EDT Modified:  May 26, 2023, 11:17 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Onboarding and offboarding IT staff checklist

    PURPOSE Onboarding and offboarding employees requires careful attention. Otherwise, team members may receive insufficient permissions to perform their jobs or continue to have access long after their employment’s termination. Given the stakes, the problem is even worse when managing IT staff permissions, so it’s imperative that your company adopts a system to ensure consistency. Employees, ...

    Downloads
    Published:  May 24, 2023, 4:00 PM EDT Modified:  May 25, 2023, 9:19 AM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice