Encrypt your hard drives with DiskCryptor [Windows]

If you’re a true security nut, you’ve probably heard of TrueCrypt. It’s that free hard drive encryption program that’s unfortunately quite complicated. If you’re looking for a trouble-free way to encrypt your hard drives, DiskCryptor might be the program for you.

DiskCryptor allows you to encrypt your hard drive, thumb drive, or even optical drive with various forms of encryption. By default, it uses AES encryption, but can also be set to Twofish, Serpent, or AES-Twofish.

To encrypt a drive, just select it in the left pane and click the Encrypt button in the right. It might take a few minutes, but eventually the selected partition will be nicely encrypted for easy security.

Overall, DiskCryptor is a nice disk encryption program. It’d be nice if it supported the creation of virtual disks like TrueCrypt did, but the lack of this feature is one of the things that keeps it from being so complicated.

Price: Free!

Version discovered: v0.9.593.106

Supported OS: Windows 

Download size: 701KB

VirusTotal malware scan results: 0/41

Portability: Requires installation

DiskCryptor homepage

[via AddictiveTips]

Related Posts

  • DoktorThomas

    @C7: See .http://en.wikipedia.org/wiki/ECHELON Further googling will reveal most of what you fear is already “ancient” history. The fed.gov doesn’t have to “be” on your hard drive to monitor it, nor do hackers. The fed.gov requires backdoors… The fed.gov is not your friend. The only safe/intelligent response is to cut off funding of fed.gov. Write your representatives and demand repeal of the 16th Amendment (which was never ratified properly) to stop funding of monitoring domestics. 164 spy satellites, the majority of the fed.gov’s satellites, monitor only the USA; each is capable of counting veins on a fly’s wings as it lands on your desk top. There are 26 gestapo-esque federal police/spy agencies you are not allowed to know exist. (Turn yourself in if you have read this far.) Nixon was the first to propose TV sets be used to monitor the general public in their homes. OnStar can be hacked to allow remote users to control your vehicle. The list goes on…

  • J.L.

    @sl0j0n: Your claims of actually and only are completely wrong; unless you reasonably believe that your own hardware is infected with no cure (which includes zeroing out the disk, reflashing BIOS, and what not), which only applies to the second option. I could do the same with LiveCD, virtual environments (sandbox), limiting software access to hardware (especially writes), and varying degrees of internet control. Then there’s backup/mirroring/drive imaging, which you completely failed to mention.

    Lock and key? Please, they can stealthily pick that, gather information about or steal the key, and physically remove the hard drive. And that’s excluding malware, plus hackers.

  • sl0j0n

    Hello all, including our friends @ NSA.
    Back in the early ’90’s,
    I remember reading about the only way to actually secure data on a computer.
    The computer *must* be disconnected, from *every* other computer,
    with *no* way to connect or network it,
    AND the computer *MUST* be in a physically secure, *locked* area,
    AND absolutely *NO* one, other than the computer user,
    could be allowed physical access.
    Or, you could do what a department head at the local hospital did;
    *Never* turn it on.
    Other than those two choices, it still looks like there is *no* way,
    to actually ‘secure’ a computer.
    I seem to recall, reading about some computers,
    that in fact are kept under lock and key,
    and are *not* accessible, in any way other than physically.
    That /should/ do it.
    Remember, M$ says that its OSs are *not*, “fault tolerant”.

    Have a GREAT day, neighbors!

  • J.L.

    @C7: I’ve just recently used Truecrypt on my new manufacturer’s computer with no problems. Even went as far as encrypting the data hard drive, along with system SSD. No problems with moving “My Documents, Downloads, etc.” there due to System Favourite Volumes.

    If DiskCryptor is similar to Truecrypt, it will prompt for the password as soon as your computer boots from the hard drive. You can further lock it down by creating a password for your BIOS. That may make Tails inconvenient though, because that boots from the CD drive (which you should prevent by default for data security, not necessarily privacy).

    As for your fear of disclosing data online, the most surefire way is to disconnect from the Internet, but a advanced firewall and/or router should be adequate. Then, there’s your browser: http://www.techsupportalert.com/content/how-protect-your-online-privacy.htm

    Being totally safe include computer security which, unfortunately for Windows, is another large topic. A good place for discussing that (and privacy) is: http://www.wilderssecurity.com/

  • C7


    Interesting to say the least. I have been considering encryption for quite a long time and did download truecrypt only to find that I could not access my computer at all after the download.

    Well, I just figured that I must of done something wrong, that it was my fault, and brought out all the restore disks, program disks, etc. and spent the day getting back what I had lost.

    Here is my question. Yes, we all need encryption, I agree with that and would like to see the OEM’s selling equipment with encryption built in.

    But, I do wonder after reading the NSA article on Mullen’s page today that no matter what encryption program you choose, don’t you think that the NSA and all the agencies that use Letters as names have already mandated to the manufacturer of the encryption software that they be supplied with a “back door” for access… in the interest of National Security?

    I don’t know about the rest of you, but I am not planning to overthrow the government or pull off a bank robbery or anything along those lines. But, I do take offense at “someone” e.g. “Anyone” reading my emails or listening in on my phone conversations, or even having the new car manufacturers and cell phone providers having the ability to locate you.

    Is this the world that we live in now? Do we have to look at our neighbor and, wonder…hmm.

    Have you ever wondered whether or not you’re totally “alone” on your personal computer? Has anything strange ever happened to you while you were on your computer that you just, “blew it off’ as your imagination or something that you yourself did wrong?

    Topping the list of being paranoid would be the built-in microphone and camera in your laptop. Even though you have it turned “off,” is it really? Do you think that a good hacker could access your mic and still have the slide switch for mic level on your machine show as “off?

    Finally, most of us have built in WiFi on our machines that we can turn off/on just by physically changing the position of the appropriate switch. What if I were to tell you that the little indicator light depicting whether or not our transmitter is on/off means absolutely “nothing.” Think of it as an LED tied to a power source and a switch, that you operate at will.

    And…when the LED is not lighted, your machine is not transmitting any information.

    BUT….Is It?

    Is it not possible to bypass the on/off function of your WiFi just by making a small change in a line of programming?

    And the “Remote Access” to your machine that we all have “unchecked.” Can I not just come in on the back of one of your emails and spend hours just looking around or maybe program your machine to send a download of any new information the next time you log on.

    These are just questions that remain unanswered. Most of us assume that out computer is just what it is advertised to be. I realize at some point we all have to accept things as they are. And I am more than willing to do that.

    But when the NSA and others are possibly looking and listening to the population of the United States without a warrant, I do start to get concerned.
    Which brings me back to my original topic, Encryption.

    If we do go to all the trouble of encrypting our machines, will it really do any good?

    And, if you answer. “yes” I would like to know your thoughts on the many programs available. What would you suggest to keep everyone out? After all, isn’t that what we are trying to do…just to be safe in our homes and work places.

    I have been considering giving Truecrypt another go and then install Tor and Tails.

    I would appreciate any comments that you might have to offer. I just want to know that when I’m sending an email or just surfing that I am totally, “Safe!”

  • Tony

    infos are scarce, don’t see a user manual/instruction anywhere…not very convincing

  • JT

    So if I encrypt my C drive on my computer, as soon as it gets past the bios it’s going to come up with a password needing to be entered before booting windows or what? I’m assuming the same with a flash drive requiring a password before opening it as well.