Description: TrueCrypt is a free open-source disk encryption software. It is able to create a virtual encrypted disk within a file and mounts it as a real disk. The encryption is automatic, real-time (on-the-fly) and transparent. However , a major disadvantage of TrueCrypt and all other on-the-fly encryption software is the requirement of administrative privileges on the computers where they are used. Thus they will not be usable in places such as public libraries and internet cafes, where the computers are typically locked down and the users are given only limited privileges.
File list (Check if you may need any files):
TCExplorer
..........\crypto.cpp
..........\crypto.h
..........\filesys
..........\.......\fat
..........\.......\...\bit_ops.h
..........\.......\...\cache.cpp
..........\.......\...\cache.h
..........\.......\...\common.cpp
..........\.......\...\common.h
..........\.......\...\directory.cpp
..........\.......\...\directory.h
..........\.......\...\disc.cpp
..........\.......\...\disc.h
..........\.......\...\fatdir.cpp
..........\.......\...\fatdir.h
..........\.......\...\fatfile.cpp
..........\.......\...\fatfile.h
..........\.......\...\filetime.cpp
..........\.......\...\filetime.h
..........\.......\...\file_allocation_table.cpp
..........\.......\...\file_allocation_table.h
..........\.......\...\license_libfat.txt
..........\.......\...\mem_allocate.h
..........\.......\...\partition.cpp
..........\.......\...\partition.h
..........\.......\filesys.h
..........\icon.xpm
..........\LibTomCrypt
..........\...........\headers
..........\...........\.......\tomcrypt.h
..........\...........\.......\tomcrypt_argchk.h
..........\...........\.......\tomcrypt_cfg.h
..........\...........\.......\tomcrypt_cipher.h
..........\...........\.......\tomcrypt_custom.h
..........\...........\.......\tomcrypt_hash.h
..........\...........\.......\tomcrypt_mac.h
..........\...........\.......\tomcrypt_macros.h
..........\...........\.......\tomcrypt_math.h
..........\...........\.......\tomcrypt_misc.h
..........\...........\.......\tomcrypt_pk.h
..........\...........\.......\tomcrypt_pkcs.h
..........\...........\.......\tomcrypt_prng.h
..........\...........\LibTomCrypt.cbp
..........\...........\LibTomCrypt.depend
..........\...........\LibTomCrypt.layout
..........\...........\LICENSE
..........\...........\license_LibTomCrypt.txt
..........\...........\ReadMe.txt
..........\...........\src
..........\...........\...\ciphers
..........\...........\...\.......\aes
..........\...........\...\.......\...\aes.c
..........\...........\...\.......\...\aes_tab.c
..........\...........\...\.......\anubis.c
..........\...........\...\.......\blowfish.c
..........\...........\...\.......\cast5.c
..........\...........\...\.......\des.c
..........\...........\...\.......\khazad.c
..........\...........\...\.......\noekeon.c
..........\...........\...\.......\rc2.c
..........\...........\...\.......\rc5.c
..........\...........\...\.......\rc6.c
..........\...........\...\.......\safer
..........\...........\...\.......\.....\safer.c
..........\...........\...\.......\.....\saferp.c
..........\...........\...\.......\.....\safer_tab.c
..........\...........\...\.......\serpent.c
..........\...........\...\.......\skipjack.c
..........\...........\...\.......\twofish
..........\...........\...\.......\.......\twofish.c
..........\...........\...\.......\.......\twofish_tab.c
..........\...........\...\.......\xtea.c
..........\...........\...\encauth
..........\...........\...\.......\ccm
..........\...........\...\.......\...\ccm_memory.c
..........\...........\...\.......\...\ccm_test.c
..........\...........\...\.......\eax
..........\...........\...\.......\...\eax_addheader.c
..........\...........\...\.......\...\eax_decrypt.c
..........\...........\...\.......\...\eax_decrypt_verify_memory.c
..........\...........\...\.......\...\eax_done.c
..........\...........\...\.......\...\eax_encrypt.c
..........\...........\...\.......\...\eax_encrypt_authenticate_memory.c
..........\...........\...\.......\...\eax_init.c
..........\...........\...\.......\...\eax_test.c
..........\...........\...\.......\gcm
..........\...........\...\.......\...\gcm_add_aad.c
..........\...........\...\.......\...\gcm_add_iv.c
..........\...........\...\.......\...\gcm_done.c
..........\...........\...\.......\...\gcm_gf_mult.c
..........\...........\...\.......\...\gcm_init.c
..........\...........\...\.......\...\gcm_memory.c
..........\...........\...\.......\...\gcm_mult_h.c
..........\...........\...\.......\...\gcm_process.c
..........\...........\...\.......\...\gcm_reset.c
..........\...........\...\.......\...\gcm_test.c
..........\...........