I got rid of U3 functionality and now I have portableapps. I have installed TC and now my problem is that the drive is not encrypted and if I lose my drive or if someone steals it, KEY is not protected.
Besides having an extra encrypted (e.g. TrueCrypt) partition, is there a more simple way of doing it?
Thanks.
Safe way to cary USB with TC+KEY around
Moderators: Hacker, petermad, Stefan2, white
Safe way to cary USB with TC+KEY around
[tridy]
License #: 79539
License #: 79539
Re-Issue
Could we report the theft/loss to Mr Ghisler, author, and have our current registration code disabled and be issued with a new one? Any TC updates would cease to work with the next release and beyond. (And potentially re-downloads of current and prior versions.)
BYOD and general portability are far more prolific these days, compared to when this question was first asked.
I've taken to running TC from a USB stick lately, especially for TC promotional/demonstration purposes, and I like to show a registered name in the title bar, rather than have the NOT REGISTERED announcement glaring at the audience.
..I've seen TC refuse to run when used in conjunction with .keys out there in the wild.
BYOD and general portability are far more prolific these days, compared to when this question was first asked.
I've taken to running TC from a USB stick lately, especially for TC promotional/demonstration purposes, and I like to show a registered name in the title bar, rather than have the NOT REGISTERED announcement glaring at the audience.
..I've seen TC refuse to run when used in conjunction with .keys out there in the wild.
Well then..
Okay, cool, have you tried it, MaxX?
I see running TC from, say, the PortableApps USB-stick popup/launcher and then asking for a passcode for access to an encrypted wincmd.key. A simple code derived from KB keys' locations on the keyboard, rather from their meaning in language, would be relatively convenient, IMO, and then TC is up and running.
Can you describe a facility/utility that prompts for a passcode when its contents are addressed? Normally they're passive.
AxCrypt, TrueCrypt, Crypt, PGP, compressors... but they're passive, IME.
(BTW, I have a paper stickers on my USB sticks with my name and mobile phone number on them, but we must never underestimate the perfidy of mankind...)
I see running TC from, say, the PortableApps USB-stick popup/launcher and then asking for a passcode for access to an encrypted wincmd.key. A simple code derived from KB keys' locations on the keyboard, rather from their meaning in language, would be relatively convenient, IMO, and then TC is up and running.
Can you describe a facility/utility that prompts for a passcode when its contents are addressed? Normally they're passive.
AxCrypt, TrueCrypt, Crypt, PGP, compressors... but they're passive, IME.
(BTW, I have a paper stickers on my USB sticks with my name and mobile phone number on them, but we must never underestimate the perfidy of mankind...)
Regards, PhredE
2MaxX
didn't try, it was just an idea (the simplest to do!).
You also can do another crazy thing... (if you don't like that concept)
1. pack your key to 7z
2. copy any small bmp or jpeg to TC dir (e.g. TC logo) to be safe
3. append 7z to your jpeg
4. start tc with cmd file which extracts your hey, starts tc, then removes key
One more crazy thing
1. pack your key to 7z
2. make some kind of sfx-7z arch with this utility - http://buttontc.7zsfx.info/ (it will do: 1. extract key, start tc (with console hidden!), delete key)
3. put this sfx into specific thinapp container (to prevent stealing key) without outer processes' virtualization.
4. launch TC with this new EXE file
For more paranoia you can pack encrypted 7z.
didn't try, it was just an idea (the simplest to do!).
You also can do another crazy thing... (if you don't like that concept)
1. pack your key to 7z
2. copy any small bmp or jpeg to TC dir (e.g. TC logo) to be safe
3. append 7z to your jpeg
4. start tc with cmd file which extracts your hey, starts tc, then removes key
One more crazy thing
1. pack your key to 7z
2. make some kind of sfx-7z arch with this utility - http://buttontc.7zsfx.info/ (it will do: 1. extract key, start tc (with console hidden!), delete key)
3. put this sfx into specific thinapp container (to prevent stealing key) without outer processes' virtualization.
4. launch TC with this new EXE file
For more paranoia you can pack encrypted 7z.