VeraCrypt
aboutsummaryrefslogtreecommitdiff
AgeCommit message (Expand)AuthorFilesLines
2015-04-06Update user guide PDFMounir IDRASSI1-0/+0
2015-04-06Windows: Require upgrading rescue disk since we changed bootloader in 1.0f-2Mounir IDRASSI1-1/+1
2015-04-06Windows: use secure string functionsMounir IDRASSI2-704/+698
2015-04-06Windows vulnerability fix: CryptAcquireContext vulnerability fix. Add checks ...Mounir IDRASSI13-24/+171
2015-04-05Linux/MacOSX: Always add the source location when system exception occur in o...Mounir IDRASSI1-2/+1
2015-04-05Linux/MacOSX: correctly handle some internal exception classes that were miss...Mounir IDRASSI1-0/+4
2015-04-05Windows Setup: Avoid potential issues by correctly initializing variables and...Mounir IDRASSI1-13/+13
2015-03-23Linux: solve mount point permission issues for some users where the non-FAT v...Mounir IDRASSI1-0/+17
2015-03-19Windows: correctly handle WIN32 LastError when mounting. Harmonize file acces...Mounir IDRASSI2-53/+77
2015-03-17Windows Setup: When clicking uninstall link, launch Windows Add/Remove progra...Mounir IDRASSI1-6/+15
2015-03-16Windows Setup: remove other VeraCrypt references for registry.Mounir IDRASSI1-0/+6
2015-03-15Windows Setup: implement removal of special LEGACY_VERACRYPT registry keys.Mounir IDRASSI1-60/+258
2015-03-13Windows: VeraCrypt reference from various registry locations. Uninstall old V...Mounir IDRASSI2-2/+123
2015-03-08Add Coverity define to avoid false positives during Static Code Analysis when...Mounir IDRASSI1-0/+5
2015-03-08Linux/MacOSX: Load preferences if only volume path is given in command line a....highlight .hll { background-color: #ffffcc } .highlight .c { color: #888888 } /* Comment */ .highlight .err { color: #a61717; background-color: #e3d2d2 } /* Error */ .highlight .k { color: #008800; font-weight: bold } /* Keyword */ .highlight .ch { color: #888888 } /* Comment.Hashbang */ .highlight .cm { color: #888888 } /* Comment.Multiline */ .highlight .cp { color: #cc0000; font-weight: bold } /* Comment.Preproc */ .highlight .cpf { color: #888888 } /* Comment.PreprocFile */ .highlight .c1 { color: #888888 } /* Comment.Single */ .highlight .cs { color: #cc0000; font-weight: bold; background-color: #fff0f0 } /* Comment.Special */ .highlight .gd { color: #000000; background-color: #ffdddd } /* Generic.Deleted */ .highlight .ge { font-style: italic } /* Generic.Emph */ .highlight .gr { color: #aa0000 } /* Generic.Error */ .highlight .gh { color: #333333 } /* Generic.Heading */ .highlight .gi { color: #000000; background-color: #ddffdd } /* Generic.Inserted */ .highlight .go { color: #888888 } /* Generic.Output */ .highlight .gp { color: #555555 } /* Generic.Prompt */ .highlight .gs { font-weight: bold } /* Generic.Strong */ .highlight .gu { color: #666666 } /* Generic.Subheading */ .highlight .gt { color: #aa0000 } /* Generic.Traceback */ .highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */ .highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */ .highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */ .highlight .kp { color: #008800 } /* Keyword.Pseudo */ .highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */ .highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */ .highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */ .highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */ .highlight .na { color: #336699 } /* Name.Attribute */ .highligh8-6/+410
2015-02-27Linux/MacOSX: Modify wxFormBuilder generated files directly to solve the 'X' ...Mounir IDRASSI1-6/+6
2015-02-27Revert "Linux/MacOSX: solve the 'X' icon not closing some dialog. This was ca...Mounir IDRASSI8-14/+14
2015-02-25Readme.md: indicate that on MacOSX building a console-only binary is not supp...Mounir IDRASSI1-2/+4
2015-02-25Readme.txt: indicate that on MacOSX building a console-only binary is not sup...Mounir IDRASSI1-2/+4
2015-02-25Windows: Use default hash in the options of hidden volume protectionMounir IDRASSI1-0/+25
2015-02-24Language XML: change the wording of password error messages to reflect the po...Mounir IDRASSI1-6/+6
2015-02-24Windows: remove topmost and system modal properties from the wait dialog so t...Mounir IDRASSI1-2/+1
2015-02-24Add test containers and Windows benchmark script for mount performanceMounir IDRASSI5-0/+152
2015-02-22Windows: check password length for outer volume during hidden volume creation...Mounir IDRASSI1-3/+2
2015-02-22Windows: Add menu option to set default hash and default TrueCrypt mode used ...Mounir IDRASSI5-19/+171
2015-02-22Speed and memory usage optimization for key derivation based on patches by Ni...Mounir IDRASSI3-290/+383
2015-02-16Windows Installer: don't add link to VeraCryptExpander in the desktop.Mounir IDRASSI1-8/+0
2015-02-16Language: update German XML with translation contributed by H. SauerMounir IDRASSI1-3/+3
2015-02-16Language: update French translation (contributed by Thierry T.)Mounir IDRASSI1-353/+353
2015-02-16Language: Update language XML files with new added fieldsMounir IDRASSI37-111/+185
2015-02-16Window: add menu entry for launching VeraCryptExpanderMounir IDRASSI4-1/+33
2015-02-16Linux/MacOSX: solve the 'X' icon not closing some dialog. This was caused by ...Mounir IDRASSI8-14/+14
2015-02-13Linux: Perform a quick NTFS formatting by adding the "-f" switch to mkfs.ntfs...Mounir IDRASSI1-0/+4
2015-02-13Windows: Add VeraCryptExpander.exe to the Windows installer.Mounir IDRASSI2-0/+17
2015-02-11Linux: modify installer script to make it run when the "less" command doesn't...Mounir IDRASSI2-4/+24
2015-02-10Linux: Add graphical installer support when xterm is not available (Linux Min...Mounir IDRASSI2-5/+37
2015-02-10Language: update German translation (contributed by H.S.)Mounir IDRASSI1-18/+18
2015-02-09Windows: Solve PIN blocked issue when trying to mount a volume right after co...Mounir IDRASSI1-2/+8
2015-02-09Static Code Analysis: check return of remove function and display message whe...Mounir IDRASSI1-22/+45
2015-02-09Static Code Analysis: Avoid over-flaw in arithmetic operations by adding more...Mounir IDRASSI6-58/+172
2015-02-09Static Code Analysis: solve issues in Expander. Use real random values for wi...Mounir IDRASSI1-4/+23
2015-02-09Static Code Analysis: in Windows Driver, avoid using uninitialized stack memo...Mounir IDRASSI3-5/+48
2015-02-09Static Code Analysis: code potential memory leaks in inflate.c used by the se...Mounir IDRASSI1-3/+16
2015-02-09Static Code Analysis: handle unused variables more properly. Catch STL except...Mounir IDRASSI10-18/+23
2015-02-09Static Code Analysis: Correct memory leaks. Add more checks.Mounir IDRASSI2-18/+77
pan class="nt">a></strong> </li><li><strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong> </li><li><strong><strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong></strong> <ul> <li><a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a> </li><li><a href="Favorite%20Volumes.html">Favorite Volumes</a> </li><li><a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a> </li></ul> </li><li><strong><a href="System%20Encryption.html">System Encryption</a></strong> <ul> <li><a href="Hidden%20Operating%20System.html">Hidden Operating System</a> </li><li><a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a> </li><li><a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a> </li></ul> </li><li><strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br> <ul> <li><a href="Hidden%20Volume.html">Hidden Volume</a> <ul> <li><a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a> </li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a> </li></ul> </li><li><a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a> </li></ul> </li><li><strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong> <ul> <li><a href="Program%20Menu.html">Program Menu</a> </li><li><a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a> </li></ul> </li><li><strong><a href="Parallelization.html">Parallelization</a></strong> </li><li><strong><a href="Pipelining.html">Pipelining</a></strong> </li><li><strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong> </li><li><strong><a href="Hot%20Keys.html">Hot keys</a></strong> </li><li><strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong> </li><li><strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens &amp; Smart Cards</a></strong> </li><li><strong><a href="Portable%20Mode.html">Portable Mode</a></strong> </li><li><strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong> </li><li><strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes &amp; Partitions</a></strong> </li><li><strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong> </li><li><strong><a href="Language%20Packs.html">Language Packs</a></strong> </li><li><strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong> <ul> <li><a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a> </li><li><a href="Kuznyechik.html">Kuznyechik</a> </li><li><a href="Serpent.html">Serpent</a> </li><li><a href="Twofish.html">Twofish</a> </li><li><a href="Cascades.html">Cascades of ciphers</a> </li></ul> </li><li><strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong> <ul> <li><a href="RIPEMD-160.html">RIPEMD-160</a> </li><li><a href="SHA-256.html">SHA-256</a> </li><li><a href="SHA-512.html">SHA-512</a> </li><li><a href="Whirlpool.html">Whirlpool</a> </li><li><a href="Streebog.html">Streebog</a></li></ul> </li><li><strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong> </li><li><strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong> </li><li><strong><a href="Security%20Model.html">Security Model</a></strong> </li><li><strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br> </a></strong> <ul> <li><a href="Data%20Leaks.html">Data Leaks</a> <ul> <li><a href="Paging%20File.html">Paging File</a> </li><li><a href="Memory%20Dump%20Files.html">Memory Dump Files</a> </li><li><a href="Hibernation%20File.html">Hibernation File</a> </li></ul> </li><li><a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a> </li><li><a href="Physical%20Security.html">Physical Security</a> </li><li><a href="Malware.html">Malware</a> </li><li><a href="Multi-User%20Environment.html">Multi-User Environment</a> </li><li><a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a> </li><li><a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a> </li><li><a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a> </li><li><a href="Trim%20Operation.html">Trim Operation</a> </li><li><a href="Wear-Leveling.html">Wear-Leveling</a> </li><li><a href="Reallocated%20Sectors.html">Reallocated Sectors</a> </li><li><a href="Defragmenting.html">Defragmenting</a> </li><li><a href="Journaling%20File%20Systems.html">Journaling File Systems</a> </li><li><a href="Volume%20Clones.html">Volume Clones</a> </li><li><a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a> </li></ul> </li><li><strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong> </li><li><strong><a href="Miscellaneous.html">Miscellaneous</a></strong> <ul> <li><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a> </li><li><a href="Sharing%20over%20Network.html">Sharing Over Network</a> </li><li><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a> </li><li><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a> </li><li><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files &amp; Application Data</a> </li><li><a href="Removing%20Encryption.html">How To Remove Encryption</a> </li><li><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a> </li><li><a href="Digital%20Signatures.html">Digital Signatures</a> </li></ul> </li><li><strong><a href="Troubleshooting.html">Troubleshooting</a></strong> </li><li><strong><a href="Incompatibilities.html">Incompatibilities</a></strong> </li><li><strong><a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a></strong> </li><li><strong><a href="FAQ.html">Frequently Asked Questions</a></strong> </li><li><strong><strong><a href="Technical%20Details.html">Technical Details</a></strong></strong> <ul> <li><a href="Notation.html">Notation</a> </li><li><a href="Encryption%20Scheme.html">Encryption Scheme</a> </li><li><a href="Modes%20of%20Operation.html">Modes of Operation</a> </li><li><a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a> </li><li><a href="Random%20Number%20Generator.html">Random Number Generator</a> </li><li><a href="Keyfiles.html">Keyfiles</a> </li><li><a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a> </li><li><a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a> </li><li><a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a> </li><li><a href="Source%20Code.html">Source Code</a> </li></ul> </li><li><strong><a href="Contact.html">Contact</a></strong> </li><li><strong><a href="Legal%20Information.html">Legal Information</a></strong> </li><li><strong><a href="Release%20Notes.html">Version History</a></strong> </li><li><strong><a href="Acknowledgements.html">Acknowledgements</a></strong> </li><li><strong><a href="References.html">References</a></strong> </li></ul> </div> </body></html>