Top 15 TruPax Alternative and Similar Softwares | Apr 2024

TruPax generates TrueCrypt - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself, thanks to fat32-lib. For all of that there are no administrator rights required when using TruPax.

The generated file system of the containers is UDF 1.02, which is supported by all of the modern operating systems. Most of them support writing - meaning files in a container can also be deleted or new ones added. TruPax can wipe files after container generation, or just as a separate action. You can also invalidate any TrueCrypt container with it very quickly.

1. FileVault

FileVault FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.FileVault 2 uses full disk, XTS-AES 128 encryption to help keep your data secure. Using FileVault 2, you can encrypt the contents of your entire drive.......

2. EDS (Encrypted Data Store)

EDS (Encrypted Data Store) With EDS (Encrypted Data Store) you can store your files in the encrypted container to prevent unauthorized access to sensitive information. TrueCrypt container files are supported.Main features:* Supports AES, Serpent, Twofish encryption algorithms.* SHA-512, RIPEMD-160, Whirlpool hash algorithms.* Encrypt/decrypt any kind of file.* TrueCrypt compatible container files.* All the......

3. LUKS

LUKS LUKS is the standard for Linux hard disk encryption. By providing a standard on-disk-format, it does not only facilitate compatibility among distributions, but also provides secure management of multiple user passwords. In contrast to existing solution, LUKS stores all setup necessary setup information in the partition header, enabling the user......

4. eCryptfs

eCryptfs The enterprise cryptographic filesystem for Linux......

5. east-tec SafeBit

east-tec SafeBit east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is......

6. USBCrypt

USBCrypt Password protection and strong encryption of the external and internal drives, flash drives, backup drives, etc.......

7. Windows BitLocker

Windows BitLocker Windows BitLocker & "Bitlocker To Go" Drive Encryption is a data protection feature in Windows Vista Enterprise and Windows Vista Ultimate for client computers and in Windows Server 2008. BitLocker protects against data theft or exposure on computers that are lost or stolen, and offers more secure data deletion when......

8. CipherShed

CipherShed A fork of the now-discontinued TrueCrypt . CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.After creating an encrypted......

9. TrueCrypt

TrueCrypt [TrueCrypt is not exactly "Open Source", but the source is available. See the reviews to get......

10. Symantec Drive Encryption

Symantec Drive Encryption Symantec Drive Encryption, powered by PGP Technology, is a transparent drive encryption for laptops, desktops and removable mediaEncrypts data against unauthorized accessSecures sensitive informationCentralizes management and simplifies deploymentsKey FeaturesStrong encryption and securityConsistent protection spans enterprise desktops and servers.Transparent encryption covers all data: user files, swap files, system files, hidden files......

11. VeraCrypt

VeraCrypt VeraCrypt is a free disk encryption software brought to you by IDRIX ( http://www.idrix.fr ) and that is based on TrueCrypt .It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.For example, when the system partition......

12. Network Security Services

Network Security Services Network Security Services (NSS) comprises a set of libraries designed to support cross-platform development of security-enabled client and server applications with an option support for hardware SSL acceleration on the server side and hardware smart cards on the client side. NSS provides a complete open-source implementation of cryptography libraries supporting......

13. ScramDisk for Linux - SD4L

ScramDisk for Linux - SD4L SD4L is a suite of Linux tools and a graphical user interface (GUI) which allow the creation of, and access to ScramDisk encrypted container files. In particular, SD4L provides a Linux driver which enables mounting ScramDisk containers. ScramDisk for Linux also encrypts partitions on a hard disk or storage media......

14. iGPMail

iGPMail iPGMail is an app that implements the OpenPGP standard (RFC 4880, RFC 6637) and allows the user to create and manage both public and private (RSA, DSA, ECDSA) PGP keys and send and receive PGP encrypted messages.......

15. Camouflage

Camouflage Camouflage v1.2.1 - final version. Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention.For example, you could create a......