The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
The Guiding Principles and New Rules document is now in effect.

Network Drive Encryption

bloodatonementbloodatonement Registered User regular
edited June 2008 in Help / Advice Forum
So I have a network drive that I need to put encryption on. What is a good program (or newer drive) that is easy to access by my network computers but if the drive is ever stolen, it will be hard for anyone else to get at?

Thanks

Zdy0pmg.jpg
Steam ID: Good Life
bloodatonement on

Posts

  • RamiusRamius Joined: July 19, 2000 Administrator, ClubPA admin
    edited June 2008
    Truecrypt. Same answer as here, just 4 threads down from this one.

    Ramius on
    1zxt8dhasaon.png
  • bloodatonementbloodatonement Registered User regular
    edited June 2008
    Ramius wrote: »
    Truecrypt. Same answer as here, just 4 threads down from this one.

    Well, I had read this and it seems to say that the drive needs to be in or directly connected to a computer that is running the Truecrypt software. So I'd need to have a computer that is devoted to running the Truecrypt for the drive. Am I reading it wrong? What I want is for any computer to be able to access the network drive independently.

    bloodatonement on
    Zdy0pmg.jpg
    Steam ID: Good Life
  • RamiusRamius Joined: July 19, 2000 Administrator, ClubPA admin
    edited June 2008
    This is a true "network drive", that connects to a hub and has an IP address, and allows multiple computers to mount it at the same time? If so, then your only chance at having seamless encryption would be if the device itself supports it. There has to be some sort of "computing" going on on the device to understand the TCP and SMB protocols, so I guess it is a matter of finding out if encryption is also built-in or available.

    Otherwise, yes, with truecrypt and any other encryption scheme that is not built-in to the device, you would need to choose one of those two options. Either have a computer which does the encryption/decryption and exposes the unencrypted volume as a share to any additional computers that need access, or, mount the encrypted volume on each computer that needs to access it, but be forced into read-only mode if you need more than one computer connected to it at a time.

    Ramius on
    1zxt8dhasaon.png
Sign In or Register to comment.