

share/doc/veracrypt/html/Default Mount Parameters.html.share/doc/veracrypt/html/Data Leaks.html.share/doc/veracrypt/html/Creating New Volumes.html.share/doc/veracrypt/html/Converting TrueCrypt volumes and partitions_truecrypt_convertion.jpg.share/doc/veracrypt/html/Converting TrueCrypt volumes and partitions.html.share/doc/veracrypt/html/Contributed Resources.html.share/doc/veracrypt/html/Command Line Usage.html.share/doc/veracrypt/html/Choosing Passwords and Keyfiles.html.share/doc/veracrypt/html/Changing Passwords and Keyfiles.html.share/doc/veracrypt/html/Beginner's Tutorial_Image_024.gif.share/doc/veracrypt/html/Beginner's Tutorial_Image_023.gif.share/doc/veracrypt/html/Beginner's Tutorial_Image_022.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_021.jpg.

share/doc/veracrypt/html/Beginner's Tutorial_Image_020.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_019.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_018.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_017.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_016.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_015.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_013.jpg.

share/doc/veracrypt/html/Beginner's Tutorial_Image_012.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_011.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_010.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_009.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_008.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_007.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_005.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_004.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_003.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_002.jpg.share/doc/veracrypt/html/Beginner's Tutorial_Image_001.jpg.share/doc/veracrypt/html/Beginner's Tutorial.html.share/doc/veracrypt/html/BC_Logo_30x30.png.share/doc/veracrypt/html/BCH_Logo_48x30.png.share/doc/veracrypt/html/Authenticity and Integrity.html.share/doc/veracrypt/html/Additional Security Requirements and Precautions.html.WWW: SVNWeb : git : Homepage pkg-plist: as obtained via: make generate-plist Expand this list (193 items) Collapse this list. More information about the features of VeraCrypt may be found in the Password: Hidden volume (steganography) and hidden operating system. Provides plausible deniability, in case an adversary forces you to reveal the Encryption can be hardware-accelerated on modern processors. Parallelization and pipelining allow data to be read and written as fast as Encryption is automatic, real-time(on-the-fly) and transparent.
#Cfwiki phantasmic blue ahsha windows#
Encrypts a partition or drive where Windows is installed (pre-boot Encrypts an entire partition or storage device such as USB flash drive or Creates a virtual encrypted disk within a file and mounts it as a real disk.
.png)
#Cfwiki phantasmic blue ahsha software#
Maintainer: Port Added: 05:40:26 Last Update: 15:09:49 Commit Hash: 7b4d1f0 People watching this port, also watch:: rtorrent, pkg, tmux, polipo, zsh License: not specified in port Description: VeraCrypt is a free open source disk encryption software for Windows, Mac OSX,įreeBSD and Linux. Veracrypt Open-source disk encryption software based on Truecryptġ.25.9 security =3 Version of this port present on the latest quarterly branch. This is not a primary server, but it used for development. Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)įreshPorts needs to find a new hosting provide willing to take a 2U chassis and host it free of charge. FreshPorts - security/veracrypt: Open-source disk encryption software based on TruecryptĪs an Amazon Associate I earn from qualifying purchases.
