In the first installment of this two-part tutorial series, we learned some of the basics of configuring TrueCrypt, a free open source disk encryption tool, similar to the BitLocker feature in the Enterprise and Ultimate editions of Windows. After outlining the three different encryption methods, we configured the easiest method--file container.
In this second and final part, we

The link for this article located at eSecurity Planet is no longer available.