Disk encryption software: Difference between revisions

Content deleted Content added
Adm30 (talk | contribs)
Removed the link to the commercial product that does not satisfy the notability guideline.
Adm30 (talk | contribs)
m There's no need for 'software' in bold. The word is already in the main title of the article.
Line 1:
To protect confidentiality of the data stored on a computer disk a [[computer security]] technique called [[disk encryption]] is used. This article discusses '''software''' which is used to implement the technique (for cryptographic aspects of the problem see [[disk encryption]]). Compared to access restrictions commonly enforced by an [[operating system|OS]] this technique allows to protect data even when the OS is not active, for example, if data is read directly from the hardware.
 
Such software [[encryption|encrypts]] data stored on a computer's [[mass storage]] and transparently decrypts the information when an authorized user requests it: no special action by the user (except supplying a [[password]] or [[passphrase]] at the beginning of a session) is required. Some also provide [[plausible deniability]] with [[deniable encryption]] techniques.