Wipe Blanks, Pretest, And Encryption
This feature probably seems like overkill, but if you don’t want any traces to remain on a hard drive and only work with the encrypted data, it is important. The procedure effectively removes existing file fragments that may still be on a hard drive from previous system installations. Select 3-pass, 7-pass, or a solid 35-pass wiping of unused areas and these will systematically be overwritten.
Before actually encrypting your system, TrueCrypt verifies that the system boots correctly using the boot loader, not yet using encryption nor the password.
Once restarted, the actual encryption process may begin.
Our test system, a Dell Latitude D610, was equipped with a 45 nm Core 2 Duo Penryn T9500 processor (2.6 GHz) and a brand new Western Digital WD5000BEVT 500 GB Scorpio drive, one of the fastest mainstream drives available today. The entire encryption process using AES took eight hours, during which we could keep using the system (though we did not do much). The process takes place in the background and only consumes CPU resources during system idle times. This obviously means that working with the system intensively results in a longer encryption period.
Current page: Wipe Blanks, Pretest, And EncryptionPrev Page Encryption Algorithm, Performance, Rescue Disc Next Page First-Start, Limitations, Decrypting
Stay on the Cutting Edge
Join the experts who read Tom's Hardware for the inside track on enthusiast PC tech news — and have for over 25 years. We'll send breaking news and in-depth reviews of CPUs, GPUs, AI, maker hardware and more straight to your inbox.