This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: The Random Pool code changes rapidly. 7. How many clusters are used to make up the enclosed file system? Two 8. How big is the file system? Nineteen Kb 9. In the same dialog box there are references to “cluster tip area? And “alternate data streams.” To what do these terms refer? Cluster tip area refers to the unused area at the end of the volume that is unused because files rarely fill all of the allowed clusters. Alternate Data Stream refers to Window’s extension of NTFS that allows compatibility with Apple’s HFS (Hierarchical File System). 10. After you erase the file, can you find it in the recycle bin? No. 11. After you erased the foo.txt from your desktop, reopened Truecrypt, remounted your foo.tc file, is it still there when you try to access it? Yes, the encrypted one is still there, we only erased the unencrypted copy....
View Full Document
This lab report was uploaded on 04/21/2008 for the course IT 101 taught by Professor Watt during the Spring '07 term at RIT.
- Spring '07