This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: The Random Pool code changes rapidly. 7. How many clusters are used to make up the enclosed file system? Two 8. How big is the file system? Nineteen Kb 9. In the same dialog box there are references to “cluster tip area? And “alternate data streams.” To what do these terms refer? Cluster tip area refers to the unused area at the end of the volume that is unused because files rarely fill all of the allowed clusters. Alternate Data Stream refers to Window’s extension of NTFS that allows compatibility with Apple’s HFS (Hierarchical File System). 10. After you erase the file, can you find it in the recycle bin? No. 11. After you erased the foo.txt from your desktop, reopened Truecrypt, remounted your foo.tc file, is it still there when you try to access it? Yes, the encrypted one is still there, we only erased the unencrypted copy....
View Full Document
- Spring '07
- Cryptography, Computer file, Cyber Self Defense Lab, standard volume