![]() The information obtained can now be used in many ways. Each partition/device known to Windows will have here at least one entry in the form of \?\Volume This normally indicates a mounted, non-encrypted virtual hard disk file.", path, ) Microsoft Windows keeps track of all (currently) mounted devices in the registry hive HKLM\SYSTEM\MountedDevices. In this article I’m explaining the idea and the solution to this problem. NET that uses forensic techniques to determine whether a specified directory is part of such a container or not. Thus, I’ve created a small software library written in C# /. The challenge was now to provide a means for software applications to determine if the target directory onto which the data is supposed to be stored is part of an encrypted container or not – whereas storage to any other location should be prohibited by the software application. Those containers are explicitly mounted as disk drives when classified data needs to be accessed and either automatically closed (dismounted) after a defined inactivity period or explicitly closed by the user when work is finished. Therefore the procedures recommend to use in addition encrypted containers, like PGP disks, TrueCrypt (which is not supported anymore) or VeraCrypt. The policy states that disk drive encryption is not enough since when logged in, the encryption is transparent. ![]() One task that I was recently dealing with, was to ensure that confidential data that is needed “in-the-field” can only be stored in an encrypted container on the laptop. Determine if a given path/filename is pointing to an encrypted volume This C# code analyses a specified file path and determines if it is pointing to a mounted encryption container (e.g. ![]() Determine if a given path/filename is pointing to an encrypted volume. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |