On Sun, 27 Sep 2009 23:02:58 +0100, Stuart <me@me.net> wrote:
>greetings
>
>the files that you recently posted
>
>what program is used to view them
>
>yours truly
>
>a friend
Well, since this group is offically dead, I suppose it woudn't do any
harm to offer some information, if it's not known already.
The files are encrypted with TrueCrypt, a program that creates virtual
'drives' which can be mounted on a physical hard drive or USB device.
Files are saved to the virtual drive and locked with either Passwords,
Key Files or both. In order to open these files, you will need the
TrueCrypt program and either the password, keys or both. Once you have
these, you can mount the files as a drive and view the files on the
virtual drive.
The file names are a clue to what key files are needed. For instance,
if 3 key files named A01, C02, B03 are required, the filename would be
A01C02B03. Actually this is a User choice, and the filename could be
anything, but this way, the keyfiles are identified. The key files and
be any file, like a text file, JPG, etc. The key files are usually
stored in a separate container which is accessed by a password.
|
|