Wow, thanks for the quick replies. So it seems a disk image is the only option then.
Wow, thanks for the quick replies. So it seems a disk image is the only option then.
No, TrueCrypt was also mentioned. Encrypted disk images are the only built-in way though. TrueCrypt has the advantage that they can be accessed on Windows or Linux as well.
Here is a question. If the password is already saved in your keychain. How do you get it out of the keychain?
No, TrueCrypt was also mentioned. Encrypted disk images are the only built-in way though. TrueCrypt has the advantage that they can be accessed on Windows or Linux as well.
Right, but it does the same thing as disk utility, encrypted disk image.
I don't see how portability would be a disadvantage.rhett7660 said:Or dis-advantage depending on how you look at it......
No, TrueCrypt doesn't create disk images, it creates volumes. Otherwise, TrueCrypt could open disk images on Windows. TrueCrypt also uses stronger encryption algorithms than disk utility.
I don't see how portability would be a disadvantage.
Open your keychain (/Library/Keychains and ~/Library/Keychains), select the password, and delete it. You can also delete entire keychains in the Finder, if you wish.
Is there any utility out there that allows you to password protect certain folders?
Nothing to do with portability... this could do with the tools that people use to get into the file.... seems some OS are easier to get into and then get into the files...... whether they are encrypted or not.
What about espionage guys? This encrypts folders and is supposed to be very simple to use.
Also, reallistically a good password + good encryption = impossible to crack
Right?
Depends on your definition of good and impossible.