Best Free Drive Encryption Utility


In a Hurry?

  Go straight to the Quick Selection Guide



Encryption is a process of encoding information so that it cannot be accessed by others unless they have the key needed to decode it. Encryption is usually used to protect highly sensitive documents, but it's also a good way to stop people from looking at your personal stuff.

Primary encryption utility categories

Why use categories here? To bring a little order to the large catalog of encryption utility reviews at this site. This particular review article is limited to "drive encryption" utilities. See related categories below.

  1. Encryption utilities that encrypt files/folders directly: These utilities encrypt discrete files and/or folders directly, in contrast to utilities that encrypt and store files in volumes (archives, i.e., container files). File-based utilities may operate in batch mode or in on-the-fly mode.
  2. Virtual-drive encryption utilities create volumes (encrypted containers/archives) which can be mounted in the file-system as virtual drives, complete with drive letters, e.g. "V:". These drives can contain both files and folders. The computer's file system can read, write and create documents in real time, directly in cleartext. Virtual-drive utilities operate in on-the-fly mode.
  3. Full-drive encryption utilities - the utilities reviewed in this article - encrypt entire storage devices, e.g., hard-drives, drive partitions and USB drives. Some of the utilities in this category can also encrypt the drive that the operating system itself is installed on.
  4. Client-side encryption utilities for the cloud: A newly emerged category. These utilities encrypt files before they are uploaded to cloud sync/storage locations. The files are encrypted in transit and while at rest in the cloud. Cloud encryption utilities employ various forms of virtualization to present cleartext client-side, and they operate in on-the-fly mode.

Cautionary Notes

  1. Operating systems are messy: Echoes of your personal data—swap files, temp files, hibernation files, erased files, browser artifacts, etc—are likely to remain on any computer that you use to access the data. It is a trivial task to extract those echoes.
    For example, when you encrypt and compress files, clear-text versions that existed before you compress/encrypt the file or clear-text copies that are created after you decrypt/decompress it remain on your hard drive. Unless you purge—not just delete—those clear-text files. :-(
  2. The fact that an encryption program "works" does not mean that it is secure. New encryption utilities often appear after someone reads up on applied cryptography, selects or devises an algorithm - maybe even a reliable open source one - implements a user interface, tests the program to make sure it works, and thinks he's done. He's not. Such a program is almost certain to harbor fatal flaws.
    "Functionality does not equal quality, and no amount of beta testing will ever reveal a security flaw. Too many products are merely buzzword compliant; they use secure cryptography, but they are not secure."
  3. Further advice about how to use encryption are discussed in Encryption is Not Enough, including what you need to do beyond encryption to be sure your private data is not lost or exposed.


TrueCrypt is the seasoned but abandonded predecessor to VeraCrypt. It once fully met my criteria for selecting encryption software. The developers of TrueCrypt have dropped a bombshell though. (It's complicated...) TrueCrypt did pass a preliminary independent audit in 2015, but the dereliction of TrueCrypt now changes everything. For example, recent (September, 2015) vulnerabilities (which will never be patched) have been discovered in TrueCrypt.

Caution: Fred Langa reported* that VeraCrypt, TrueCrypt, and similar products interfere with File History, Custom Recovery Image creation and UEFI Secure Boot in Windows 8. The portable configurations are no better, because they install the same low-level drivers, which cause the problem as the installed version. It's not clear if Windows 10 is also effected. It may depend on the devices specific hardware configuration.

UEFI is a complex system that is easily disrupted. Elements of those encryption products were developed long before Microsoft introduced UEFI. It's not surprising that the low level drivers that these encryption programs rely on aren't compatible with UEFI.

* "Why VeraCrypt won’t work with Windows 8" and "VeraCrypt: A superior alternative to TrueCrypt?" by Fred Langa. Scroll half way down those pages to find the titles shown here.

On the other hand: I have installed both TrueCrypt and VeraCrypt on the one Windows 10 PC with UEFI boot that I have available, and Windows File History works correctly on it. I have also been able to create a Custom System Image for Windows 10.

VeraCrypt: This fork of TrueCrypt is plausibly free of backdoors, and it may become a good replacement for full-drive encryption. It is not very mature for that use at this point in time (Oct, 2015) though. There continues to be good news on the security of VeraCrypt.

Bitlocker: The advisability of using Bitlocker, provided by some versions of Windows, has become more uncertain. Micah Lee at The Intercept has written an excellent summary of the situation.

DiskCryptor: Because it is based on TrueCrypt, it was removed from this category.

Compusec screenshotFREE CompuSec is specifically designed to protect desktops and notebooks, using pre-boot authentication and full hard disk encryption. Access control requires you to enter your userID and password before the system will boot up. Free CompuSec is free for both personal and business use.

FREE CompuSec includes several other encryption utilities: Voice encryption, encryption of individual files, removable media—CDs, DVDs, USB thumb drives, and "Container" encryption (similar to TrueCrypt volumes).

The Pre-boot Authentication module is automatically installed on the drive to which the OS boots, but you don't actually have to apply Whole Disk Encryption to any drive if you don't want to.


Related Products and Links

Related products:

  • SafeHouse Explorer is a simple, free program that is small enough to use on a USB flash memory drive. You'll find excellent tutorial videos and the users manual at the website, and a screenshot-rich tutorial here.
  • Rohos Mini Drive is a "portable" program that creates a hidden, encrypted partition on USB flash drives.
  • BitLocker (Not part of "Home" versions of Windows) allows users to encrypt their entire Windows disk/partition as well as other disks or partitions. While it's a solid solution, it may not be easy for you to deploy.

Related Articles:


Quick Selection Guide

FREE CompuSec

Runs as a stand-alone program on a user's computer
Pre boot access control. Encryption in hibernation mode. Includes optional utilities for encryption of files, "containers", voice, thumb drives. Free Compusec is free for both personal and business use.
You won't be able to use standard methods for double-booting if you install this software.
20.3 MB
Unrestricted freeware
There is no portable version of this product available.
Supports all Windows OS with 32-bit editions (Windows Vista, Windows XP, Window 2003, Window XP Tablet Edition & Windows 2000). Linux version available too


free encrypt software, best encryption software, encrypt drive, encrypt disk, encrypt partition, encrypt file.

Back to the top of the article

Please rate this article: 

Your rating: None
Average: 4.1 (30 votes)


interesting article...thanks. i alway shy a bit from encryption on my machine as i often wonder if i will be somehow kept out as well as snoopers. but one program you mentioned, safehouse explorer, i do use and have found it simple and as secure as i need it. i was first impressed by the video explaining the product on its homepage. found that well-done and easy to understand for an old coot like me.

DiskCryptor has nothing to do with TrueCrypt. It is no derivative. It was compatible with TrueCrypt Partition layout to be able to mount them until version 0.4. After that it dropped that completely.

On the DiskCryptor wiki they mentioned that:

"DiskCryptor releases from 0.1 to 0.4 were fully compatible with TrueCrypt, as they used a corresponding partition format and encrypted data with AES-256 algorithm in LRW mode. Starting from DiskCryptor 0.5, the program relies upon its own partition format, developed specifically for encrypting partitions with data on them, as TrueCrypt format has been originally meant for creation of empty volumes. That move allowed for an increase in DiskCryptor's stability, eliminated many problems associated with file systems, and created an optimal format for further development of the program."

Also what I like is, that you can use encrypted partition in the network (mapped network drive). That does not work with TrueCrypt. I mean, if I logon at my computer and the whole computer is encrypted, I can still use a share from this computer on another computer. For TrueCrypt I have never been able to use a share. I had to unmount it on that computer and mount the whole HDD on another computer. Haven't tested that on TrueCrypt 7.1 though.

Also DiskCryptor has another advantage. You can put it directly into the Windows Vista / 7 Setup DVD to be able to install Windows directly on a mounted encrypted Partition.

Thanks for the update Brolly. I'm editing the entry.

No problem :). Installing Windows 7 on a encrypted drive without the need to re encrypt it came to my mind, when I First read about the Windows Setup integration.

I no longer have any computers I am willing to experiment with, but it's interesting to see what you can do with a little sleight of hand.

DiskCryptor was updated to 1.0.757.115 Stable on 2013.01.03

Thanks very much for the update MRCS.