Username or EmailPassword
Do you honestly believe you can brute force an encrypted file system? We're not talking about a bad 40-bit keyed algorithm here. My understanding is that these chips are just hardware implementations of common encryption routines like AES.
Let's say you have a disk that you stole, you don't have the password because it wasn't written on the guys laptop that you found/stole. So, you try guessing passwords: How long do you think it's gonna take you to get it assuming he didn't use "god," "love," or "sex?"
I think Windows XP already has encrypted filesystem though; they're just "slow" because the cpu has to do the work.
Well worth the speed costs if your work is sensitive.
XP SP1+ and 2003 use 256 bit AES for NTFS EFS.
Just so you know, recent Via CPUs have hardware accelerated crypto. I doubt XP and 2003 use it, but OpenBSD certainly does.
This is seperate from a secure hardware element (i.e. TPM) for key storage. If using one, the only way to obtain the keys is by deconstructing the chip.