Ok, it seems I got the picture of how it currently works correctly. Well, I think I given my suggestion to these new feature in a way that your understand what I mean. Even if you decide to implement the way it currently is, it will still be better than just supporting NTP, and if it can be the way I suggest it would be perfect for me and likely to most people wanting the most accurate time possible over Internet but with the advantage of knowing that there is little chance some attacker influence...
I've tested version 3.14 and it seems to only connect to the first server in the list and not to the other ones unless the first server doesn't answer? That is why a wrote that. By your answer it seemed that the program connects to the first server, and if the local machine time is closed enough it will say things seem fine, but if not he may test another server until someone agrees with the local time?
Hello Mark Griffiths, Thanks for the answer. I hope it can be added in the near future as there isn't any native program for Windows that supports Network Time Security (NTS). I understand the explanation. My idea would be for the NetTime to have the option to test several servers to see what is the time that the SERVERS agree is the correct one, of course taking into account that one or more servers may not agree with what is the correct hour for several reasons, but these would be taking into account...
Support Network Time Security (NTS)
I would suggest that 7-zip files are digitally sign. To make it more easy for users to know it came from the true developer. Certum Code Signing OpenSource certificate, seems the only one that one can obtain, and that should be universally accepted by default everywhere. If getting Certum certificate is out of question, then I can suggest a free alternative using the free and open source: "XCA -- X Certificate and Key Management". If your want a simple thing then I suggest creating a "Root Certificate"...
Can you add a option for temporary files secure wiper, even if based on command line request using third parties tools that need to be download/ installed, like: the free "SDelete" from Sysinternals/ Microsoft; the free "Eraser" from Heidi; or for example the free (with optional donation for upgrade) "PrivaZer" from Goversoft. For the common ones could already exist a button to press and fill the command line parameters (adjustable by the user).
Same error here, with external hardrive, on the Windows 10, the problem (in my case) was in the Windows Defender "protection against ransomware", I disable it, and the VeraCrypt was able to perform the action without problem (create a new encrypted volume on the new external hard drive). Maybe some sort of test can be added to see if Windows Defender "Ransomware" protection is active and is going to interfere with the operation.