"Yes. Fully compatible. TrueCrypt is loaded before avast boot scanning."
The description of the boot-time scan says "... the avast! boot-time scan uses direct hard drive access, which bypasses the OS file system drivers and is thus able to handle even the most stubborn rootkits."
I don't seen how these two statements can be compatible. It seems to me that if avast! is bypassing the OS file system drivers, it would bypass TrueCrypt. Thus, avast! would read a bunch of encrypted data and would not be able to see ANY malware. On the other hand, if it CAN read the unencrypted data, it must be running on top of TrueCrypt and therefore not accessing the drive directly. Which is it? If it's the former, the boot-time scan would be worthless. If it's the latter, a rootkit could potentially hide itself.
Many thanks!
I know this is an old topic but I hope someone reads this and can shed some light on the situation because I really want to know the answer! I didn't want to start a new topic because it fits this one so perfectly.