: Burn images to physical discs or create bootable USBs.
: Mount and use Virtual Hard Disks and TrueCrypt containers.
: "Cracks" are often Trojans in disguise that steal login credentials or encrypt files.
: Edit, compress, and password-protect image files.