As I understand it, any password that you could (reasonably) remember has less than even 128 bits of entropy, so compromising your data has more to do with brute-forcing your password than it does with breaking 128/256-bit+ encryption. I'm not sure if that's what you're referring to, or if Winzip has some other vulnerability in the way it implements encryption.
Either way, truecrypt is great. It also allows an option to use a keyfile in addition to/instead of a password (which should contain the full entropy required for the 128/256/whatever bits you're encrypting with). The only issue is the that the keyfile must be present on any computer in order to be able to decrypt the container's contents. Doing something like this is probably overkill for keeping a bored sysadmin from snooping through your files, but it's the next step up from password-derived encryption keys.