Subscribe by RSS RSS Icon
Follow me on Twitter Twitter Icon

TrueCrypt - Protect Sensitive Data

TrueCrypt is an open-source, cross-platform program that allows you to create protected storage volumes, in which you can safely keep your secret files. It's important to understand that TrueCrypt does not selectively encrypt files; rather, it creates a sort of encrypted folder that protects anything in it. This folder, known as a storage volume, must be mounted with TrueCrypt and requires a password to be accessed.

Main features:

  • Creates a virtual encrypted disk within a file and mounts it as a real disk.
  • Encrypts an entire partition or storage device such as USB flash drive or hard drive.
  • Encrypts a partition or drive where Windows is installed (pre-boot authentication).
  • Encryption is automatic, real-time (on-the-fly) and transparent.
  • Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
  • Encryption can be hardware-accelerated on modern processors.
  • Provides plausible deniability, in case an adversary forces you to reveal the password
  • Hidden volume (steganography) and hidden operating system. 
Step 1
Download, install and start TrueCrypt

Step 2
True Crypt program window >> Menus bar >> Volumes >> Create New volume ..
 

Step 3
Follow the instructions of True Crypt Volume Creation Wizard, use defaults:

Choose the name and location of your virtual file:

Use the default AES encryption which is quite strong:

When specifying the size, check the appropriate box Kb, Mb, or Gb, and then enter a number next to it, e.g. 4 Gb or 4096 Mb:

Set a password for your volume. You can use keyfiles such as image file as dual factor authentication:

Check mark if you're gonna be using files larger than 4 Gb:

Use NTFS as the volume format:

Step 4
Finally, when u want to use the disk just select the drive letter and enter your password to mount the encrypted virtual file:

You'll get a hard drive partition at your disposal which can be accessed from your account until you unmount it, reboot, shutdown, log off, or turn the power off.

0 comments:

 
Copyright Info.

Only for my personal reference. I do not own any of these materials here. Use it at your own risk!

XHTML/CSS validations
Valid XHTML 1.0 Transitional Valid CSS!