![]() My TrueCrypt volume will masquerade on the hard disk as a backup file and if NTBackup were to try and mount the file, it would come up as invalid. bkf extension is the same used by the Windows 'NTBackup' utility. In this example I am going to make a TrueCrypt volume in the 'My Documents' folder called 'homedir.bkf'. Any data currently on USB flash drive will be removed as a result of this process. Choose 'Select Device.' to navigate to a USB flash drive that will be formatted as a TrueCrypt volume. Choose 'Select File.' to navigate to a place on the files system and create the TrueCrypt volume. The next step would be to select a file location or device for the volume. If you wear a tin-foil hat, then a hidden TrueCrypt volume is what you need. A beginner's web-page is made available for first-time users to review prior to continuing.Ĭlick the 'Create Volume', button to start the wizard. The encrypted volume is mounted and accessed by using the TrueCrypt program, otherwise the volume is just another file. A bit of trickery is involved in this process to make your TrueCrypt volume look like nothing particular. TrueCrypt hides protected data in plain sight as a normal file, that a normal file scan would over look. An encrypted volume must be created and configure to allow the storage of data that should be secured. TrueCrypt is now installed, but it is not actually protecting anything yet. There is no reboot required at the end to finalize the installation. ![]() The default options are smore than suitable for a first-time install.ĭepending on the speed of your computer's CPU and the amount of installed RAM, TrueCrypt should install in a matter of minutes. The install cannot happen from within the compressed folder.ĭouble-click the setup executable (TrueCrypt Setup) to get started. The Windows XP compressed folder utility can be used to extract the program to an uncompressed directory. The program downloads as a zipped folder archive. TrueCrypt must be installed by an account with administrative privileges, but it can be used by any user account on the computer. Identity theft is a very common crime and can be easily facilitated by unsecured personal data found on lost or stolen devices. All of these drives contained numerous items of personal data, but strangely not all of them had a file described how to contact the owner. I have found numerous flash-drives in the labs around campus and even in some classrooms. TrueCrypt can be used to secure an entire flash-drive as well as contents on a laptop's hard drive. ![]() Laptops are often stolen and portable USB flash-drives are misplaced and left behind. Portable computing environments add another variable to data security. It is still your responsibility to protect and control your data, and truecrypt can assure that prospect. Personal data and professional data is bound to be mixed on a computer's hard drive at any given time. That idea may be a sensible approach, but given the amount of time a user is spending at work, the rule is far from practical. At least ,that is what any IT or security officer would tell a user after data has been confiscated. Personal content of any kind does not belong on a corporate computer. I try to keep a very large separation between personal data and work-related data. For example, e-mail messages on a corporate e-mail server are legally considered the property of that company as are the documents and data stored on corporate file servers. However in many computing environments, such as corporate networks and public kiosks data is considered the property of facilitating party. The data stored on your hard drive is your own property, you are responsible for it's integrity. Simply save the zipped folder and then extract the contents prior to install. The examples and screen-shot detailed here will cover an installation of TrueCrypt version 4.3 on Windows XP Professional Service Pack 2. Sorry Mac users, you will have to wait until sometime in Q1 2008. The true-crypt program is freely available for download from the 'sourceforge' web-site for Windows 2000/XP/Vista and Linux. TrueCrypt is a free and open-source program designed to secure user data by using encryption (crypto) and stegonagraphy (stego). TrueCrypt 101 How to secure and protect your data with TrueCrypt Why?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |