0% found this document useful (0 votes)
35 views

TrueCrypt User Guide - 002

The document provides instructions for creating and using encrypted volumes and partitions with TrueCrypt software. It details how to create TrueCrypt containers and encrypted drives, as well as how to setup plausible deniability with hidden volumes and hidden operating systems.

Uploaded by

xanga007
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

TrueCrypt User Guide - 002

The document provides instructions for creating and using encrypted volumes and partitions with TrueCrypt software. It details how to create TrueCrypt containers and encrypted drives, as well as how to setup plausible deniability with hidden volumes and hidden operating systems.

Uploaded by

xanga007
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CONTENTS

INTRODUCTION.............................................................................................................................. 6
BEGINNER’S TUTORIAL .............................................................................................................. 7
How to Create and Use a TrueCrypt Container ....................................................................... 7
How to Create and Use a TrueCrypt-Encrypted Partition/Device ......................................... 25
TRUECRYPT VOLUME ................................................................................................................ 26
CREATING A NEW TRUECRYPT VOLUME ........................................................................................ 26
Hash Algorithm...................................................................................................................... 26
Encryption Algorithm ............................................................................................................ 26
Quick Format ......................................................................................................................... 27
Dynamic ................................................................................................................................. 27
Cluster Size ............................................................................................................................ 27
TrueCrypt Volumes on CDs and DVDs ................................................................................ 27
Hardware/Software RAID, Windows Dynamic Volumes ..................................................... 28
Additional Notes on Volume Creation .................................................................................. 28
FAVORITE VOLUMES ....................................................................................................................... 29
SYSTEM FAVORITE VOLUMES ......................................................................................................... 31
SYSTEM ENCRYPTION ............................................................................................................... 33
Hidden Operating System ...................................................................................................... 33
Operating Systems Supported for System Encryption........................................................... 34
TrueCrypt Rescue Disk .......................................................................................................... 34
PLAUSIBLE DENIABILITY ......................................................................................................... 37
HIDDEN VOLUME ............................................................................................................................ 38
Protection of Hidden Volumes Against Damage ................................................................... 40
Security Requirements and Precautions Pertaining to Hidden Volumes ............................... 43
HIDDEN OPERATING SYSTEM .......................................................................................................... 47
Process of Creation of Hidden Operating System ................................................................. 49
Plausible Deniability and Data Leak Protection .................................................................... 50
Possible Explanations for Existence of Two TrueCrypt Partitions on Single Drive ............. 50
Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems ... 52
MAIN PROGRAM WINDOW ....................................................................................................... 54
Select File .............................................................................................................................. 54
Select Device ......................................................................................................................... 54
Mount ..................................................................................................................................... 54
Auto-Mount Devices.............................................................................................................. 54
Dismount ................................................................................................................................ 54
Dismount All.......................................................................................................................... 55
Wipe Cache ............................................................................................................................ 55
Never Save History ................................................................................................................ 55
Exit ......................................................................................................................................... 55
Volume Tools ........................................................................................................................ 56

You might also like