There is no need to check the “Include TrueCrypt Volume Creation Wizard” box since we just went through that process. Go to “Tools” then “Traveler Disk Setup.” You will see this screen:Ĭhange “Create traveler disk files at” to your current USB drive letter. Run the TrueCrypt executable file created in the first step. It will take a bit of time to format your drive but when it finishes just click Exit and you are finished with the setup. On this screen you will need to move your mouse around the TrueCrypt window for a while to help randomize the creation of the encryption key and then click Format. Click Next to get to this screen:Įnter a password for the encrypted container and click Next which brings up the following. I would only make a container that fills about 75-90% of your USB drive since it’s usually good to have some free space that you can use for files you don’t need encrypted or for working with systems that can’t run TrueCrypt. One recommendation here is to NOT fill up the whole USB stick. Notice you can’t use decimal points so it is easier to specify gigabytes in megabytes instead (e.g., 3000MB = 3GB). Leave the default “Encryption Algorithm” as AES and likewise leave the default “Hash Algorithm.” Click Next which will bring you to the following screen:Įnter a “Volume Size”. Type in whatever filename you wish to create (e.g., JMB above) and click Save, then click Next. You’ll see:Ĭlick “Select File…” and browse to the root of the USB stick. You’ll see:Ĭhoose “Standard TrueCrypt volume” and click Next. You’ll see the following screen:Ĭhoose “Create an encrypted file container” and click Next. Step 2: Create a TrueCrypt encrypted container on your USB driveĬreate a TrueCrypt encrypted container on your USB drive by running the TrueCrypt Format.exe file. If you don’t do this you may get a “The process cannot access the file because it being used by another process” error in the next step. Either change that to the default directory (in this case E:\) or after the install just move the created files (or at a minimum the. Note that by default the program will try to install the files in a folder called TrueCrypt (see above). Next, choose the location to extract the files. This will create a TrueCrypt folder on your USB drive but will not install anything. When you click to install you will see this screen:Ĭhoose the second option. Here are the steps: Step 1: Download and Install TrueCryptĭownload TrueCrypt directly to your USB drive. Since USB flash drives are easily lost, left or stolen, they are great candidates for using TrueCrypt. For a video explaining the ins and outs of TrueCrypt, check out TechRepublic’s File encryption made simple with TrueCrypt. Now that I understand how it works, I find it very useful. All I can say is I love this software but had to figure it out by giving it a try. The above description may not seem exactly clear to you. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space). Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. On-the-fly encryption also means that files are encrypted or decrypted right before they are loaded or saved, without any user intervention. “On-the-fly” refers to the fact that the files are accessible immediately after the key is provided, and the entire volume is typically mounted as if it were a physical drive, making the files just as accessible as any unencrypted ones. TrueCrypt is free software for on-the-fly-encryption (also known as real-time encryption). So, download VeraCrypt but feel free to use these TrueCrypt instructions as they are completely valid for VeraCrypt Likewise, the operation is identical to TrueCrypt. It is essentially the same software and even keeps the same look and feel. Fortunately, some developers have revived it, calling the new product VeraCrypt. UPDATE – June 06, 2015: This is an older article discussing TrueCrypt, which has unfortunately been abandoned.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |