Truecrypt is a free, open-source green virtual encryption disk tool that supports Windows Vista/XP/2000 and Linux. You can create one or more virtual disks on the hard disk, all files on the Virtual Disk are automatically encrypted and must be accessed using a password. Truecrypt provides multiple types of EncryptionAlgorithm, Such as AES-256, blowfish (448-bitkey), cast5, serpent, Triple DES, and so on, other features include support for FAT32 and NTFS partitions, hidden volumes and hotkey boot.
Before using truecrypt to create a virtual disk, select a drive letter that is not occupied by the system, for example, "X:", and click "createvolume" to create a virtual disk. Step 1 ). Truecrypt allows you to create standard or hide encrypted disks. In the subsequent wizard, specify the location of the encrypted disk file (click "select file" and enter an arbitrary file name, for example, "newdisk", click "open"), the encryption algorithm, the size of the virtual encrypted disk, set the password for the encrypted disk, and select the file system. Finally, click "format" to format the created virtual disk and exit the wizard.
You must load the generated virtual disk file before using it. Click "select file" under the main interface of truecrypt, find the file created earlier and open it, click "Mount", and enter the correct password to load the virtual disk. At this time, the truecrypt interface will display some information about the new x disk. At the same time, you can see an additional "Local disk X" in "My Computer ". After moving all the files to be protected to disk X, you can disable the virtual disk. Right-click the truecrypt icon in the system tray area, select "dismount X:", and exit.
In addition to creating Virtual Disks, truecrypt has no additional features. However, it allows users to select different encryption algorithms, which is also a highlight of the software.
This virtual encrypted disk tool has not sent any special method to crack the data so far, which also reflects the security of this software. Of course, brute-force cracking still has to be considered. The length and complexity of passwords are also the key to the security of such software.