TrueCrypt How to use and detailed tutorials

Source: Internet
Author: User
Tags what file system

Everyone has a person's file, hehe. Maybe it's your diary, maybe your company's top secret file, maybe your private photo, maybe some messy movie ... These are your privacy. However, these privacy requirements meet the following conditions:

1, do not let other people open illegally;

2, oneself can be convenient enough to open;

3, does not appear oneself also cannot open the situation.

So many encryption software on the Internet. Quite a lot of encryption software is not encrypted at all, just is hidden. Anyone who knows a little bit can easily open it. In the future, we will show you how to open those files encrypted in general encrypted files to tell everyone how insecure they are. With these software encryption, you are not at all relieved. If you lose your computer someday, you will be very uncomfortable because you are worried that others will illegally access your files. These encryption software does not meet the first condition. Not safe enough.

There are some encryption software, although very safe, but the encryption speed is too slow, such as our common WinRAR compressed file is a good encryption software, but you encrypt a 1G file to compress a half an hour. Next time you open this encrypted file to see it will take another half an hour, can you bear it? Many encryption software that is truly encrypted rather than hidden is slow. These do not satisfy the second condition, that is, they are not convenient enough to open them.

Many others seek security, but are you aware that you may not be able to open one day? Encrypted files are the most important files, once you can not open, how uncomfortable ah! Many computers are safe, equipped with security chips, but you do not understand, one day you just is re-installed system, Your file can't even be opened by yourself. This does not satisfy the third article. Someday you may not be able to open your own encrypted files will make you uneasy.

Today's software has been tested, time to prove that he is the safest, although has stopped updating, more people say it is unsafe, but there is no evidence that the FBI can not crack the encryption software you deserve to have

This software has a lot of features, some encryption software encryption, but the next time after the system to re-install all the files can not be decrypted, but this does not, it is green does not rely on the operating system. Some software in XP under the encryption of a file, under XP can be decrypted, but the file in the Vista system software will not be used, resulting in the inability to decrypt, but this does not, XP, Vista, Win7 can be used, encrypted files even in Linux can be decrypted. Some encrypted files are very slow to encrypt files, but this encryption is very fast. Encryption of this encryption software belongs to the real encryption, rather than the simple hidden file. It can use files (such as a song in your computer) as a password, so that no one can decipher your encrypted files. Even if your computer is lost you are very relieved, because no one can crack them. At the same time it is stable, just want you to remember the password, and remember what the file as the password will not appear a lot of non-met factors caused by oneself also cannot open. (Many encryption software encrypted files end users themselves will not be able to open these files, but not because of the forgotten password, but other factors that can not be met, such as accidentally reloading the system, software failure, etc.). This software is TrueCrypt.

Take a look at the diagram below and you'll see how it works in general.

As shown in Figure I. With this software you can create a "file Vault" of a specified size (please allow me to call it) in one place on your computer (e-drive, for example). When you open the E-disk, this file safe just is displayed as an ordinary file (such as a 5G seven.rmvb movie file in the picture, of course, you can give him any name and remainders are extension), but you cannot open him directly, because this just is his appearance of the hidden ornaments (figure II). You can think of it as a 5G size (size can also be set yourself) file safe. Need to open it with this TrueCrypt software. The encryption software can load this file vault into my computer and turn it into a drive letter, such as a J drive. You can then access the other disk (C, D, etc.) and put the file inside it. Once this file is closed in this software vault (also set for a certain time without access to it will automatically close), you cannot access this file vault file. You can think of this truecrypt encryption software as the gateway to the cryptographic vault it generates. Just has passed this software and knows the password before you can view the files in the vault.

Perhaps you have to ask, if you do not have this encryption software will not open this safe? Yes, just want you to remember the password of the safe, you can easily go to the Internet to download a TrueCrypt software to open it. Perhaps you ask, this safe becomes a file, others really can't open, if others also accidentally deleted what to do, because become a file, it is easy to be mistakenly deleted ah. Yes, I'll explain later if the place was mistakenly deleted. You may also ask, others can not open, directly to you the entire safe copy walk slowly study how to do? I tell you, if you set the password is not too simple to crack. Even the person who wrote the software couldn't hack it. If you combine the file as a password, it's impossible to decipher it at all.

Ok. Look at the above figure one, you should know the general situation. So now we have a clear idea of how to explain. Divided into several sections to explain.

The first part: How to get this software;

Part II: How to generate a file safe;

The third part: How to open the safe and how to put files;

Part IV: How to prevent being mistakenly deleted;

Part V: some precautions.

Do not look at so many parts, follow my explanation, you will find in fact very simple. I'm sure you'll like this software.

The first part: How to get this software

Software Total 1.33M. Green software. It can be used directly by unpacking. Support Win7, Vista, XP. Win7 encrypted files can be decrypted under XP (many encryption software will not cross the operating system). Encrypted files can be separated from the operating system. Do not worry about reloading the system will not open the previous encrypted files. Other more advantages are not mentioned here. You have to understand.

As shown in Figure three. The TrueCrypt.exe file is the main program file.

Part II: How to generate a file vault

Using this software to encrypt files is to generate a certain size of the file vault. This file safe can be your own name, such as Jutting "safe. RM", you can also jutting "Safe.iso", the name you can take any. You can put this safe in any place, of course, it is not recommended to put on the system disk C, because the reload system will be formatted to cause your file to be lost. Of course, the establishment is also able to move it, because in appearance, he just is an ordinary document.

Here we will create a file safe bar: 1, open the Software folder inside the TrueCrypt.exe, this is the main program file of this program, we will use it repeatedly, you can create a desktop shortcut to it for our convenience to open it. As shown in Figure five.

In the program window that opens, select the menu "Encrypt volume" to "create an encrypted volume." (In the software, the file vault I said earlier jutting "encrypted volume". I think the paper safe is easier to understand. So I call it "file safe". But to get used to the software, you need to know what the so-called encryption volume is in the software. ) as shown in Figure six.

Then click Next twice in succession (as the default settings for the software are available).

The following figure nine is to be noted. Ask about the location of the encrypted volume you are about to generate (that is, the file vault to be generated). Click "Select File" in the back and locate the folder where you want to place the file vault. Then, in the location below the file name, write the name of the vault you want to generate for your files. I'll take a name here. Jutting "file safe. rar", you can name the and remainders are extension arbitrarily. Note: The button text in the window is "Select File", so you are likely to open my computer to select a file, actually the software itself is a problem in translation, actually let yourself find a place, and then create a new file. So you don't have to click in the folder to select a file, and that file will be replaced by the generated file. You should write yourself a file name that is not in a folder.

Next, Figure 10 lets you choose the encryption algorithm. Just click Next to do it. You do not need to select another algorithm. This is safe enough.

This step asks you how much this encrypted volume (file vault) should be set. You should pay attention to select the rear unit. I choose to generate a 1G safe here. Then click Next.

Note: Many encryption software is to encrypt files directly, how large the file is to generate roughly how much encrypted file. But this software is mister into an empty encrypted file safe. Size requires you to set it up first. At first you may feel like this is a waste of space, time is long you will love this way. How big is the size setting? That depends on what you need to put into it. But now the hard disk is very big, set a little bit, so the encrypted file is relatively not easy to be copied away, right?

This step lets you set the password for the encrypted volume (file vault), as shown in Figure 12.

You can just is to set a simple password. You can also check the "Use key file" below and select a file inside the computer as the password. This is a very special place for this software. If you choose the file as the password, your file vault is basically no one can crack. To the principle of using the file as a password, I have shown in Figure 13. After selecting the file key, click OK and click Next. Note that using the file as the password just is optional, not the one you have to choose. You can use regular just such as 123SASW as the password. If you select the file as the password at the same time. Then the type of the file is very fastidious oh. In the final note of the article I will explain in detail what type of file to use as the key file.

This step asks you what file system you want to use for this file vault. Here is not the details of the explanation, all choose NTFS bar. Then click "Format". As shown in Figure 14. Many people see formatting options as scary and afraid of losing files in their computers. In fact, from the front we pointed out to establish a 1G encryption volume (file safe), then this 1G of space from the hard disk, but how to use this 1G of space, the software requires that the 1G of space first in accordance with the format of the software required to encrypt the format before it can be used. So even if you click on it, there's no problem. The formatting process is shown in Figure 15.

Once the format is complete, the encrypted volume is created. Click Exit. As shown in Figure 16.

You need to be careful here. Don't click on the next step here. I started using this software when I saw "next" has been clicked, the results can never click the end.

OK, the encryption box is generated, it looks like a normal file, you can cut it anywhere on your hard drive. As shown in Figure 17. You must think again how to open it. The software that plays the movie directly is not able to open it oh. How to open it, and how to put the file in the next part of our explanation.

Part III: How to open the safe and how to put the file

Opens the program file TrueCrypt.exe. If your program window is already open, you do not need to perform this step.

This step is key. After the program interface opens. This interface is the gateway to the file vault. Load the vault in the same way as shown in Figure 19. After loading, the safe will be displayed as a drive letter. For example, I chose the J-disk letter. You can open the J disk like the D-disk, E-drive, and import into its interior. (Note that you must first select a drive letter Oh.) The selected drive letter is the drive letter shown in the back of this safe.

Figure 102, after clicking Load, asks you to enter the password. If you use a file as a key file, you will need to select your key file, as shown in Figure 20.

Once you click OK, the safe is loaded. Figure 21 is what it looks like after it's loaded. You can see the "My Computer" inside a more than a J disk. The size of 1023MB can be displayed in the TrueCrypt Software (yellow highlighted section).

Let's Open the J-plate and import into the safe. Of course it's empty. We try to copy a file import go. As shown in Figure 22. Speed 31.8mb/seconds. It's a pretty good speed. You know, the file just to store import to the entire encryption oh. The same file just to be copied from the inside to complete the decryption operation at the same time. So the encryption and decryption speed of this software is very fast.

When you put the file in this safe, you want to close it, just need to click on the software under the uninstall also all uninstall, you can withdraw it from the disk.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.