Version Information



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə130/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   122   123   124   125   126   127   128   129   130
TrueCrypt User Guide

Document Outline

  • TRUECRYPT
  • CONTENTS
  • Introduction
  • Beginner’s Tutorial
    • How to Create and Use a TrueCrypt Container
  • The TrueCrypt Volume Creation Wizard window should appear.
  • In this step you need to choose where you wish the TrueCrypt volume to be created. A TrueCrypt volume can reside in a file, which is also called container, in a partition or drive. In this tutorial, we will choose the first option and create a TrueCry...
  • As the option is selected by default, you can just click Next.
  • Note: In the following steps, the screenshots will show only the right-hand part of the Wizard window.
  • As the option is selected by default, you can just click Next.
  • Click Select File.
  • The file selector window should disappear.
  • In the following steps, we will return to the TrueCrypt Volume Creation Wizard.
  • In the Volume Creation Wizard window, click Next.
  • Click Select File.
  • In the file selector, browse to the container file (which we created in Steps 6-11) and select it.
  • Click Open (in the file selector window).
  • The file selector window should disappear.
  • In the main TrueCrypt window, click Mount.
  • Password prompt dialog window should appear.
  • Click OK in the password prompt window.
    • How to Create and Use a TrueCrypt-Encrypted Partition/Device
  • TrueCrypt Volume
    • Creating a New TrueCrypt Volume
      • Hash Algorithm
      • Encryption Algorithm
      • Quick Format
      • Dynamic
      • Cluster Size
      • TrueCrypt Volumes on CDs and DVDs
      • Hardware/Software RAID, Windows Dynamic Volumes
      • Additional Notes on Volume Creation
    • Favorite Volumes
    • System Favorite Volumes
  • System Encryption
    • Hidden Operating System
    • Operating Systems Supported for System Encryption
    • TrueCrypt Rescue Disk
  • Plausible Deniability
    • Hidden Volume
  • The layout of a standard TrueCrypt volume before and after a hidden volume was created within it.
    • Protection of Hidden Volumes Against Damage
    • Security Requirements and Precautions Pertaining to Hidden Volumes
    • Hidden Operating System
  • Example Layout of System Drive Containing Hidden Operating System
    • Process of Creation of Hidden Operating System
    • Plausible Deniability and Data Leak Protection
    • Possible Explanations for Existence of Two TrueCrypt Partitions on Single Drive
    • Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems
  • Main Program Window
    • Select File
    • Select Device
    • Mount
    • Auto-Mount Devices
    • Dismount
    • Dismount All
    • Wipe Cache
    • Never Save History
    • Exit
    • Volume Tools
  • Change Volume Password
  • See the section Volumes -> Change Volume Password.
  • Set Header Key Derivation Algorithm
  • See the section Volumes -> Set Header Key Derivation Algorithm.
  • Backup Volume Header
  • See the section Tools -> Backup Volume Header.
  • Restore Volume Header
  • See the section Tools -> Restore Volume Header.
    • Program Menu
  • Note: To save space, only the menu items that are not self-explanatory are described in this documentation.
    • Volumes -> Auto-Mount All Device-Hosted Volumes
  • See the section Auto-Mount Devices.
    • Volumes -> Dismount All Mounted Volumes
  • See the section Dismount All.
    • Volumes -> Change Volume Password
    • Volumes -> Set Header Key Derivation Algorithm
    • Volumes -> Add/Remove Keyfiles to/from Volume
    • Volumes -> Remove All Keyfiles from Volume
  • See the chapter Keyfiles.
    • Favorites -> Add Mounted Volume to Favorites
    • Favorites -> Organize Favorite Volumes
    • Favorites -> Mount Favorites Volumes
    • Favorites -> Add Mounted Volume to System Favorites
    • Favorites -> Organize System Favorite Volumes
    • System -> Change Password
    • System -> Mount Without Pre-Boot Authentication
    • Tools -> Clear Volume History
    • Tools -> Traveler Disk Setup
    • Tools -> Keyfile Generator
  • See section Tools -> Keyfile Generator in the chapter Keyfiles.
    • Tools -> Backup Volume Header
    • Tools -> Restore Volume Header
    • Settings -> Preferences
  • Cache passwords in driver memory
  • Open Explorer window for successfully mounted volume
    • Mounting TrueCrypt Volumes
      • Cache Password in Driver Memory
      • Mount Options
  • Mount volume as read-only
  • Mount volume as removable medium
  • Use backup header embedded in volume if available
  • Mount partition using system encryption without pre-boot authentication
  • Check this option, if you need to mount a partition that is within the key scope of system encryption without pre-boot authentication. For example, if you need to mount a partition located on the encrypted system drive of another operating system that...
  • Hidden Volume Protection
  • Parallelization
  • Pipelining
  • Hardware Acceleration
  • Hot Keys
  • Keyfiles
    • Keyfiles Dialog Window
    • Security Tokens and Smart Cards
    • Keyfile Search Path
    • Empty Password & Keyfile
    • Quick Selection
    • Volumes -> Add/Remove Keyfiles to/from Volume
    • Volumes -> Remove All Keyfiles from Volume
    • Tools -> Keyfile Generator
    • Settings -> Default Keyfiles
  • Security Tokens & Smart Cards
  • Portable Mode
    • Tools -> Traveler Disk Setup
  • Language Packs
    • Installation
  • To revert to English, select Settings -> Language. Then select English and click OK.
  • Encryption Algorithms
    • AES
    • Serpent
    • Twofish
    • AES-Twofish
    • AES-Twofish-Serpent
    • Serpent-AES
    • Serpent-Twofish-AES
    • Twofish-Serpent
  • Hash Algorithms
    • RIPEMD-160
    • SHA-512
    • Whirlpool
  • Supported Operating Systems
    • Syntax
    • Examples
  • Security Model
  • Security Requirements and Precautions
    • Data Leaks
      • Paging File
      • Memory Dump Files
      • Hibernation File
    • Unencrypted Data in RAM
    • Physical Security
    • Malware
    • Multi-User Environment
    • Authenticity and Integrity
    • Choosing Passwords and Keyfiles
    • Changing Passwords and Keyfiles
    • Trim Operation
    • Wear-Leveling
    • Reallocated Sectors
    • Defragmenting
    • Journaling File Systems
    • Volume Clones
    • Additional Security Requirements and Precautions
  • How to Back Up Securely
    • Non-System Volumes
    • System Partitions
    • General Notes
  • Miscellaneous
    • Using TrueCrypt Without Administrator Privileges
    • Sharing over Network
    • TrueCrypt Background Task
    • Volume Mounted as Removable Medium
    • TrueCrypt System Files & Application Data
  • Favorite Volumes.xml
    • How to Remove Encryption
    • Uninstalling TrueCrypt
    • Digital Signatures
  • Troubleshooting
  • Incompatibilities
  • You may keep the third-party software activated but you will need to boot your system from the TrueCrypt Rescue Disk CD/DVD every time. Just insert your Rescue Disk into your CD/DVD drive and then enter your password in the Rescue Disk screen.
  • If you do not want to boot your system from the TrueCrypt Rescue Disk CD/DVD every time, you can restore the TrueCrypt Boot Loader on the system drive. To do so, in the Rescue Disk screen, select Repair Options > Restore TrueCrypt Boot Loader. However...
  • For information on how to use your TrueCrypt Rescue Disk, please see the chapter TrueCrypt Rescue Disk.
  • Possible permanent solution: Upgrade to TrueCrypt 5.1 or later, decrypt the system partition/drive, and then re-encrypt it using a non-cascade encryption algorithm (i.e., AES, Serpent, or Twofish).* Please note that this not a bug in TrueCrypt (the ...
  • Known Issues & Limitations
    • Known Issues
    • Limitations
  • Frequently Asked Questions
  • I forgot my password – is there any way (‘backdoor’) to recover the files from my TrueCrypt volume?
  • Is there a "Quick Start Guide" or some tutorial for beginners?
  • Will TrueCrypt be open-source and free forever?
  • Can I configure TrueCrypt to mount automatically whenever Windows starts a non-system TrueCrypt volume that uses the same password as my system partition/drive (i.e. my pre-boot authentication password)?
  • Yes. To do so, follow these steps:
  • Mount the volume (to the drive letter to which you want it to be mounted every time).
  • Right-click the mounted volume in the drive list in the main TrueCrypt window and select ‘Add to System Favorites’.
  • The System Favorites Organizer window should appear now. In this window, enable the option ‘Mount system favorite volumes when Windows starts’ and click OK.
  • For more information, see the chapter ‘System Favorite Volumes’.
  • Can a volume be automatically mounted whenever I log on to Windows?
  • Can my pre-boot authentication password be cached so that I can use it mount non-system volumes during the session?
  • Yes. Select ‘Settings’ > ‘System Encryption’ and enable the following option: ‘Cache pre-boot authentication password in driver memory’.
  • Can I encrypt my system partition/drive if I don’t have a US keyboard?
  • Yes, TrueCrypt supports all keyboard layouts.
  • Can I save data to the decoy system partition without risking damage to the hidden system partition?
  • Yes. You can write data to the decoy system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is not installed within the same partition as the hidden system). For more information, see the section Hi...
  • Can I use TrueCrypt in Windows if I do not have administrator privileges?
  • Does TrueCrypt save my password to a disk?
  • How does TrueCrypt verify that the correct password was entered?
  • See the chapter Technical Details, section Encryption Scheme.
  • Can I run TrueCrypt if I don’t install it?
  • Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?
  • No. Those programs use TPM to protect against attacks that require the attacker to have administrator privileges, or physical access to the computer, and the attacker needs you to use the computer after such an access. However, if any of these conditi...
  • If the attacker has administrator privileges, he can, for example, reset the TPM, capture the content of RAM (containing master keys) or content of files stored on mounted TrueCrypt volumes (decrypted on the fly), which can then be sent to the attacke...
  • If the attacker can physically access the computer hardware (and you use it after such an access), he can, for example, attach a malicious component to it (such as a hardware keystroke logger) that will capture the password, the content of RAM (contai...
  • The only thing that TPM is almost guaranteed to provide is a false sense of security (even the name itself, “Trusted Platform Module”, is misleading and creates a false sense of security). As for real security, TPM is actually redundant (and implement...
  • For more information, please see the sections Physical Security and Malware.
  • Why does Windows Vista (and later versions of Windows) ask me for permission to run TrueCrypt every time I run it in ‘portable’ mode?
  • Do I have to dismount TrueCrypt volumes before shutting down or restarting Windows?
  • No. TrueCrypt automatically dismounts all mounted TrueCrypt volumes on system shutdown/restart.
  • Which type of TrueCrypt volume is better – partition or file container?
  • What’s the recommended way to back up a TrueCrypt volume?
  • See the chapter How to Back Up Securely.
  • What will happen if I format a TrueCrypt partition?
  • See the question “Is it possible to change the file system of an encrypted volume?” in this FAQ.
  • Is it possible to change the file system of an encrypted volume?
  • Is it possible to mount a TrueCrypt container that is stored on a CD or DVD?
  • Is it possible to change the password for a hidden volume?
  • Can I mount my TrueCrypt volume under Windows, Mac OS X, and Linux?
  • Yes, TrueCrypt volumes are fully cross-platform.
  • Yes.
  • What will happen when a part of a TrueCrypt volume becomes corrupted?
  • Technical Details
    • Notation
    • Encryption Scheme
    • Modes of Operation
    • Header Key Derivation, Salt, and Iteration Count
    • Random Number Generator
    • Keyfiles
    • TrueCrypt Volume Format Specification
    • Compliance with Standards and Specifications
    • Source Code
  • Future Development
  • Contact
  • Legal Information
  • License
  • Copyright Information
  • For more information, please see the legal notices attached to parts of the source code.
  • Version History
  • Acknowledgements
  • Mark Adler et al., who wrote the Inflate routine.
  • References

Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   122   123   124   125   126   127   128   129   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin