Version Information


Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə40/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   36   37   38   39   40   41   42   43   ...   130
TrueCrypt User Guide


partition (i.e. on the outer volume).
Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems 
 
As a hidden operating system resides in a hidden TrueCrypt volume, a user of a hidden operating 
system must follow all of the security requirements and precautions that apply to normal hidden 
TrueCrypt volumes. These requirements and precautions, as well as additional requirements and 
precautions pertaining specifically to hidden operating systems, are listed in the subsection 
Security Requirements and Precautions Pertaining to Hidden Volumes

WARNING: If you do not protect the hidden volume (for information on how to do so, refer to the 
section 
Protection of Hidden Volumes Against Damage
), do 
not
write to the outer volume (note that 
the decoy operating system is 
not
installed in the outer volume). Otherwise, you may overwrite and 
damage the hidden volume (and the hidden operating system within it)! 


53 
If all the instructions in the wizard have been followed and if the security requirements and 
precautions listed in the subsection 
Security Requirements and Precautions Pertaining to Hidden 
Volumes
 are followed, it should be impossible to prove that the hidden volume and hidden 
operating system exist, even when the outer volume is mounted or when the decoy operating 
system is decrypted or started. 


54 
Main Program Window 
Select File 
Allows you to select a file-hosted TrueCrypt volume. After you select it, you can perform various 
operations on it (e.g., mount it by clicking ‘Mount’). It is also possible to select a volume by 
dragging its icon to the ‘TrueCrypt.exe’ icon (TrueCrypt will be automatically launched then) or to 
the main program window. 
Select Device 
Allows you to select a TrueCrypt partition or a storage device (such as a USB memory stick). After 
it is selected, you can perform various operations with it (e.g., mount it by clicking ‘Mount’).
Note: There is a more comfortable way of mounting TrueCrypt partitions/devices – see the section 
Auto-Mount Devices
 for more information.
Mount 
After you click ‘Mount’, TrueCrypt will try to mount the selected volume using cached passwords (if 
there are any) and if none of them works, it prompts you for a password. If you enter the correct 
password (and/or provide correct keyfiles), the volume will be mounted. 
Important: Note that when you exit the TrueCrypt application, the TrueCrypt driver continues 
working and no TrueCrypt volume is dismounted. 

Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   36   37   38   39   40   41   42   43   ...   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin