Version Information



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə83/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   79   80   81   82   83   84   85   86   ...   130
TrueCrypt User Guide

Sharing over Network 
If there is a need to access a single TrueCrypt volume simultaneously from multiple operating 
systems, there are two options: 
1. A TrueCrypt volume is mounted only on a single computer (for example, on a server) and 
only the content of the mounted TrueCrypt volume (i.e., the file system within the TrueCrypt 
volume) is shared over a network. Users on other computers or systems will not mount the 
volume (it is already mounted on the server). 
Advantages
: All users can write data to the TrueCrypt volume. The shared volume may be 
both file-hosted and partition/device-hosted. 
Disadvantage
: Data sent over the network will not be encrypted. However, it is still 
possible to encrypt them using e.g. SSL, TLS, VPN, or other technologies. 
Remarks
: Note that, when you restart the system, the network share will be automatically 
restored only if the volume is a system favorite volume or an encrypted system 
partition/drive (for information on how to configure a volume as a system favorite volume
see the chapter 
System Favorite Volumes
). 
2. A dismounted TrueCrypt file container is stored on a single computer (for example, on a 
server). This encrypted file is shared over a network. Users on other computers or systems 
will locally mount the shared file. Thus, the volume will be mounted simultaneously under 
multiple operating systems.
Advantage
: Data sent over the network will be encrypted (however, it is still recommended 
to encrypt them using e.g. SSL, TLS, VPN, or other appropriate technologies to make traffic 
analysis more difficult and to preserve the integrity of the data). 
 
Disadvantages
: The shared volume may be only file-hosted (not partition/device-hosted). 
The volume must be mounted in read-only mode under each of the systems (see the 
section 
Mount Options
 for information on how to mount a volume in read-only mode). Note 
that this requirement applies to unencrypted volumes too. One of the reasons is, for 
example, the fact that data read from a conventional file system under one OS while the file 
system is being modified by another OS might be inconsistent (which could result in data 
corruption). 


101 

Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   79   80   81   82   83   84   85   86   ...   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin