Version Information



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə110/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   106   107   108   109   110   111   112   113   ...   130
TrueCrypt User Guide

I2P

Tor
, or a similar anonymizing network. 
 
3. Verify the digital signatures of the downloaded file (see the sectimore information). 
 


128 
4. Run the downloaded file, and select 
Extract
 (instead of 
Install
) on the second page of the 
TrueCrypt Setup wizard. Extract the contents to the RAM disk. 
 
5. Run the file 
TrueCrypt.exe
 from the RAM disk.
 
Note: You may also want to consider creating a hidden operating system (see the section 
Hidden 
Operating System
). See also the chapter 
Plausible Deniability

 
 
Can I encrypt my system partition/drive if I don’t have a US keyboard? 
 
Yes, TrueCrypt supports all keyboard layouts. 
 
 
Can I save data to the decoy system partition without risking damage to the hidden system 
partition? 
Yes. You can write data to the decoy system partition anytime without any risk that the hidden 
volume will get damaged (because the decoy system is 
not
 installed within the same partition as 
the hidden system). For more information, see the section 
Hidden Operating System
.
 
 
Can I use TrueCrypt in Windows if I do not have administrator privileges? 
 
See the chapter ‘
Using TrueCrypt Without Administrator Privileges
‘. 
Does TrueCrypt save my password to a disk?
No.
 
 
How does TrueCrypt verify that the correct password was entered?
 
See the chapter 
Technical Details
, section 
Encryption Scheme


Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   106   107   108   109   110   111   112   113   ...   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin