53
If all the instructions in the wizard have been followed and if the security requirements and
precautions listed in the subsection
Security Requirements and Precautions Pertaining to Hidden
Volumes
are followed, it should be impossible to prove that the
hidden volume and hidden
operating system exist, even when the outer volume is mounted or when the decoy operating
system is decrypted or started.
54
Main Program Window
Select File
Allows you to select a file-hosted TrueCrypt volume.
After you select it, you can perform various
operations on it (e.g., mount it by clicking ‘Mount’). It is also possible to select a volume by
dragging its icon to the ‘TrueCrypt.exe’ icon (TrueCrypt will be automatically launched then) or to
the main program window.
Select Device
Allows you to select a TrueCrypt partition or a storage device (such as a USB memory stick). After
it
is selected, you can perform various operations with it (e.g., mount it by clicking ‘Mount’).
Note: There is a more comfortable way of mounting TrueCrypt partitions/devices – see the section
Auto-Mount Devices
for more information.
Mount
After you click ‘Mount’, TrueCrypt will try to mount the selected volume using cached passwords (if
there are any) and if none of them works, it prompts you for a password.
If you enter the correct
password (and/or provide correct keyfiles), the volume will be mounted.
Important: Note that when you exit the TrueCrypt application, the TrueCrypt driver continues
working and no TrueCrypt volume is dismounted.
Dostları ilə paylaş: