Version Information


Mount volume as read-only



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə48/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   44   45   46   47   48   49   50   51   ...   130
TrueCrypt User Guide

Mount volume as read-only 
 
When checked, it will not be possible to write any data to the mounted volume.
Mount volume as removable medium
See section 
Volume Mounted as Removable Medium

Use backup header embedded in volume if available
All volumes created by TrueCrypt 6.0 or later contain an embedded backup header (located at the 
end of the volume). If you check this option, TrueCrypt will attempt to mount the volume using the 
embedded backup header. Note that if the volume header is damaged, you do not have to use this 
option. Instead, you can repair the header by selecting 
Tools

Restore Volume Header
.
 
Mount partition using system encryption without pre-boot authentication
Check this option, if you need to mount a partition that is within the key scope of system encryption 
without pre-boot authentication. For example, if you need to mount a partition located on the 
encrypted system drive of another operating system that is not running. This can be useful e.g. 
when you need to back up or repair an operating system encrypted by TrueCrypt (from within 
another operating system). Note that this option can be enabled also when using the ‘
Auto-Mount 
Devices
’ or ‘
Auto-Mount All Device-Hosted Volumes
’ functions. 
Hidden Volume Protection 
Please see the section 
Protection of Hidden Volumes Against Damage



63 
Parallelization 
When your computer has a multi-core processor (or multiple processors), TrueCrypt uses all of the 
cores (or processors) in parallel for encryption and decryption. For example, when TrueCrypt is to 
decrypt a chunk of data, it first splits the chunk into several smaller pieces. The number of the 
pieces is equal to the number of the cores (or processors). Then, all of the pieces are decrypted in 
parallel (piece 1 is decrypted by thread 1, piece 2 is decrypted by thread 2, etc). The same method 
is used for encryption. 
So if your computer has, for example, a quad-core processor, then encryption and decryption are 
four times faster than on a single-core processor with equivalent specifications (likewise, they are 
twice faster on dual-core processors, etc). 
Increase in encryption/decryption speed is directly proportional to the number of cores and/or 
processors. 
Note: Processors with the Hyper-Threading technology provide multiple logical cores per one 
physical core (or multiple logical processors per one physical processor). When Hyper Threading is 
enabled in the computer firmware (e.g. BIOS) settings, TrueCrypt creates one thread for each 
logical core/processor. For example, on a 6-core processor that provides two logical cores per one 
physical core, TrueCrypt uses 12 threads. 
When your computer has a multi-core processor/CPU (or multiple processors/CPUs), header key 
derivation is parallelized too. As a result, mounting of a volume is several times faster on a multi-
core processor (or multi-processor computer) than on a single-core processor (or a single-
processor computer) with equivalent specifications. 
Note: Parallelization was introduced in TrueCrypt 6.0. 

Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   44   45   46   47   48   49   50   51   ...   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin