Version Information



Yüklə 5,12 Kb.
Pdf görüntüsü
səhifə65/130
tarix07.01.2024
ölçüsü5,12 Kb.
#205371
1   ...   61   62   63   64   65   66   67   68   ...   130
TrueCrypt User Guide

Mac OS X
, a user without administrator privileges can (assuming the default TrueCrypt and 
operating system configurations): 

Mount any file-hosted or partition/device-hosted TrueCrypt volume provided that the 
file/device permissions allow it. 

Dismount, using TrueCrypt, (and, in the TrueCrypt application window, see the path to and 
properties of) any TrueCrypt volume mounted by him or her.

Create a file-hosted or partition/device-hosted TrueCrypt volume provided that the relevant 
folder/device permissions allow it. 

Change the password, keyfiles, and header key derivation algorithm for, and restore or 
back up the header of, a file-hosted or partition/device-hosted TrueCrypt volume (provided 
that the file/device permissions allow it). 

Access the filesystem residing within a TrueCrypt volume mounted by another user on the 
system (however, file/folder/volume permissions can be set to prevent this). 

Run and use the TrueCrypt application (including the TrueCrypt Volume Creation Wizard) 
provided that the file permissions allow it. 
TrueCrypt does not support the set-euid root mode of execution. 
Additional information and details regarding the security model are contained in the chapter 
Security Requirements and Precautions
.  


86 
Security Requirements and Precautions 
IMPORTANT
: If you want to use TrueCrypt, you must follow the security requirements and 
security precautions listed in this chapter. 
The sections in this chapter specify security requirements for using TrueCrypt and give information 
about things that adversely affect or limit the ability of TrueCrypt to secure data and to provide 
plausible deniability. Disclaimer: This chapter is not guaranteed to contain a list of 
all
security 
issues and attacks that might adversely affect or limit the ability of TrueCrypt to secure data and to 
provide plausible deniability. 

Yüklə 5,12 Kb.

Dostları ilə paylaş:
1   ...   61   62   63   64   65   66   67   68   ...   130




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin