How to Encrypt Your Hard Drive with Truecrypt
If you want no one to see that what you have saved on your hard drive/computer then we have a smart way for you to save your precious data from the prying eyes. The best such system for this is often called “TrueCrypt”. Further, this file is encrypted and nobody can actually see what you’ve got saved there unless they know your password.
This sounds extremely high tech, but it’s actually very easy to line up.
Table of Contents
Setting Up Truecrypt
- Attend www.truecrypt.org, and click on “Downloads”.
2. Under “Latest Stable Version”, under “Windows 7/Vista/XP/2000?, click “Download”.
3. The file is going to be called “TrueCrypt Setup 7.0a.exe” or something similar. Run this file.4. If prompted that a program needs your permission to continue, click “Continue”.
5. Accept the terms and conditions and press Next to continue.
6. Click “No” when asked if you would like to look at the tutorial/user’s guide.
7. Click “Finish”. At this moment, TrueCrypt is now installed.
Using TrueCrypt To Store Sensitive Information
Now we’ll find out TrueCrypt in order that we will begin using it to store sensitive information.
- Click the “Windows Logo”/”Start” button on the lower-left corner of your screen.
2. Click “All Programs”
3. Click “TrueCrypt”.
4. Click the “TrueCrypt” application.
Head to our Tutorials section under https://darkweblink.com/blog for more related dark web link reads.
And Now We Will Begin
- Click the button “Create Volume”
2. Ensuring that “Create an encrypted file container” is chosen, click “Next”.
3. Ensuring that “Standared mode” is chosen, click “Next”.
4. Click on “Select File”.
Note: Which directory you’re in on your computer. Check out the highest of the dialog that has opened and you’ll see the trail you’re in, presumably the house directory for your username. An input box is given a flashing cursor asking you to type during a file name. Here, you’ll type within the following filename: as random.txt, you may, in fact, replace random.txt with anything you wish. This file goes to be created and can be wont to store many other files inside. We do not recommend to use the filename for a file that already exists. the thought here is that you simply are creating a completely new file.
5.It is also recommended though not required that you simply “hide” this file somewhere less obvious. If it’s in your home directory, then someone who has access to your computer may find it easier. you’ll also prefer to put this file on the other media, it doesn’t need to be your hard disc. You’ll, for instance, save your TrueCrypt file to a USB flash drive, an sd card, or another media. It’s up to you.
6. Once you’ve got typed within the file name, click “Save”.
7. Confirm “Never save history” is checked.
8. Click “Next”.
9. The default Encryption Algorithm and Hash Algorithm are fine. Click “Next”.
10. Choose a file size.
In order to profit the foremost from this guide, you ought to have a minimum of 10 gigabytes of free disc space. If not, then it’s worthwhile for you to get some sort of media (such as a removable hard drive, an outsized sd card, etc.) so as to proceed. TrueCrypt is often used on all sorts of digital media not just your hard disc. If you select to proceed without obtaining a minimum of ten gigabytes of disc space, then select a size that you simply are comfortable with (such as 100 MB).
Ideally, you would like to settle on enough space to figure with. We like to recommend 20 GB a minimum. Remember that if you are doing it later, you’ll need more room later and that you’ll always create additional TrueCrypt volumes using exactly these same steps.
11. Now you’re prompted for a password. This is often vital.
The password you select here may be a weak password. This implies, meaning, this is often the password you’d give to someone under duress. Suppose that somebody suspects that you simply were accessing sensitive information and that they threaten to beat you or worse if you are doing not reveal the password. This is often the password that you simply give to them. Further, they can’t even know that there’s a second password.
Here are some tips for your password:
- Choose a password you’ll always remember. it’s going to be ten years from now that you simply need it. Make it simple, like your birthday repeated 3 times.
- Confirm it seems reasonable, that it appears to be a true password. If the password is something stupid like “123? then they’ll not believe you.
- Remember that this is often a password that you simply would give to someone if forced. it’s *NOT* your actual password.
- Don’t make this password too almost like what you propose to actually use. you are doing not want someone to guess your main password from this one. Even once you have typed it in twice, click “Next”.fter all this remember you need to choose your password wisely.
12. “Large Files”, where you’re asked whether or not you propose to store files larger than 4 GIGABYTES. Choose “No” and click on “Next”.
13. “Outer Volume Format”, here you’ll notice some random numbers and letters next to where it says “Random Pool”. plow ahead and move your mouse around for a bit. This may increase the randomness and provides you better encryption. After about ten seconds of this, click “Format”.
14. Counting on the file size you chose, it’ll take a while to end formatting.
“What is happening?”
15. Click the button “external volume”.
An empty folder has opened. This is often empty because you’ve got yet to place any files into your TrueCrypt volume.
This is the “Decoy”. This is often what someone would see if you gave them the password you utilized in the previous step. this is often NOT where you’re getting to store your sensitive data. If you’ve got been forced into a situation where you had to reveal your password to some individual, then that individual will see whatever is during this folder, you would like to possess data during this folder that appears to be sensitive enough to be protected by TrueCrypt so as to fool them. Now, move ahead and find files and store them during this folder. make certain that you simply leave a minimum of ten gigabytes free. The more the higher.
When you are all done copying files into this folder, close the folder by clicking the “x” within the top right corner.
16. click “Next”.
17. If prompted that “A program needs your permission to continue”, click “Continue”.
18. “Hidden Volume”, click “Next”.
19. “Hidden Volume Size”, the utmost available space is indicated in bold below the text box. round off to the closest full unit. for instance, if 19.97 GB
is available, select 19 GB. If 12.0 GB are available, select 11 GB.
20. “Hidden Volume Password”.
Volume Passwords Guidelines
Here you’re getting to select the important password. This is often the password you’ll NEVER divulge to ANYONE else under any circumstances. Only you’ll realize it. Nobody is going to be ready to figure it out or maybe know that there’s a second password. Remember that a private bent obtaining your sensitive information may mislead you and claim to be ready to figure this out. they can’t.
It is HIGHLY recommended that you simply choose a 64 character password here. If it’s difficult to recollect a 64 character password, choose an 8 character password and easily repeat it 8 times. A date naturally has exactly 8 numbers, and big data in your life repeated 8 times would do exactly fine.
21. Now you need to type in your password twice, and click on “Next”, then click ok.
22. Click “Exit”.
Now, you’ve got just found out an encrypted file container on your disk drive. Anything you store here is going to be inaccessible to anyone except you.
Testing TrueCrypt Volumes
Once you’ve got completed the above section, you’ll be back at TrueCrypt. Plow ahead and follow these steps to check the volumes you’ve got made.
1. Click “Select File…”
2. Locate the file you created within the last section, presumably called “random.txt” or something similar. Remember that albeit there’s both an outer and
a hidden volume, both volumes are contained during a file. There aren’t two files, only one.
3. Click “Open”
4. Choose a drive letter that you simply aren’t using (anything past M is perhaps just fine). Click thereon, for instance, click on “O:” to spotlight it.
5. Click “Mount”
6. Now you’re prompted for a password. Read the below carefully:
If you type in your decoy password, then O:\ will show all the files and directories you copied that you simply would reveal if forced.
7. After successfully typing in your password, you’ll see additional detail to the proper of the drive letter, including the complete path to the file you chose also because of the quite volume is (for example, hidden).
8. Right-click on your “Windows Logo”/”Start Menu” icon, and scroll right down to rock bottom where you’ll see your different drive letters. you’ll see the drive letter you chose, for example: “Local Disk (O:)”. Click thereon.
If you chose your hidden volume password, you’ll now begin moving any sensitive information you would like . remember that simply moving it from your main hard disc isn’t enough. we’ll discuss the way to ensure deleted data is really deleted later within the guide.
“What is happening?”
When you select a file and mount it to a drive, you’re telling your computer that you simply have a replacement drive with files and folders thereon. It’s an equivalent thing as if you had plugged during a USB flash drive, a removable hard drive, or an sd card into your computer. When you are done, simply close all open windows/folders/applications that are using your TrueCrypt drive letter, then click “Dismount” from within TrueCrypt while you’ve got the drive letter highlighted. this may once more hide all of this data, accessible only by re-mounting it with the right password.
If for instance, you left your computer running while a TrueCrypt volume was mounted, then if someone gained access to your computer they might be ready to see everything you’ve got there in volume. You can tell that it’s dismounted because the drive letter inside the “TrueCrypt’s” instrument panel will appear an equivalent as all of the opposite drive letters, with no information to the proper of the drive letter.
You should practice Mounting and Dismounting a couple of times with both passwords to form sure you understand this process. Once you’ve got copied files/folders into the hidden volume, don’t touch the files or folders within the outer volume anymore. Remember that both volumes occupy an equivalent file, and thus changing the outer volume can damage the hidden volume. Once you’ve got copied files/folders into the outer volume during the installation process, that’s the last time you ought to do so. From that time forward, use ONLY the hidden volume. The outer volume exists only as a decoy if you would like it.
- Tutorial For Implementing PGP In Linux OS
- How To Search Popular Hacker Forums On The Dark Web
- How to Host Hidden Services on ToR Using Whonix?
- How To Set Up And Install Exodus In Linux Operating System?
Disclaimer: Read the complete disclaimer here.