Feeds

Getting started with TrueCrypt

Turn your generic Flash drive into a secure data store

Choosing a cloud hosting partner with confidence

The Filesystem screen gives you the choice of FAT and Mac OS Extended. When TrueCrypt opens the encrypted file, it will present it to the host OS as volume. The OS has to be able to read that volume to show the contents, so choose your filesystem accordingly: FAT if it's to be read on different platforms, Mac OS Extended if you're only ever going to want to view the encrypted store's contents on a Mac. The Linux version offers a choice of FAT, Ext2 or Ext3.

TrueCrypt

TrueCrypt uses the mouse to help generate a block of numbers which it can use to create the encryption keys for your volume. It'll generate them anyway, but jiggling the mouse around creates blocks of numbers that are closer to truly random than the computer itself can come up with. The longer you can jiggle the better, but when you've had enough, click Format:

TrueCrypt

TrueCrypt will create the cipher keys from the random number block and use them to format the virtual volume and encrypt it. When the volume's created, click on the Exit button.

If you stored the file on your computer you can now copy it onto a Flash drive and get rid of the original. To open it up and add files, select one of the available drive slots in the main TrueCrypt window then click the Select File... button to find the file you just created.

Click Mount and you'll be prompted for the password. Entering it correctly will result in the virtual drive being 'connected' to your computer, allowing you to drag and drop files into it:

TrueCrypt

When you're done, click the Dismount All button in TrueCrypt to 'eject' the virtual disk, with its contents now sealed against almost all of the folk likely to come across the host drive. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes
Latest bleeding-edge bits borrow Action Center from Windows Phone
Google opens Inbox – email for people too thick to handle email
Print this article out and give it to someone tech-y if you get stuck
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Entity Framework goes 'code first' as Microsoft pulls visual design tool
Visual Studio database diagramming's out the window
Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
Wobbly Gmail, Contacts, Calendar on the other hand ...
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.