Feeds

Getting started with TrueCrypt

Turn your generic Flash drive into a secure data store

Gartner critical capabilities for enterprise endpoint backup

The Filesystem screen gives you the choice of FAT and Mac OS Extended. When TrueCrypt opens the encrypted file, it will present it to the host OS as volume. The OS has to be able to read that volume to show the contents, so choose your filesystem accordingly: FAT if it's to be read on different platforms, Mac OS Extended if you're only ever going to want to view the encrypted store's contents on a Mac. The Linux version offers a choice of FAT, Ext2 or Ext3.

TrueCrypt

TrueCrypt uses the mouse to help generate a block of numbers which it can use to create the encryption keys for your volume. It'll generate them anyway, but jiggling the mouse around creates blocks of numbers that are closer to truly random than the computer itself can come up with. The longer you can jiggle the better, but when you've had enough, click Format:

TrueCrypt

TrueCrypt will create the cipher keys from the random number block and use them to format the virtual volume and encrypt it. When the volume's created, click on the Exit button.

If you stored the file on your computer you can now copy it onto a Flash drive and get rid of the original. To open it up and add files, select one of the available drive slots in the main TrueCrypt window then click the Select File... button to find the file you just created.

Click Mount and you'll be prompted for the password. Entering it correctly will result in the virtual drive being 'connected' to your computer, allowing you to drag and drop files into it:

TrueCrypt

When you're done, click the Dismount All button in TrueCrypt to 'eject' the virtual disk, with its contents now sealed against almost all of the folk likely to come across the host drive. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.