Feeds

Getting started with TrueCrypt

Turn your generic Flash drive into a secure data store

Top 5 reasons to deploy VMware with Tegile

The Filesystem screen gives you the choice of FAT and Mac OS Extended. When TrueCrypt opens the encrypted file, it will present it to the host OS as volume. The OS has to be able to read that volume to show the contents, so choose your filesystem accordingly: FAT if it's to be read on different platforms, Mac OS Extended if you're only ever going to want to view the encrypted store's contents on a Mac. The Linux version offers a choice of FAT, Ext2 or Ext3.

TrueCrypt

TrueCrypt uses the mouse to help generate a block of numbers which it can use to create the encryption keys for your volume. It'll generate them anyway, but jiggling the mouse around creates blocks of numbers that are closer to truly random than the computer itself can come up with. The longer you can jiggle the better, but when you've had enough, click Format:

TrueCrypt

TrueCrypt will create the cipher keys from the random number block and use them to format the virtual volume and encrypt it. When the volume's created, click on the Exit button.

If you stored the file on your computer you can now copy it onto a Flash drive and get rid of the original. To open it up and add files, select one of the available drive slots in the main TrueCrypt window then click the Select File... button to find the file you just created.

Click Mount and you'll be prompted for the password. Entering it correctly will result in the virtual drive being 'connected' to your computer, allowing you to drag and drop files into it:

TrueCrypt

When you're done, click the Dismount All button in TrueCrypt to 'eject' the virtual disk, with its contents now sealed against almost all of the folk likely to come across the host drive. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.