TrueCrypt usage and tutorial

  
Today, Xiaobian introduces a software, encrypted software, the encryption of this encryption software belongs to the real encryption, rather than simply hiding the file. It can use a file (such as a song in your computer) as a password, so that no one can crack your encrypted file. Even if your computer is lost, you are very at ease, because no, everyone has a document that is good. So many encryption software online. Quite a lot of encryption software is not encrypted at all, so it is hidden. People who know a little can easily open it. In the future, we will show you how to open the files encrypted by the general encrypted files to tell everyone how insecure they are. With these software encryption, you are not at ease. Assuming that your computer is lost someday, you will be very uneasy because you are worried that others will illegally access your files. These encryption software does not satisfy the first condition. Not safe enough. Then there are some encryption software, although it is very safe, but the encryption speed is too slow. For example, our commonly used winrar compressed file is a good encryption software, but it takes half an hour to encrypt and compress a 1G file. The next time you open this encrypted file, it will take another half an hour. Can you bear it? Many encryption software that is really encrypted rather than taking a hidden approach is slow. These do not meet the second condition, that is, they are not convenient enough to open them. In addition, many people seek security, but at the same time, do you realize that you may not be able to open one day? Encrypted files are the most important files, and once you can't open them, it's harder! Many computers are safe and equipped with security chips, but you don't understand. One day you reloaded the system and your files won't open to you. This does not satisfy the third article. One day you may not be able to open your encrypted files and it will make you uneasy. Today's software has been tested, time proved that he is the safest, although it has stopped updating, and some people say it is not safe, but there is no evidence, the FBI can not crack the encryption software you deserve to have this software has many features, some encryption The software is encrypted, but all files cannot be decrypted after the next reload of the system, but this will not, it is green and does not depend on the operating system. Some software encrypts a file under XP, it can be decrypted under XP, but the file can not be used under Vista system, which can not be decrypted, but this will not, XP, Vista, win7 can be used, encrypted files even It can also be decrypted in Linux. Some encrypted files encrypt files slowly, but this encryption is very fast. The encryption of this encryption software is a true encryption, not a simple hidden file. It can use a file (such as a song in your computer) as a password, so that no one can crack your encrypted file. Even if your computer is lost, you are very comfortable, because no one can crack them. At the same time, it is very stable. If you want to remember the password, and remember what file is used as the password, there will be no unavoidable factors and you will not be able to open it. (Many encryption software encrypted files end users can not open these files themselves, but the reason is not because of forgetting the password, but other unreachable factors, such as accidentally reinstalling the system, software failure, etc.). This software is TrueCrypt. Take a look at the picture below and you can see how it works. As shown in Figure 1. With this software you can create a specified size <file safe" in one place on your computer (such as the E drive) (please allow me to call this). When you open the E drive, the file safe is displayed as a normal file (such as a 5G seven.rmvb movie file in the picture, of course, you can give him any name, extension), but You can't open him directly, because this is his hidden appearance (Figure 2). You can think of it as a file safe of 5G size (you can also set it yourself). Need to open it with this TrueCrypt software. The encryption software can load this file safe into my computer and turn it into a drive letter, such as a J drive. You can then access it and place files in it by accessing other disks (C drive, D drive, etc.). Once the file safe is closed in this software (it will also be automatically closed if you do not access it for a certain period of time), you will not be able to access the file in this file safe. You can think of this TrueCrypt encryption software as the gateway to the encrypted safe it generates. You can view the files in the Vault by using this software and knowing the password. Maybe you have to ask, if you don't have this encryption software, can't you open this safe? Yes, if you want to remember the password of the safe, you can download it by downloading a TrueCrypt software to open it. Maybe you ask, this safe becomes a file, others can't open it. If someone else accidentally deletes it, it will become easy to be deleted by mistake. Yes, I will explain later if the placement was accidentally deleted. You may ask, if others can't open it, just give you a copy of the entire safe and study it slowly. I tell you, if the password you set is not too simple, you can't crack it. Even people who write this software can't crack it. If you combine files as passwords, it is impossible to crack at all. OK. Looking at Figure 1 above, you should be clear about the situation. So now the way we explain it is very clear. Divided into several parts to explain. The first part: how to get this software; the second part: how to generate a file safe; the third part: how to open the safe and how to put the file; the fourth part: how to prevent accidental deletion; the fifth part: some notes . Don't look at so many parts, follow my explanation, you will find that it is actually very simple. I believe you will like this software. The first part: How to get this software software a total of 1.33M. green software. It can be used directly after decompression. Support Win7, Vista, XP. Encrypted files under win7 can be decrypted under XP (many encryption software will not work across operating systems). Encrypted files can exist outside of the operating system. Don't worry about re-installing the system and you won't be able to open the previous encrypted file. Other more advantages are not mentioned here. You are slowly understanding. As shown in Figure 3. The TrueCrypt.exe file is the main program file. Part II: How to generate a file safe Use this software to encrypt files first to generate a file safe of a certain size. This file safe can be named by yourself, for example, 保险箱” safe.rm”, you can also 叨<quo;safe.iso”, the name you can take. You can put this safe anywhere, of course, it is not recommended to put it on the system disk C, because the reinstallation system will format and cause your file to be lost. Of course, if you build it, you can move it, because in appearance, he is an ordinary file. Let's create a file safe: 1. Open TrueCrypt.exe in the software folder. This is the main program file of this program. We will use it repeatedly. You can create a desktop shortcut for it. We open it easily. As shown in Figure 5. In the open program window, select the menu “Encrypt Volume” & rdquo;“Create Encrypted Volume”. (The software will be the file safe I said earlier, "Encrypted volume". I think the file safe is easier to understand. So I call it "file safe". But in order to adapt to the software, you have to Know what the so-called encrypted volume in the software is.) Figure 6. Then click Next twice in succession (because you can follow the software's default settings). The next figure in Figure 9 is to be noted. Ask for the location of the encrypted volume (that is, the file safe to be generated) that you will be generating. Click on the "Select File" and then find the folder where you want to place the file safe. Then in the file name below, write the name you want to give to the file safe you generated. I am here to take a name 叨 "file safe. Rar", you can choose any name extension. Note: Since the button text in the window is “Select File”, you are likely to open my computer and select a file. Actually, there is a problem with the translation of the software itself. In fact, let yourself find a place and create a new one. a file. So you don't click on the file in the folder, so that file will be replaced by the generated file. You should write your own file name that is not in the folder. Figure 10 below, let you choose the encryption algorithm. Just click on the next step. There is no need to choose another algorithm. This is safe enough. This step asks you how much to set up this encrypted volume (file safe). You should pay attention to the unit behind you. I chose to generate a 1G safe here. Then click Next. Note: Many encryption software encrypts files directly, and how large a file is to generate an encrypted file. But this software is Mr. into an empty encrypted file safe. The size needs to be set first. At first you may feel that this is a waste of space. After a long time, you will like this way. How big is the size? Then look at what you need to put inside. But now the hard drive is big, set a little bigger, so encrypted files are relatively easy to be copied, isn't it? This step lets you set the password for the encrypted volume (file safe), as shown in Figure 12. You can set a simple password. You can also check the box below using the key file “ and select a file from the computer as the password. This is a very special place for this software. If you choose a file as a password at the same time, your file safe is basically no one can crack. As for the principle of using a file as a password, I have explained it in Figure 13. Once you have selected the file key, click OK and click Next. Note that using a file as a password is optional, not a choice. You can use regular passwords such as 123sasw. If you choose a file as a password at the same time. Then the type of this file is very particular. In the final note of the article I will detail what type of file is used as the key file. This step asks you what kind of file system you want to use for this file safe. Here is not a detailed explanation, all choose NTFS. Then click “Format “. As shown in Figure 14. Many people are scared when they see the formatting options, and are afraid to lose the files in the computer. In fact, this is the case. Since we have specified that we want to create a 1G encrypted volume (file safe), then this 1G space is divided from the hard disk, but how to use this 1G space, the software requirements will be This 1G space is first formatted in accordance with the format required by this software before it can be used. So even if you click it, there will be no problem. The formatting process is shown in Figure 15. The encrypted volume is created after formatting. Click to exit. As shown in Figure 16. Need to pay attention here. Don't click on the next step here. When I started using this software, I saw that "the next step" was always clicked, and the result was never clickable. Ok, the encryption safe is generated and looks like a normal file, which can be cut anywhere on the hard drive. As shown in Figure 17. You must think about how to open it again. Software that plays movies directly cannot open it. How to open it, and how to put the file inside, we will explain the next part. Part III: How to open the safe and how to put the file open program file TrueCrypt.exe. If your program window is already open, you don't need to perform this step. This step is the key. After the program interface is opened. This interface is the door to the file safe. Load this file safe as shown in Figure 19. After loading, this safe will be displayed as a drive letter. For example, I chose the J drive letter. You can open the J disk file safe like the D drive, E drive, and break into it. (Be careful, you must first select a drive letter. The selected drive letter is the drive letter displayed in the back of this safe.) Figure 19 2. After clicking Load, you are asked to enter your password. If you use a file as a key file, you will be asked to select your key file, as shown in Figure 20. Once the click is confirmed, the safe will be loaded. Figure 21 is what it looks like after loading. It can be seen that "my computer" has a J disk inside. The size (yellow highlight) can be displayed in TrueCrypt software at 1023MB. Let's open the J drive and break into this safe. Of course it is empty. Let's try to copy a file and go. See figure twenty-two. The speed is 31.8MB/sec. The speed is quite good. You should know that the file is stored in the file and it is encrypted. The same file is copied from the inside and the decryption operation is completed at the same time. So the encryption and decryption speed of this software is very fast. When you put the file in this safe, you want to close it, you need to click the uninstall under the software and uninstall all, you can withdraw it from the drive letter. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved