How to Use TrueCrypt to Encrypt Your Sensitive Documents

Unless you encrypt your files, can outsiders easily access them - even without knowing your Windows password - by starting their own special operating system from a floppy or a bootable USB drive.

If you work with sensitive data - because you are a small company, say, or because you can store personal financial documents on your computer - you should consider encrypting them to protect them from prying eyes and thieves, especially if you hold on a laptop that can easily be stolen or lost.

A handy tool for encryption is TrueCrypt from the TrueCrypt Foundation. This free, open source, you can install a virtual encrypted disks or encrypt the entire drive, including Windows drive.

In this article I will concentrate on describing how the virtual encrypted disks, which allows you to protect sensitive documents without having to encrypt your entire disk to create. For other encryption practical how-to's, click the article number, title listed in the right panel.


When you create a virtual encrypted disk with TrueCrypt do yourself a single encrypted file container you can access or decrypt the password you choose.


Like any other file, the file container will be deleted, moved or copied. But no one can access its content without providing the correct password.

The idea behind the container file corresponds to the idea behind the compressed zip files: You can add other files and folders in the file container, and while it remains closed, it appears as a single file in Windows .. But unlike with. Zip files, you can not just double click the encrypted file container to open and download the files open. With TrueCrypt you have the volume (file container) as a disk to install - and to do so, enter your password.


The file container appears as a drive in Windows, similar to the way C and D drives do, and you will be able to access, modify, delete, and many more files and folders to add in the encrypted file container.If you like try using TrueCrypt, begin to download. If you install, you can use the default settings, the installation is quick and easy.


After opening the application, follow these steps to create the encrypted file container:

First Click Create Volume to begin.

Second Keep it the first choice - Create an encrypted file container - selected and click Next.

Third Keep it the first choice - Standard TrueCrypt volume - selected and click Next.

4th Click Select File, select where the encrypted file container, give it a name and click Save. To continue,           click Next.

5th Unless you have a specific reason not to accept the default encryption options and click Next.

6th Secify the desired size of the encoded file to deliver. Make sure it is big enough for files and documents           you want to protect with room to grow if necessary fit. Enter the desired size and click Next.

7th Enter your preferred encryption / decryption password and click Next.

8th Keep the default volume format settings, but moving the mouse around randomly to any secure                      cryptographic strength and create. Click Format to create the encrypted file container.

To use the encrypted file container, you must mount as a drive. The easiest way to do this is to click on the desired drive letter on main TrueCrypt window, click File to locate and select your file container, and then on the mountain. You will be prompted to encrypt the password you have set when the file container. Enter and click OK, then you can open the encrypted files in Windows using the computer (or My Computer). As with other drives, you can see and access it via the open / save dialog boxes in Windows and other programs.

If you want the file container will be automatically mounted when you log on to Windows, you can add to your favorites.

Eric Geier is a freelance writer, tech, become a follower Twitter account of his writings. He is also founder of NoWiresSecurity, so small businesses can easily protect their Wi-Fi network with enterprise-class security.

0 comments:

Copyright © 2012 Fast Technology.