Encryption of a flash drive for the help of TrueCrypt. Encryption of a flash drive (USB-drive) with the help of BitLocker Setting up TrueCrypt to run from a flash drive

Golovna / Google Play

Encryption is a way to defend against “third-party hands”. Іsnuє anonymous encryption algorithms. In this article, we know how it is possible to transform the data into encrypted (encrypted). The TrueCrypt program supports anonymous encryption algorithms and is one of the simplest ones in vikoristanny. Below is the butt of the encryption of the USB flash drive:

We connect a flash drive, which needs to be encrypted, into the computer. Use data on flash drives due to savings on a computer after which it is recommended to format.

Run the TrueCrypt program. Press "Create a volume".Vіdkryєtsya vіkno Master of the creation of volumes". Choose " Encrypt non-system partition/disk» — « Dali"(Mal. 1).


Rice. one

At the coming vіknі we choose " Great volume» — « Dali"(Mal. 2).

Rice. 2

At the stage of installation Volume allocation» selectable « Attach.."(flash drive), as ciphered. My mind is tse " Change disk 1" divided " G». « Dali"(Mal. 3).


Rice. 3

Wu " Folding mode» choose "Create and format encryption volume"(Mal. 4).

Rice. 4

« Encrypted» ta « Volume expansion» zalishaєmo without change. " Dali"(Mal. 5).

Rice. 5

We can see the password (Fig. 6):

Rice. 6

It's pushing " So"(Mal. 7).


Rice. 7

At the final stage of installation Formatting to that» Change the file system to FAT (or NTFS, if you want to encrypt files larger than 4 GB, but not all storage devices support this file system). It's pushing " rosemity» - Starting the encryption process for the distribution (flash drives) (Fig. 8).


Rice. eight

It is necessary to check yoga completion!

After the completion of the formatting, it will appear at the window (Mal. 9):


Rice. nine

It's pushing " OK". The flash drive is encrypted!

We complete the work with " Master of the creation of volumes" - button " Withdrawal". If so, you can use it with an encrypted flash drive.

PS: How to decrypt a flash drive / partition:

If you nyzhno ydalit shifpovanie c pazdela / yctpoyctva (nappimep, if ye shifpovanie bolshe ne tpebyetcya) you must click ppavoy knopkoy mouse Po dicky (which will determine the flash drive in the system) in okne 'Kompyutep' (or 'Moi kompyutep') and vybepite pynkt 'Fopmatipovat' .

Here I became a little unacceptable: my flash drive for 8 gigabytes was ruined here on the territory of the Moscow region. The flash drive itself was not bad - it was an office, it was decommissioned a long time ago, that hour had come, it didn’t take 8 gigabytes anymore. It’s a pity that there was a program, I saved it there - software was used for all the fluctuations of life and on hack-work, I did help. In addition, on that flash drive there was a file with a bunch of passwords: special, clerical and others. Axis zasіdka! Aje don't know, who knows my flash drive? Like a simple lamer - you will format yourself and you will be curly. And from someone who is wise - check smartly. I had a chance to quickly change all the passwords. Another hemorrhoid...

They gave me a new flash drive, for 32 gigabytes. But I won’t repeat such pardons, and protect my flash drive from other people’s eyes, and at the same time, from viruses, which in the rest of the hour parted immeasurably. And with an infection and other rozposti, as if you were growing fast and painlessly. Otzhe, let's do it.

The best program for such purposes is TrueCrypt. The program is designed for creating encrypted files-containers, as well as for encrypting multiple partitions of hard disks (including the system one). Programs of this kind are few and far between, but TrueCrypt can have a few miracles. It is richly functional, simple, supports encryption algorithms, while working with the attachment of encrypted containers, and smut, on the control of similar programs, it is absolutely cost-free and free of charge codes!

You can take over the program at once from my Russian mine.

Reportingly describe the installation of the program there is no sense - there is nothing to worry about in the installation of other programs. The only moment - when the program is installed, the options are "install" or "Extract". For our next step, select Install. Extract simply unpacks the files from the installation package, but does not install them. Later, after the installation, it is necessary to Russify the program. For which you need to copy the Language.ru file from the folder from the installed program (for locking C: Program FilesTrueCrypt).

1. Formatting the flash drive.

Mustache. Now let's get down to preparing our stolen flash drive. Like on a flash drive, as well as information - save it on a hard drive. Let's format the USB flash drive for correctness. The type of the file system does not matter when formatting, but I recommend NTFS. Why NTFS? That one, we will help you, for help to improve security, you will be able to save the accumulated viruses, as if you are constantly trying to register in auto-acquisition and create on a new pile of your files.

Otzhe, format the flash drive. Open "my computer", click on the flash drive with the right mouse button and select the "Format ..." item in the context menu. In the case of formatting, which was seen, select NTFS from the "File system" list. There is nothing more to eat and emboss "Pochati". Check the system for the time being, write “Formatting completed” and go to the next step.

If there are only FAT32 in the "File system" list, then it means that the flash drive is optimized for remote access. It is necessary to switch the policy. To fight like this: close the window formatting, go to "my computer", right-click on the flash drive and select the "Power" item in the menu. At the vіknі authorities, scho vіdkrilosya, go to the bookmark “Obladnannya”, we know our flash drive there, we see it and we press the button “Vlastivostі”. Vіdkriєtsya vіkno authorities flash disk. Go to the tab "Policy" and switch the policy to the mode "Optimize for visualization".

After that, embossing “OK” at all viknakh authorities and turning again to format. The "File system" list can now show NTFS.

2. Preparation of the encrypted container.

Otzhe, the flash drive is ready. Now the hour has come to create encryptions container, in which all our important and unimportant data will be rebuffed. Start TrueCrypt. The headline program is shown below:

Go to the "Volumes" menu and select the "Create a new volume" item. The master of the creation of volumes is called. I will not describe in detail all the adjustments of the master, but, perhaps, it will be a topic for other articles. I will describe only those who are worthy of ours. Idemo in order:

"Create encrypted file container" , "Next>"

At the "Volume Allocation" window, click the "File" button, select a place to create a container file, that name. Im'ya can buti be-yakim. Expansion is not obov'yazykovym. For example, I'll create a myflash file on the C drive. For example, on the C drive, how can I bulo directly to the USB flash drive? It is possible, but I recommend creating a file-container on a hard disk. The process of creating it directly on a flash drive through a low speed recording / reading will be longer.

Encryption algorithms and hash algorithms, if you don't know where to go, it's better to leave them without change. To find out more about them, you can press on the forces that have been propagated by the program. I've filled everything without changes.

Volume expansion. Here you should specify the maximum size of the possible container file. We need to expand the container for the size of our flash drive, minus a small reserve for TrueCrypt files, which will be on the flash drive. The TrueCrypt files are about 4 MB. I put experiments on a flash drive with a volume of 4 GB, so I have a container file of 3800 megabytes. Realistically, when we marvel at the power of the file, we will set it to 3984457728 bytes, that's it. occupies mayzhe the entire obsyag flash drives. To get rid of a small amount of free money, let it go, not a penny. Zagalom, rozmir podbiraetsya experimentally-individually, fallow from a flash drive.

Set a password for that. With the same password, which you know only you, and only you know, you can take away access to data on your flash drive. Without which, the container file cannot be opened. Don't forget to enter your password. There is no other way to access encrypted information, it is impossible to break the container!

Tick ​​"Key. files" is not set. You can check the "Show password" checkbox, so that you can check the ones that you entered. The next letter is embossed “Dali”.

In the "Volume Formatting" window, it's not clear. The file system in the middle of the container does not play a special role. The only thing that is necessary is to lead the bear in the future, in order to increase the possibility of vipadkovy generation of keys. Vtim, everything is written there. After that, press the button "Open" and check it, if the program prepares the container. The hour of ochіkuvannya to lie down in the case of the tightness of the computer and the speed of the exchange of the hard drive. After the completion of TrueCrypt, let us know that “TrueCrypt volume has been successfully created”, and we need that. Tisnemo "Vihid".

Father, it was created. Transferring yoga to a flash drive. I recommend to create on nіy tatku where and place our encryption container. Navіscho - you will be wiser in the distribution of "Rulimo safety". I created a MyFlash folder on my flash drive and moved my MyFlash file, so I'm the original

3. Setting up TrueCrypt to run from a flash drive.

Everything is simpler here: at the main TrueCrypt window, go to the Services menu and select the Install portable disk item. At the "Setting up a TrueCrypt portable disk" window, in the "File parameters" section, press the "Look" button and select our flash drive (not the folder with the container, but the root of the flash drive itself).

In the block “Enable autorun (file autorun.inf)”, put a jumper in the position “Automount TrueCrypt volume (specified)”, press the “Look around” button, and select on our flash encryption container, which we robbed. Let's put a tick in the box "Vidkriti mount the volume at the explorer's window". Vzagali, kermuvannya peremikachami - on your choice, I'll just propagate the best option.

Tisnemo "Create".

After I write “TrueCrypt portable disk successfully created…” you can relax and enjoy your right hands. If everything is broken up like I have, then on the flash drive it will be like this: MyFlash and TrueCrypt folders and the autorun.inf file

4. Robot from an encrypted flash drive.

Now, as soon as you remove the flash drive and insert it again (you know that autorun from flash drives is not enabled), the system itself will prompt “Mount TrueCrypt volume”. Moreover, the presence of a TrueCrypt installed on a computer is not obov'yazkovo - a flash drive is already revenged by TrueCrypt, in this way a flash drive can be loaded on absolutely any computer.

If you're lucky enough to mount the volume, you'll be prompted to ask for the password:

If you press the "Parameters ..." button, additional options will be available:

“Mount as if only for reading” is a very important option, if you insert a USB flash drive into a computer, you are not sure of anything. In this case, it will be connected only for reading, and if the virus is not able to get through your encryption container.

Other parameters do not bother us in any way.

Then, after entering the correct password, TrueCrypt connects the container to the encryption system as an external disk, with the first letter of the disk. Now, with this disk, you can work like a great flash drive: copy it from / to the new one, turn it off and work it out, well, zagal, everything is like a fire. Encryption and decryption are implemented by TrueCrypt "on the fly", absolutely clear for the koristuvach. A TrueCrypt icon will appear in the system tray (anniversary date panel area, lower right corner of the screen)

After that, as the robot is cumulatively finished, it is enough to right-click on the mouse on the end of TrueCrypt and select the item "Remove [drive letter]". The next container will be included in the system. Before the speech, the work is not obov'yazkovo, as if there was no recording on the flash drive. So, if you copied data from a flash drive and didn’t write anything on it, then you can just play it, without any additional manipulations.

5. Please be safe.

Now let's talk about those, how to prevent viruses from being written to a USB flash drive. Tsey rozdіl stosuetsya less than quiet flash drives, yakі spochatku vіdformatirovanі in NTFS. For FAT, please come in do not try!

So, since everything was broken up like I have, then on the flash drive there will be such a place: folders "MyFlash" and "TrueCrypt" and the file autorun.inf

We go into “My Computer”, right-click on our flash drive (not on the open file-container connected like a disk, but on the flash drive itself!). We select the point "Power" and at the beginning of the power, what happened, go to the "Safety" tab.

Just like the "Safety" tab in the power of the flash drive is daily, it means that it is formatted in FAT32, otherwise, you have a checkmark "Victory easy access to files (recommended)". Go to "Start"->"Control Panel"->"Folder Powers"-> "View" tab. And there, tick off the checkbox.

You can see from the field “Groups abo Koristuvachi” everything, but the “All” group. For the “All” group, below, in the “permit” column, put 3 checkboxes: “Read and read”, “List in folders” and “Read”.

Click "OK". Now try to copy it to a USB flash drive, I have a root, like a small file. The system is guilty of barking "Authorized at access". Let's try to remove the autorun.inf file from the flash drive. The result can be yourself. The "TrueCrypt" folder is also not to be seen. And the axis for the folder, where to lay our encryption file, I need to allow it to be changed, because. the file will be changed in any way, otherwise TrueCrypt mounts it only for reading. For this, we go to that folder, place our encryption file-container, and right-click the mouse to click on the menu. Dali "Vlastivostі", bookmark "Safety". Three checkboxes "Reading and viewing", "List in folder" and "Reading" will be grayed out and inaccessible to change. That's right, let us fall into the root of the flash drive. Let's put a tick in the column "allow" for the item "Record" and emboss "OK".

On whom everything. Now viruses cannot replace autorun.inf with their own authority and cannot write their files to the root of the flash drive. Most of the vipadkivs have enough of such a zahist. Obviously, it's time to wait, if virus writers learn how to get access rights, but they still can't get through. Accept me such viruses are not known yet.

6. Together

From the same ... we took away the flash drive, the information on it is available only to us. Obviously, the universal password (soldering iron in the anal opening) did not reveal anything, but without it, nobody can gain access to your data. So, when using a flash drive, you can speed up. Ale only like a flash drive. Data become inaccessible.

I think it’s not a good idea to guess what the password is simpler, it’s easier to do it with a stupid search or for a dictionary. In any case, encryption is not vryatuє. Therefore, unique simple passwords. A lot of people are allowed to have one and the same pardon - win one password (don't forget and fold) creak, de vin is needed. Tse rude pardon, tk. Having recognized the password once (and the methods for recognizing it are anonymous), the attacker takes away access to all password-protected data of the koristuvach. Ale tse already on the covenant of a koristuvach.

Take care of your information, more, as it seems, you yourself will keep it light.

Good day! Today we are talking about the problem of unauthorized access to electronic information. Moreover, we will try to hide our information, so as to work, then sing it. І zrobimo tse for help freeware Join our group at VK! Under repair! Mindful master!

Yes, obviously, impersonal simple and do not overlook the great number of programs, but the stink may be short of the presence of payment for your work.

Also, choose some software product to contact, looking at the option of vikoristannya like Windows OS and * nix. Therefore, having called everything for and against, I dared to write about the TrueCrypt software to the main task of encrypting information. The software is cost-free and Opensource (with open source code).

The task is simple, create a callous nose, which is to revenge on your own information in an encrypted way, and you can gain access to this information by typing a password. Flash storage can be downloaded on different computers.

We will revise version 7.1a for you, as I have been revised by many independent auditors and recognized as safe. Zavantazhiti її possible. Also, below the program itself, there is a list of movs that are supported, de slid to choose Russian and download the Russifier tezh.

Having secured the installer, let's get started. Run file TrueCrypt Setup 7.1a.exe.


We select Extract, so that we install the program for a portable device, the visibility is not available on the computer. Choose a place where to unpack, let there be My documents. Let's wait a bit, it's still necessary to install the necessary drivers for the initial creation of encryption into the system. І we complete the installation by checking that the Open the destination location when finished checkbox is checked. After the installation is completed, we see the folder from the installed program, run the TrueCrypt.exe file.

The program has a lot of different possibilities, and we can only look at one within the framework of the article. As you remember, we need to create the most mobile “black screen”.

Prepare your nose, save all the information or copy it to your HDD. It is also necessary to format it with standard Windows tools. Go to My computer, RMB on a USB flash drive and choose to format it.

The file system is set to NTFS, because we will create the file with the entire flash storage space, in the FAT32 system, files larger than 4GB are not created. At the mitzvo of the volume, state the name of the wearer, you can not state anything.

Let's turn to our freshly installed Truecrypt program. For the cob, let's її localize in our way Russified. Remember, we downloaded a Russification file from the site ? Now let's go to the new one and unpack it, then we'll throw it all in the folder with TrueCrypt. File Language.ru.xml guilty of lying in the result in one father TrueCrypt.exe. It's good to go like this:


After unpacking, let's turn to TrueCrypt. At the top menu, I joked Settings -> Language choose from the list Ukrainian and embossed OK.


Now let's deal with the creation of an encrypted container on a flash drive. Let's create an empty file on a flash drive. In principle, it’s not the essence of how you name yoga and how to expand it. Raju is better to put extensions of files from the great obligations of data type *.iso or.mkv and name it differently. The role of the black box container has the file The_Matrix_Reloaded.iso. To create an empty file, press RMB on any empty space of the flash drive and select Create -> Text document.txt, then change the name of the extension. Pіslya moreover, as a file of creations zrobimo її portable. For which demo at the top menu of the program Service -> Installing portable wear. At the field of files and parameters, we respectfully choose our flash drive. We select the checkbox Automatically mount the TrueCrypt volume and in the field below for the additional button Look back at the previous creations by us, the file on the flash drive. My opinion is The_Matrix_Reloaded.iso.


Softly create, then Ok and Close. At the same time, the autorun.inf file was created on the flash drive, and we will write a script to install the TrueCrypt.exe file and mount the container. Ale, I want to point out here, that with a blocked or turned on autorun, you won’t be able to do everything. For whom it is possible to work with a feint with vukhs, ale about the new one below. In the meantime, we are still creating encryption container for our file. Idemo in Service -> Master of creation to that.Choose the top item: Create an encrypted file container.



Dali in the field of volume placement embossedly look around and select a file before creations. My opinion is The_Matrix_Reloaded.iso. Quietly far away, with the bazhanni, the methods of encryption are steep, as if there is no bazhannya, then embossingly Far away. In the volume expansion, you need to install the encrypted container expansion. Here you vyrishuvati, vin can be used for the whole flash drive, maybe half and lie at the same time with the given credits. Enter the number in MB and roll far away.


Give us the need to create a password, moreover, TrueCrypt remembers both simple passphrases and key files, as well as navigating key files and phrases together. Let's get along with the password, insert it into the fields and let's move on.


On the rest Formatting to that have the option to select the NTFS file system. Press the button rosemity and drink some tea. An hour for TrueCrypt encryption will keep you in the dark of the container that is being encrypted, but in any case, drink some tea and you will catch it 🙂

The results may be portable, on some sort of distribution: Folder with TrueCrypt, file for autorun autorun.inf and file-container in which all our data is stored. When connected to a computer, starting from Windows XP, ending with Windows 10, finally for entering a password, and after this entry, one more disk is mounted, on which we can keep our encrypted data. Ale buvaє so, scho autorun is disabled on some computers. For whom, I will propon you to quickly create a bat-file by me, or create. Created on a flash file. To create an empty file, press RMB on any empty space of the flash drive and select Create -> Text document.txt. Rename yoga to start.bat or mount.bat as appropriate and right-click on the new item Change. From the file itself, take a row:

truecrypt\truecrypt.exe /q background /e /m rm /v "The_Matrix_Reloaded.iso"

Remove The_Matrix_Reloaded.iso and change the name of your container file. Well, for unmounting, you can create the same batch file stop.bat or unmount.bat, in the name of which type in the following:

truecrypt\truecrypt.exe /q /d

The procedure is really simple and TrueCrypt has a lot of possibilities. І rіven nadіynostі ciphered calling povagu. Below I attach archives, in which to avenge:

  • TrueCrypt Setup 7.1a.exe
  • langpack-en-1.0.0-for-truecrypt-7.1a.zip
  • start.bat
  • stop.bat

USB storage devices are small, portable and versatile storage devices. Flash drives are more than capable of transmitting data between computers. Tim is no less, thanks to its portability and compactness, USB-carry can be easily used. Otzhe, it’s necessary to tell about the hopeful defense of data on the flash.

It's a pity you can't set a password for the entire storage, like you have a smart phone or a computer. For a hard-hitting file, it is necessary to encrypt it. If you don't want to buy a security-free flash memory with hardware encryption, you can use a security-free program to get a similar level of security.

In these articles, we have given a few simple ways to protect files and folders on a USB flash drive.

If you need to protect only a few important documents, but you don’t need to encrypt entire folders, you can simply set up a password protection for a few files.

Many programs, including Word and Excel, allow you to save files with a password.

For example, if the required document is viewed by the Microsoft Word text editor, you can go to the menu File > Vіdomosti, select item document defender that option Encrypt for additional password.

You only need to set a secure password and confirm it. Remember to save the document and keep it in mind, or write down the password.

Download the portable version of VeraCrypt and extract it to a USB drive. At the start of the program, a list of available drive letters is displayed. Choose a letter and type Make a volume

To create a virtual disk encryption in the middle of the file, select the option Create an encrypted file container and press "Dali".

At the next stage, you can choose the type of volume: Primary or Attached. If you link to someone, lower the risk of someone trying to trick you into revealing your password. Let's make a simple volume. Then you could choose to unlock the encrypted volume - a USB flash drive.

Please reset the encryption and enter the volume size (it is not your fault to change the size of the USB disk). Let's choose an encryption algorithm for that hash, you can beat the lock. Let's set the volume password. On the onset of your turn, your mind's hand will signify the cryptographic strength of encryption.

Once the encryption is complete, once you connect the USB stick to any computer, you can start hosting on a new VeraCrypt and mount the encrypted file container to gain access to the data.

VeraCrypt supports the encryption of multiple distributions and data storage devices.

Get VeraCrypt and install the program on your PC. At the start of the program, a list of available drive letters is displayed. Choose a letter and type Make a volume. VeraCrypt Volume Creation Wizard will start.

To encrypt the entire USB drive, select an option Encrypt non-system partition/disk and press "Dali".

At the next stage, you can choose the type of volume: Primary or Attached. If you link to someone, lower the risk of someone trying to trick you into revealing your password.

On the screen of the master, it is necessary to select attachments, tobto. our memory USB disk, and then press "OK" and "Dal".

Let's make a simple volume. On the screen of the master, it is necessary to select attachments, tobto. our memory USB disk, and then press "OK" and "Dal".

To encrypt the entire USB storage, select Encrypt the partition on the mist and press "Dali". VeraCrypt is ahead of you, because you are responsible for backing up your data - as if it were not so good for encryption, you can regain access to your files. Let's choose an encryption algorithm for that hash, you can beat the lock. Let's set the volume password. On the onset of your turn, your mind's hand will signify the cryptographic strength of encryption.

Let's choose the cleaning mode. The more cycles of overwriting, the more purification. At the final cut, wrap Encryption to start the encryption process

Once the encryption is complete by connecting the USB-carry to the computer, you will need to install the VeraCrypt helper to gain access to the data.

A lot of modern archivers, including the cost-free 7-Zip, support AES-256 encryption and password-protect files.

Install 7-Zip, then right-click on the file or folder on the USB drive and select 7-Zip > Add to archive. In the "Add to archive" window, select the archive format and enter the password. Press "OK" to start the archiving and encryption process.

Have a good time, dear friends, know, readers and other individuals.

I think that someone else is so different from you, but they are covered with their own noses, like flash drives or other hard disks. Somebody takes documents on them, some photographs, some more, but so on and so forth, like it or not, often files are less important for people.

I suspect that at some point the skin of the portable wearer was thinking about how to secure his data in the face of unauthorized access to them be-kim. And so you don’t suffer from paranoia (you don’t worry about the drive of what you want, you just rub it for your own purposes), you can just use a flash drive or forget about it, but you can not accept the legacy.

Zagalom, as you have already understood, with this material, I want to talk with you about how to encrypt data on your flash drive and insert a password to access it.

Let's get started.

Vstupna

There are a decent number of programs that allow you to create such tricks with your hands, so what can I say, you can speed up in Windows 7/8 with the rich BitLocker, but I will speed up for these purposes such a miraculous thing like TrueCrypt.

Reasons for those past, do not be surprised at those that on January 28, 2014, the project was closed, the development was closed, and all old versions were removed, cleared and closed, the project was announced by an impersonal discussion in IT-spilnot.

At the very least, one of these reasons is the chain of support for the Linux I love "a. Vtіm, let's get to the point.

Encryption with TrueCrypt

TrueCrypt is a software for data encryption "on the fly", supports 32-bit and 64-bit systems, is completely cost-free and otherwise. R

Hell, there is no need to install the program on the skin computer, where the USB flash drive is inserted, so it is enough to encrypt the data once and use them later, be it.

It allows you to create a virtual encrypted logical disk that is saved as a file. With the help of TrueCrypt, you can also re-encrypt the partition of a hard disk or other media such as a floppy disk or USB flash memory. All saved data in a TrueCrypt volume is fully encrypted, including filenames and directories. Mounting a TrueCrypt volume similar to a normal logical disk, you can use it for additional advanced utilities for rechecking and defragmenting the file system.

Axis so axis pies come out.

Zavantazhennya and installed

You can capture the joy of a programmer's thought. The kit has a Russifier.

Shodo installation, then everything is simple:


Now let's move on to such a thing as a different program, but before that, it's good to reformat the flash drive.

Front formatting

For this, first of all, we go to the "Explorer" (wine is "My computer"), press on the flash drive with the right button of the bear and select the "Format" item.

Selecting the required format (better than choosing NTFS, so that the files of the great expansion on FAT32 cannot be trimmed, but we will create a solid expansion ourselves), embossed into the "Start" button.

If the process is completed, turn to our TrueCrypt, de tisnemo in "Service - Master of the creation of volumes":

Let me give you the simplest way to encrypt and follow a short path. Other options You can practice on your own, good, to the point of everything necessary for the program and comments of the Russian language.

The creation of the volume and the first encryption

Well, let's go.

For the cob we select the item " Create an encrypted file container and embossed in the button "Dali".

Here I’m making a wish, and so, as we walk with you along the simplest road for the time being, then we select the item " TrueCrypt primary volume"And I'm calling again in "Dali".

Here we need to click on the "File" button, select our USB flash drive, come up with a name for the file and click on the "Save" button and then again "Dalі".
On this deposit, we need to select the type of encryption. For the time being, everything is surplus for zamovchuvannyam, wanting, obviously, there are nuances from the point of view of superiority and security, but, I think, it’s up to an ordinary coristuvachev to stitch and basic lashings.
They gave us a command to choose the world for that. In principle, wonder for yourself, which of them is the most convenient for you, because you want to decrypt everything, which one you want to encrypt, and which one you want to deprive. I put the axis, for example, 20 GB.
Now you need to guess the password. The program is late in advance that the password needs to be good (and it's important!), but I think I'll figure it out if I do. Rush away.
Here we are asked about the expansion of files, what you choose to save and encrypt. I think scho s vіdpovіddu kozhen vznachitsya himself independently.
Well, for the rest of the deposit, you will no longer have to press the "Resolve" button and complete the process. The process itself may not be secure (if you want to store everything in the security of a flash drive, the same type of encryption, as well as the volume and some other nuances), then you must have a little patience.

If the process is over (so, obviously, you don't want to create one more volume), we hit the "Leave" button. Why is our encryption volume ready.

Transfer to a flash drive, flash drives and other

Now you can download the key files of the program to the USB flash drive, so that you can easily win on any computer. For whom it is embossed in the program: " Services -> Portable Disk Setup", schob vodkriti master nalashtuvan, who will help us: Here, for the beginning, you need to select our flash drive or else I will empty the folder on the flash drive (you can create and name it TrueCrypt), as well as set up the autorun parameters when you insert the flash drive (you can not rob it, otherwise the program can be run from the folder on the flash drive manually for an hour , after which mount the volume and іnshe).

As for the parameters, I recommend that you install everything as it is on the screenshot, then. TrueCrypt volume auto-rotation and use the "Look" button to select the volume file, which we now have on the flash drive (I’ll call it, I’ve taken it).


Well, nareshti, you don’t have to press the “Create” button anymore, after reading the following information that you can use screenshots and play on your computer, I think, tezh. Everything, vlasne, the flash drive is ready. Vityaguєmo, let's go to another computer (if you want you can try it on your own) and insert our encrypted marvel of technology.

The process of using encrypted media

If you have auto-encryption enabled, then you will no longer have to check the installation process, remove the password and get encrypted with a partition (so that your flash drive will show up at the explorer with an unencrypted partition and it will show up encrypted), zavantazhuyuchi on new files.

If autoloading is not enabled, then it is independently launched from TrueCrypt flash drives, which we have there after the rest of our projects.
De (at the main window of the program):

    • We choose whether the letter of the disk is worthy of you; Dali embossed in a button "

File

    • .."; We select the creations of the volume file on the flash drive; Press the button "

Zmontuvati

    • "; Enter password;

    Let's enjoy the result.

At the exit, we take the picture that you have taken the picture earlier, so that the additional (wine encryption) has been distributed, where you can drop your files and stars You can take these files and everything will be in encrypted form.

If you finish the job with a split, well, it’s too much to press the “Uninstall” button and - voila! - everything is newly protected and encrypted.

Why, maybe, everything.

Pislyamova

We can also have a flash drive, as it is encrypted with a superior algorithm and is ready to work on any unprepared computer. Obviously, there is no ideal zakhist, but now a potential malefactor needs a lot of orders for more than an hour, sobіv i dosvіdu, schob reach your data.

Please be aware that after editing or reviewing your secret data may be lost in time files or operating system backup files.

The very fact of vikoristannya ciphering will not be hidden. The computer can delete entries in logs or registers. Instead of a flash drive, it indicates that encryption technology has been installed. To attach to the fact of encryption, TrueCrypt promotes the technology of an encrypted disk with a floating bottom and with an attached operating system, but we already know another story.

As a rule, as a rule, as a food, additions and other things, then comments on your services.

© 2022 androidas.ru - All about Android