1 / 18

TrueCrypt Demonstration

TrueCrypt Demonstration. Randy Marchany IT Security Officer Director, IT Security Lab IT Security www.security.vt.edu. What is TrueCrypt? . Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux as found on www.truecrpyt.org

ted
Download Presentation

TrueCrypt Demonstration

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TrueCrypt Demonstration Randy Marchany IT Security Officer Director, IT Security Lab IT Security www.security.vt.edu

  2. What is TrueCrypt? Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux as found on www.truecrpyt.org Main Features: Creates a virtual encrypted disk within a file and mounts it as a real disk. • Encrypts an entire partition or storage device such as USB flash drive or hard drive. • Encrypts a partition or drive where Windows is installed (pre-boot authentication). • Encryption is automatic, real-time (on-the-fly) and transparent. • Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. • Encryption can be hardware-accelerated on modern processors. • Provides plausible deniability, in case an adversary forces you to reveal the password:Hidden volume (steganography) and hidden operating system.

  3. How do you use it? • Visit: http://www.truecrypt.org

  4. Download and Install TrueCrypt

  5. Create a volume (container)

  6. Encrypted File Container

  7. Standard TrueCrypt Volume

  8. Volume Location

  9. Choose Encryption Option

  10. Choose Volume Size

  11. Choose Volume Password

  12. Actually format the volume

  13. Mount the Volume

  14. Volume Mounts like a drive

  15. Once the drive is mounted… • You can add any files or folders containing files you wish • Continue working on files as needed • Move files in and out of a mounted volume

  16. Dismount the volume when done

  17. Questions?

  18. Contact Information IT Security Office and IT Security Lab 1300 Torgersen Hall Randy Marchany – marchany@vt.edu Nick Pachis – npachis@vt.edu Rich Sparrow – rsparrow@vt.edu Will Urbanski – urbanski@vt.edu Phillip Kobezak –pkobezak@vt.edu IT Security Homepage www.security.vt.edu

More Related