Welcome and thanks for reading my final three-part tutorial in the TrueCrypt series! When I first started my TrueCrypt tutorials, I introduced you to basic encryption techniques, such as creating encrypted file containers. Later tutorials introduced more complex encryption techniques, including the ability to encrypt your entire operating system. In this final series, I will show you how to completely hide your current operating system.
Before you begin, I would like to quickly summarize the encryption process. First, you will need to repartition your hard drive to make room for the hidden operating system. If your hard drive is already partitioned correctly, then you can skip this step.
Once TrueCrypt has an available partition, TrueCrypt will move your current Windows install to the partition behind your C: partition. Your current Windows install will become your hidden operating system.
After the hidden operating system is installed, you will reinstall Windows to the original partition. Once you finish reinstalling Windows, you will reinstall TrueCrypt and encrypt your current partition.
After the encryption process is complete, you will have two operating systems: the decoy system and the hidden system. Each system is accessible by the passwords you create during the encryption process.
Before you proceed with this tutorial, back up any important data on your computer to external media. While the chances of losing all your data are minimal, you should always prepare for the worst.
When you have completed the entire encryption process, and both the decoy and hidden systems are fully functional, your hard drive will look like this:
You will have three partitions:
Boot partition (contains the TrueCrypt boot loader).
"Hidden" partition. This will contain two volumes: the outer volume and the hidden volume. The outer volume is for data storage; the hidden volume will contain your hidden operating system.
**WARNING 1: THE CREATION OF A HIDDEN PARTITION CANNOT BE UNDONE (READ "DECRYPTING THE HIDDEN SYSTEM" FOR ADDITIONAL INFORMATION)! ALL CHANGES ARE PERMANENT!**
**WARNING 2: THE ENTIRE TUTORIAL, FROM START TO FINISH, COULD SPAN UP TO 24 HOURS. BE PREPARED TO LEAVE THE COMPUTER ON FOR EXTENDED PERIODS OF TIME..**
**WARNING 3: YOU MUST MEET ALL THE REQUIREMENTS TO SUCCESSFULLY COMPLETE THIS PROCESS AND PREVENT ANY DAMAGE TO THE INTEGRITY OF YOUR CURRENT OPERATING SYSTEM!**
KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set: status off