Hardware Guides

  Home arrow Hardware Guides arrow Creating a Hidden OS with TrueCrypt
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
HARDWARE GUIDES

Creating a Hidden OS with TrueCrypt
By: Jeff Prater
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2
    2010-10-12

    Table of Contents:
  • Creating a Hidden OS with TrueCrypt
  • Preparing Your Hard Drive
  • Calculating Partition Size
  • Using GParted Live for Partitioning
  • Partitioning with GParted Live, continued
  • Formatting Your New Partition for TrueCrypt

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    Creating a Hidden OS with TrueCrypt


    (Page 1 of 6 )

    Welcome and thanks for reading my final three-part tutorial in the TrueCrypt series! When I first started my TrueCrypt tutorials, I introduced you to basic encryption techniques, such as creating encrypted file containers. Later tutorials introduced more complex encryption techniques, including the ability to encrypt your entire operating system. In this final series, I will show you how to completely hide your current operating system.

    Before you begin, I would like to quickly summarize the encryption process. First, you will need to repartition your hard drive to make room for the hidden operating system. If your hard drive is already partitioned correctly, then you can skip this step.

    Once TrueCrypt has an available partition, TrueCrypt will move your current Windows install to the partition behind your C: partition. Your current Windows install will become your hidden operating system.

    After the hidden operating system is installed, you will reinstall Windows to the original partition. Once you finish reinstalling Windows, you will reinstall TrueCrypt and encrypt your current partition.

    After the encryption process is complete, you will have two operating systems: the decoy system and the hidden system. Each system is accessible by the passwords you create during the encryption process.

    Before you proceed with this tutorial, back up any important data on your computer to external media. While the chances of losing all your data are minimal, you should always prepare for the worst.

    When you have completed the entire encryption process, and both the decoy and hidden systems are fully functional, your hard drive will look like this:


    You will have three partitions:

    • Boot partition (contains the TrueCrypt boot loader).

    • Decoy partition.

    • "Hidden" partition. This will contain two volumes: the outer volume and the hidden volume. The outer volume is for data storage; the hidden volume will contain your hidden operating system.

    **WARNING 1: THE CREATION OF A HIDDEN PARTITION CANNOT BE UNDONE (READ "DECRYPTING THE HIDDEN SYSTEM" FOR ADDITIONAL INFORMATION)! ALL CHANGES ARE PERMANENT!**

    **WARNING 2: THE ENTIRE TUTORIAL, FROM START TO FINISH, COULD SPAN UP TO 24 HOURS. BE PREPARED TO LEAVE THE COMPUTER ON FOR EXTENDED PERIODS OF TIME..**

    **WARNING 3: YOU MUST MEET ALL THE REQUIREMENTS TO SUCCESSFULLY COMPLETE THIS PROCESS AND PREVENT ANY DAMAGE TO THE INTEGRITY OF YOUR CURRENT OPERATING SYSTEM!**

    More Hardware Guides Articles
    More By Jeff Prater

    blog comments powered by Disqus

    HARDWARE GUIDES ARTICLES

    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off