Hardware Guides

  Home arrow Hardware Guides arrow Encrypt Windows: TrueCrypt Techniques
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
HARDWARE GUIDES

Encrypt Windows: TrueCrypt Techniques
By: Jeff Prater
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 3
    2010-07-28

    Table of Contents:
  • Encrypt Windows: TrueCrypt Techniques
  • Preparation
  • Encrypting Windows
  • Launching the TrueCrypt Wizard

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    Encrypt Windows: TrueCrypt Techniques


    (Page 1 of 4 )

    In my previous articles, you have learned how to encrypt individual files and folders, USB flash drives, hard drive partitions, and even entire hard drives. All these tutorials have provided you with a strong foundation to understand the inner workings of TrueCrypt. You now have the ability to take advantage of about 80% of TrueCrypt's built-in features. In this tutorial, you are going to take TrueCrypt to the next level—you are going to encrypt your Windows 7 operating system. This is the first part of a three-part series.

    Encrypting your operating system provides many benefits. For starters, it requires the user to enter a password that cannot be cracked by password cracking applications like Ophcrack or Cain & Abel. Another benefit of encrypting your operating system is you have the option to encrypt either the Windows partition (C:) or the entire hard drive.

    If you choose to encrypt just the partition, you can rest assured knowing everything you install on your computer or store in your user profile will always be encrypted and inaccessible to unauthorized users. On the other hand, if you choose to encrypt the entire hard drive, everything that is written to the drive will remain encrypted, even if the hard drive is removed from the computer and connected to another computer.

    Encrypting your Windows hard drive also provides increased security for mobile computers like netbooks, tablets, and laptops. If your laptop is ever stolen or misplaced, your data will remain protected, even if an unauthorized user tries to start your computer or remove the hard drive.

    While the ability to encrypt your Windows install may seem like a very powerful feature of TrueCrypt, the developers implemented an additional feature to further strengthen this method of encryption. TrueCrypt also has the ability to create a "hidden" Windows install. This is very similar to the standard and hidden volumes you can create when encrypting USB flash drives, partitions, and hard drives. If you choose to create a hidden Windows install, TrueCrypt will install a decoy version of Windows, to which you can provide the password should the situation arise.

    In this tutorial, you will learn how to encrypt your Windows installation. In my next and final tutorial in the TrueCrypt series, you will learn how to encrypt Windows with the addition of a hidden Windows install.

    More Hardware Guides Articles
    More By Jeff Prater

    blog comments powered by Disqus

    HARDWARE GUIDES ARTICLES

    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off