Hardware Guides

  Home arrow Hardware Guides arrow Encrypt a Single-Boot Windows System: ...
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
HARDWARE GUIDES

Encrypt a Single-Boot Windows System: TrueCrypt Techniques
By: Jeff Prater
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 3
    2010-07-29

    Table of Contents:
  • Encrypt a Single-Boot Windows System: TrueCrypt Techniques
  • Creating the Rescue Disk
  • Wipe Mode
  • Verifying the Encryption Information
  • The Encryption Process

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    Encrypt a Single-Boot Windows System: TrueCrypt Techniques


    (Page 1 of 5 )

    In this second part of a three-part series on using TrueCrypt to encrypt your Windows 7 operating system, I'll walk you through the process of encrypting a single-boot system. We'll cover creating the rescue disk, wipe mode, and more.

    Encrypting a Single-Boot System 

    To keep this tutorial simple, I will show you how to encrypt a single-boot system. Select the "Single-boot" option and click the "Next" button.

     

    Now you will select the encryption method you wish to apply to the volume. The default "AES" encryption algorithm and "RIPEMD-160" hash algorithm are proven and recommended for their robust protection and performance. Once you have made your selections, click the "Next" button.


    Now you will enter the volume's password. Keep in mind the standard volume encryption method does not protect you with a hidden volume should you be required to divulge your password. This password is the only means to keep this volume secure, so make sure you choose a very strong password. Once you have entered your password, click the "Next" button.


    This step generates a random number from your mouse movements based on the hash algorithm you selected earlier. It is important to move your mouse around the window for a few seconds so a truly random number can be generated. You will see the "Current pool content (partial)" contents change whenever you move your mouse. After you have moved the mouse around the window a few times, click the "Next" button.


    TrueCrypt will now inform you that all the necessary encryption information has been created. If you want to create new keys, you can click the "Back" button and repeat the encryption process. Otherwise, click the "Next" button to continue.


     

    More Hardware Guides Articles
    More By Jeff Prater

    blog comments powered by Disqus

    HARDWARE GUIDES ARTICLES

    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off