Hardware Guides

  Home arrow Hardware Guides arrow TrueCrypt: Encrypting a Hidden Volume
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Hardware Guides  
Hardware News  
Input Devices  
Mobile Devices  
Networking Hardware  
PC Cooling  
PC Speakers  
Power Supply Units  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

TrueCrypt: Encrypting a Hidden Volume
By: Jeff Prater
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1

    Table of Contents:
  • TrueCrypt: Encrypting a Hidden Volume
  • Locating the Volume
  • Setting Up the Volume
  • Formatting the Volume
  • Mounting the Volume
  • Hidden Volume Warning

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article


    TrueCrypt: Encrypting a Hidden Volume

    (Page 1 of 6 )

    In this second part of a three-part series on encrypting hard drives with TrueCrypt, you will learn how to create an encrypted hard drive with a hidden volume. This can be useful if you're dealing with very sensitive information.

    Creating an Encrypted Hard Drive with a Hidden Volume

    As I mentioned in the introduction to the previous article, TrueCrypt can create two types of volumes: a standard volume and a hidden volume. With a standard volume, the volume is protected by a single password. With a hidden volume, two volumes are created: an outer volume and a hidden volume. Each volume is protected by a different password.

    If you are in a situation in which you may be required to divulge the encryption password to your hard drive, you should create an encrypted hard drive protected with a hidden volume. This way, if you are ever required to provide the password, you can simply provide the password to the outer (or decoy) volume and maintain plausible deniability against the existence of a secondary (or hidden) volume.

    Before you begin, just a word of caution. This process will encrypt the entire hard drive, and it will destroy ALL the data on the hard drive in the process. If this hard drive contains any data you will need in the future, you should back up your data before proceeding.

    Once you are ready to encrypt your hard drive, open TrueCrypt and click the “Create Volume” button on the main window. This will start the wizard which will help you create your first encrypted hard drive.

    You will now select the volume type. Since you are encrypting an entire hard drive, select the “Encrypt a non-system partition/drive” option, then click the “Next” button.

    Next, you will select the volume type. Since you are creating a hidden volume, select the “Hidden TrueCrypt volume” option, then click the “Next” button.

    Since you are creating a new volume, select the “Normal Mode” option. You would select the “Direct Mode” option if you wanted to create a hidden volume inside an existing standard volume. Once you have made the appropriate selection, click the “Next” button.

    More Hardware Guides Articles
    More By Jeff Prater

    blog comments powered by Disqus


    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off