Hardware Guides

  Home arrow Hardware Guides arrow TrueCrypt Hidden OS: Completing the De...
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
HARDWARE GUIDES

TrueCrypt Hidden OS: Completing the Decoy
By: Jeff Prater
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 5
    2010-10-14

    Table of Contents:
  • TrueCrypt Hidden OS: Completing the Decoy
  • Installing the Decoy System
  • Booting into the Decoy or Hidden System
  • Decrypting the Hidden System
  • Conclusion

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    TrueCrypt Hidden OS: Completing the Decoy


    (Page 1 of 5 )

    In this final part of a three-part series on creating a hidden operating system with TrueCrypt, we'll complete the process with some cleanup. We'll also install the decoy system, and show you how to boot into the decoy or hidden system.

    Cleanup After Starting Hidden System

    Now that your hidden system is stated, TrueCrypt has some house-cleaning to perform. This consists of wiping the first partition so all the data are thoroughly destroyed. Click the "Next" button to start this process.




    TrueCrypt will now detail the actions it is about to perform, including an explanation of why the first partition needs to be securely erased. Click the "Next" button to continue.




    Next you will select a wipe mode. You have four wipe modes to choose from:

    • 1-pass random data. Fastest, least secure.

    • 3-pass (US DoD 5220.22-M). Department of Defense recognized; slower than 1-pass, but more secure.

    • 7-pass (US DoD 5220.22-M). Department of Defense recognized; slower than 3-pass, but more secure.

    • 35-pass ("Gutmann"). Completes 35 passes of random data. This is more secure than the 7-pass method, but it could take days for this process to complete.

    For testing purposes, and since it requires the least amount of time, select the "1-pass random data" method, and then click the "Next" button.




    Click the "Wipe" button.




    TrueCrypt will prompt a warning about the entire first partition being erased. Click the "OK" button to continue.




    In order for TrueCrypt to truly create random data, it will ask you to move your mouse randomly across the window. This action will generate a random number which TrueCrypt will use during the wiping process. After you have moved your mouse around the window for several seconds, click the "Continue" button.



    Depending on the wipe mode you selected earlier, this process can span several minutes to several days.




    Once the wipe process is complete, TrueCrypt will prompt a message detailing the success of the process. Click the "OK" button to close the window. 




    TrueCrypt will now present instructions for installing and creating the decoy system. You can print these instructions out as a backup, but I will detail these steps in the next section. This window will display during every boot of the hidden system until a decoy system is installed. Click the "OK" button to continue.




    TrueCrypt will present another warning about the importance of installing the same version of Windows as used by the hidden system. This is necessary because both systems will share a single boot partition. Click the "OK" button to continue.




    The entire hidden system encryption process is now complete. Now it is time to install the decoy system. Click the "Exit" button to close TrueCrypt and continue working with your computer.




    This step is a good stopping point. You do not have to create the decoy system now. If you want to wait a few days and then create it, that is perfectly fine.

    More Hardware Guides Articles
    More By Jeff Prater

    blog comments powered by Disqus

    HARDWARE GUIDES ARTICLES

    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates

     




    © 2003-2014 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off