Welcome to the second part of a three-part tutorial on creating a hidden OS with TrueCrypt. In the first part we spent a lot of time getting the preparation out of the way. In this part, we'll actually create the hidden operating system. We'll also encrypt the hidden volume.
Creating the Hidden Operating System
Before you can create a hidden operating system, TrueCrypt must first be installed. TrueCrypt is available for free at its website: http://www.truecrypt.org/. The TrueCrypt installation is very simple. Follow these steps and you will have it installed and running in no time.
Download TrueCrypt; double-click "TrueCrypt Setup 7.0.exe." If you are warned by Windows' User Access Control, click the "Yes" button.
Accept the license agreement.
Choose the "Install" option (I discussed the "Extract" option in a previous article).
Keep the default installation directory and make sure all the check boxes are checked. Click the "Install" button.
Wait for the installer to finish. Click the "OK" button when the installation completes.
When prompted to read TrueCrypt's Beginner's Guide, you can select either "Yes" or "No" depending on whether or not you would like to read the guide now or bookmark it for future reading. This tutorial should, however, serve as a decent starter's guide.
Click the "Finish" button.
Once the installation is complete, run TrueCrypt by clicking the icon the installer created on your desktop, or by clicking the icon created in the Start menu.
With the main TrueCrypt open, click the "Create Volume" button. This will start the TrueCrypt Volume Creation Wizard.
Select the option to "Encrypt the system partition or entire system drive," and then click the "Next" button.
KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set: status off