Hardware Guides

  Home arrow Hardware Guides arrow TrueCrypt: Hiding Your Operating Syste...
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
HARDWARE GUIDES

TrueCrypt: Hiding Your Operating System
By: Jeff Prater
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1
    2010-10-13

    Table of Contents:
  • TrueCrypt: Hiding Your Operating System
  • Creating the Hidden Operating System, continued
  • Warnings While Creating the Hidden Operating System
  • Creating the Outer Volume
  • Encrypting the Hidden Volume
  • Move Your System to the Hidden Volume

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    TrueCrypt: Hiding Your Operating System


    (Page 1 of 6 )

    Welcome to the second part of a three-part tutorial on creating a hidden OS with TrueCrypt. In the first part we spent a lot of time getting the preparation out of the way. In this part, we'll actually create the hidden operating system. We'll also encrypt the hidden volume.

    Creating the Hidden Operating System

    Before you can create a hidden operating system, TrueCrypt must first be installed. TrueCrypt is available for free at its website: http://www.truecrypt.org/. The TrueCrypt installation is very simple. Follow these steps and you will have it installed and running in no time.

    Download TrueCrypt; double-click "TrueCrypt Setup 7.0.exe." If you are warned by Windows' User Access Control, click the "Yes" button.

    Accept the license agreement.

    Choose the "Install" option (I discussed the "Extract" option in a previous article).

    Keep the default installation directory and make sure all the check boxes are checked. Click the "Install" button.

    Wait for the installer to finish. Click the "OK" button when the installation completes.

    When prompted to read TrueCrypt's Beginner's Guide, you can select either "Yes" or "No" depending on whether or not you would like to read the guide now or bookmark it for future reading. This tutorial should, however, serve as a decent starter's guide.

    Click the "Finish" button.

    Once the installation is complete, run TrueCrypt by clicking the icon the installer created on your desktop, or by clicking the icon created in the Start menu.


    With the main TrueCrypt open, click the "Create Volume" button. This will start the TrueCrypt Volume Creation Wizard.




    Select the option to "Encrypt the system partition or entire system drive," and then click the "Next" button.



    More Hardware Guides Articles
    More By Jeff Prater

    blog comments powered by Disqus

    HARDWARE GUIDES ARTICLES

    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates

     




    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off