How to use VeraCrypt's advanced features to secure important files
It's free, open source, and available on all major desktop operating systems. Anyone can use VeraCrypt's basic functions for files that need to be kept safe. But if you're looking to take file security to the next level, VeraCrypt can also protect you with many advanced features.
How to encrypt a partition or an external hard drive
Users often create container files encrypted with VeraCrypt. But the program is also capable of encrypting entire drives and partitions. Windows users can encrypt their system drives and partitions.
VeraCrypt users on any platform can also encrypt USBs and other types of external drives. In fact, it is one of the best programs for USB encryption. To begin this process, open the VeraCrypt Volume Creation Wizard . Select Encrypt a non-system partition/drive and click Next.
When choosing a location for the encrypted volume, VeraCrypt will prompt you to select a drive or partition. Click Select Device.
You have the option to choose an entire non-system drive or a partition in the drive to encrypt. You can choose to create multiple partitions in any external hard drive. Then you can encrypt just one partition of the drive. Click OK once you have selected the drive or partition to encrypt.
Please note that any drive or partition you select will have its data erased and its files destroyed.
Like any other file or drive, VeraCrypt is also prone to unwanted data deletion or corruption. This is why you should always back up your files.
Only click Yes on the pop-up warning if you are sure about encrypting your selected drive.
If you are going to encrypt a non-system drive with multiple partitions, make sure you format the drive first to delete those partitions. Click Next on the wizard.
As usual, VeraCrypt will prompt you to choose your drive's encryption options, password, and file format. Click Format , then select Yes when you're ready to create your encrypted external hard drive.
Once you format your encrypted device, it will no longer be accessible outside of VeraCrypt. To mount your encrypted device, select it with Select Device , click Mount and enter your password.
You can use the encrypted device like any other VeraCrypt volume and unmount it as usual. To decrypt your device, format the drive/partition using your desktop's built-in drive management software.
How to use other protections for VeraCrypt volumes
VeraCrypt's default volume settings combined with a strong password provide high security for most users. But they may not be enough if you, your team, or your business are vulnerable to certain threat actors. To ensure that your precious data is safe, VeraCrypt has even more features to make encrypted volumes uncrackable.
Using encryption and hashing algorithms
On the Volume Creation Wizard , you can choose between many options to encrypt and hash your volume. The default AES algorithm is a common but secure type of encryption. But you are free to use other ciphers like Twofish and Serpent. You can even stack multiple algorithms on top of each other.
You can choose to add your own password hashing algorithm or method. The hash algorithm determines how your password is converted into a hash that VeraCrypt can use to decrypt your volume. Using a strong hashing method like SHA-512 or Whirlpool, along with a high PIM number, will slow down any brute-force attacks on your volume.
You can test the speed of the hash and encryption on your machine by clicking Benchmark. Faster encryption and hash times mean shorter drive load times, but slower hash times mean better protection from brute-force attacks.
Use PIM . number
To put a Personal Iterations Multiplier (PIM) Number on the volume, tick the Use PIM checkbox on the Volume Password window . Clicking Next will take you to a window where you can set the PIM for your volume.
The volume's PIM determines how many times VeraCrypt will need to hash your password from plain text. The password of the default VeraCrypt volume (SHA-512) will be hashed 500,000 times. You can set the PIM volume even higher for better security.
Make sure you remember the volume PIM numbers if they are not set to default. Entering the wrong PIM number will result in the wrong hash. VeraCrypt cannot decrypt volumes with the wrong hash, even if your password is correct.
Using Keyfiles
You can get even better security by using files that act as keys for your encrypted volume. To add a keyfile for a volume, mark the Use keyfiles check box on the Volume Password window , and then click Keyfiles.
On the Select Security Token Keyfiles screen , you can set any file or directory path to use as the keyfile volume. You can use Add Token Files to set a hardware security key as your keyfile. If you keep your keyfile in a USB external to the volume's drive, your USB can also act as a physical security key. If you need VeraCrypt to generate a new keyfile, click Generate Random Keyfile .
When mounting a volume with a custom Volume PIM and keyfile, you need to tick the Use PIM and Use keyfiles checkboxes , and then click the Keyfiles button. This will allow you to enter the correct PIM and key file, along with the password, to open the encrypted volume.
Make changes to existing VeraCrypt volumes
After you create an encrypted volume, you can still make changes to the way you decrypt it. To do this, click Volume Tools on the main VeraCrypt window. You will have the option to change or delete the password, PIM and keyfile of the volume. You can do this if you need to change your password often.
You should read it
- VeraCrypt - Free disk encryption tool
- Instructions for USB encryption with VeraCrypt
- How to encrypt Windows system drive with VeraCrypt
- Top 5 best USB encryption software
- Protect data on CD with Secure CD
- Secure Android smartphone in a professional way
- How to set PDF file password using Adobe Acrobat
- The safest and most secure way to encrypt data
- Hide and protect data in Windows
- How to Set Password for Folder and File in Windows
- How to completely delete data on the computer?
- How to hide important data files and applications in Android devices
Maybe you are interested
How to enable iPhone lock screen player volume bar
Instructions for limiting iPhone speaker volume
How to adjust Apple Watch volume, adjust Apple Watch volume
Quickly fix Unmountable Boot Volume error on Windows 10/11
How to increase music and video volume without distorting the sound
Cannot Delete Volume drive D, what is the reason?