Protects Flash drive data in a comprehensive way with TrueCrypt application

TipsMake.com - Today, the requirements and requirements of the security field, especially for personal data, are becoming more strict and demanding. What methods do you usually use to protect the amount of information and data safe from today's threats? In the tutorial article below, we will cover the basic steps to ensure personal data in the Flash drive with the famous security tool - TrueCrypt.

Create TrueCrypt Volume partition:

First, copy all the protected data to any folder on the hard drive. After finishing the setup process below, it will copy back to the USB drive. Technically, this process will create an encrypted file on the Flash drive, and there is nothing different from the regular TrueCrypt creation process. From the Tools menu, select the Volume Creation Wizard:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 1

Here, we do not need to encrypt non-system partitions because this process will prevent the system from downloading the required files needed to combine TrueCrypt volumes on the Flash drive. This also means that the computer used to access the data later is required to be installed with TrueCrypt :

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 2

Select Standard TrueCrypt volume in the next window:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 3

Set up the fixed file to create (* .tc) on the Flash drive:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 4

Other encryption options (you can keep the default level):

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 5

Next is the space needed for encrypted partitions, at least 10 MB to TrueCrypt can 'identify' the Flash drive later:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 6

Set password protection:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 7

And patiently wait for this process to end:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 8

 

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 9

Download TrueCrypt's binary file to the Flash drive:

Besides, if we want to access and use encrypted partitions on normal computers (without TrueCrypt installed) it is imperative to download the necessary files to that system first. At the Tools menu, select the Traveler Disk Setup:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 10

The program will display the message as shown below:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 11

We will return to this message in the next section of the article


In the File Settings section, select the correct Flash drive on the computer. At AutoRun Configuration , select Auto-mount the TrueCrypt volume and continue the setup as follows:

- Enter the set file name of TrueCrypt at the previous step

- Select First available of Mount volume as driver letter

- Check the box Open Explorer window for mounted volume

Then press Create to start this process:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 12

Before continuing, you need to pay attention to the following requirement if TrueCrypt successfully combines an encrypted partition on any computer:

- Requires TrueCrypt on the computer

- Users must have Administrator rights

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 13

After everything needs to be done on the completed Flash drive, we will see the TrueCrypt icon in the Windows Explorer window :

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 14

When the TrueCrypt Traveler Disk mode has been successfully established, the process of accessing and using data in the USB drive is as simple as the following:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 15

Here, we will return to the pop-up notice board above. That's for the USB drive to work automatically when we plug it into the computer, but in fact today, most Windows computers have turned off Autorun function. And so, users will have to perform the process of 'identifying' TrueCrypt partitions manually, but if it is logical, it is not logical. Simply because people cannot combine and use the data with just a few clicks. Therefore, focus and follow the next steps.

Open the autorun.inf file , then copy the entire text of the line starting with open =

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 16

Then create a new text file, name it MountTC.bat and paste the copied code. When operating, this batch file will automatically combine the TrueCrypt partition on the Flash drive into the computer:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 17

Then, go back to the autorun.inf file and copy the following code in the line shelldismountcommand =

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 18

Continue to create new text file and name it DismountTC.bat, paste the above code. When running, this batch file is responsible for removing TrueCrypt partitions on the system:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 19

2 batch files just created, located in the same folder as the other files on the USB drive:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 20

 

Access TrueCrypt partition:

Back to our main problem, after connecting the Flash drive to the computer, if the TrueCrypt partition is not automatically activated, run MountTC.bat . And don't forget that on that computer there must be TrueCrypt preinstalled or an Administrator with an administrator right. The UAC bulletin board will display in case there is no TrueCrypt installed, click Continue to continue. Then, enter the access password of this partition:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 21

Immediately, the primary partition is incorporated into the system, and the encrypted data will be displayed. The rest is to copy the protected files into this folder, and of course, no one can access them without a password:

Protects Flash drive data in a comprehensive way with TrueCrypt application Picture 22

When finished, run the DismountTC.bat file to remove TrueCrypt partition from your computer. The above implementation process is slightly complicated, but the security effect is extremely secure.

Besides, you can refer to the sample video tutorial below:

Good luck!

5 ★ | 1 Vote

May be interested

  • How to detect your PC and email is being monitored?Photo of How to detect your PC and email is being monitored?
    first of all, to monitor someone's computer means that they can see everything you are doing on your computer at a certain time. it is dangerous if you reveal information about individuals, corporate confidential information is very harmful. this article will guide you to detect these threats.
  • The best computer protection softwarePhoto of The best computer protection software
    viruses, malware, worms, ... are malicious software with your computer. anyone who has been using a computer knows them or at least has heard about them.
  • Use Kaspersky Security Suite CBE 11 for freePhoto of Use Kaspersky Security Suite CBE 11 for free
    currently, kaspersky security suite cbe security application has officially got version 11, based on the kaspersky 2011 engine platform. this name seems quite strange to many users, but in essence, this program not much different from kaspersky internet security 2011, except to change the name and time announced by computerbild ...
  • Set the shutdown or hibernate time for the computerPhoto of Set the shutdown or hibernate time for the computer
    for many computer users, i am very interested and want to know how to turn off the computer (shutdown) or hibernate (hibernate) at a set time. the easiest way to do this is to set the open application windows to close automatically and the computer will shut-down or switch to hibernate mode after a specified time through power settings. option.
  • Manage information systems effectivelyPhoto of Manage information systems effectively
    on february 25, 2011, ibm expanded its portfolio of information management (im) software and introduced watson's computing system in vietnam market.
  • Simple steps to secure your smart phone dataPhoto of Simple steps to secure your smart phone data
    anyone interested in securing personal data stored on their smartphones should think carefully before downloading applications that are unclear or unreliable.