File nascosto




















In addition, you can use the built in Disk Utility on most Linux distributions to create an encrypted volume on a USB storage device. Unlike VeraCrypt, however, this will only allow you to access your files on other Linux computers. Step 1.

Double click on the installer file named "VeraCrypt Setup 1. VeraCrypt will ask you if you want to allow the installer to make changes to your PC, as shown below. Step 2. Click [Yes] to run the VeraCrypt Setup program, which will activate the license screen. Step 3. Check the box labelled I accept the license terms to enable the [Next] button, then click [Next].

You may then choose whether you want to install VeraCrypt or extract it for use in portable mode. These traces will not reveal the contents of encrypted files, but they may reveal the fact that VeraCrypt was used on that computer. Note : This section of the guide covers installing VeraCrypt on your computer.

To learn more about using VeraCrypt in portable mode , please refer to the Portable VeraCrypt section. Step 4. Click [Next] and choose where to install VeraCrypt. Step 5. Click [Install] to begin installing VeraCrypt in the default location on your computer as shown below.

Step 6. Click [OK] to acknowledge the completion of the installation and consider making a donation to those who develop and maintain VeraCrypt. Step 7 Click [Finish] and consider reading the VeraCrypt tutorial. Step 8. Click either button to finish installing VeraCrypt. Depending on your installation preferences, you may now have a VeraCrypt shortcut on your desktop.

And, if having encryption software on your computer could get you into serious trouble, you should remove VeraCrypt entirely, then extract it onto a USB storage device in portable mode. Note : Users are encouraged to consult the VeraCrypt Beginner's Tutorial after working through this guide. VeraCrypt lets you create two kinds of encrypted volumes: Hidden volumes and Standard volumes.

In this section, you will learn how to create a standard volume. If you want to create a Hidden volume , you should complete this section, then continue on to Creating a hidden volume. To create a Standard volume with VeraCrypt , perform the following steps. A VeraCrypt container file is an encrypted volume that is stored within a single file.

This container can be renamed, moved, copied or deleted like any other file. In this section, we will create a container file. Please refer to the VeraCrypt documentation to learn more about the other options. Click [Next] to select which type of volume you would like to create.

Click [Select File…] to choose a location. Figure 5: Specify the location and filename of the VeraCrypt container you are about to create. Choose a location and specify a name for the VeraCrypt container file you are about to create. You will need to remember where you put it and what you call it. In this section, we will create our container on the Desktop and name it My Volume. If you want to create a VeraCrypt standard volume on a USB storage device instead, simply navigate to the device rather than to your Desktop , and enter a file name.

Tip : You can use any file name or file extension for your container. For example, you can name your container file recipes. This is one way you can help disguise the existence of a VeraCrypt container, but it will not work against someone who has the time and resources to search your device thoroughly.

Step 7. Click [Next] to activate the Encryption Options screen. Here, you can choose a specific method or algorithm to use when encrypting and decrypting the files stored within your VeraCrypt container. The default options are considered secure, so you should probably leave them as they are.

Step 9. Click [Next] and determine how large to make your encrypted volume. The Volume Size window lets you specify the size of the container you are about to create. In this section, we will create a MB volume, but you might want to specify a different size. Consider the number of files — and, more importantly, the types of files — you intend to store in your encrypted volume.

Image files and videos, in particular, can fill up a small VeraCrypt container very quickly. Tip : If you think you might want to backup your container file on a CD, you should choose a size that is MB or less. For a DVD backup, it should be 4. If you intend to upload the container file to an online storage service, you will have to determine a reasonable size based on the speed of your Internet connection.

Step Type the size of the volume you would like to create. Then click [Next] to choose a passphrase. The stronger the passphrase, the better. You don't have to choose your own passphrases or even remember them! Please refer to the Create and maintain secure passwords and KeePassX guides to learn more about good passphrase practices.

Type your passphrase and then re-type your passphrase into the Confirm field to activate the [Next] button. If your passphrase is weak, you will see a warning. Consider changing it! Though VeraCrypt will accept any passphrase, your data will not be secure unless you choose a strong one. Click [Next] to select a file system type.

Click [Format] to begin creating your standard volume. However, if you intend to store files that are larger than 4 GB for a single file , then you will have to select a different file system type. VeraCrypt is now ready to create a standard encrypted volume within a container file. If you move your mouse within the VeraCrypt Volume Creation Wizard window, it will produce random data that will help strengthen the encryption. VeraCrypt will now create a file named My Volume on the Desktop , as specified above.

This file will contain a MB VeraCrypt standard volume container , which you can use to store your files securely. VeraCrypt will let you know when it is done. Click [OK] to acknowledge the completion of the creation process and return to the volume creation wizard.

If you click [Next] , VeraCrypt will begin walking you through the process of creating another encrypted volume. In VeraCrypt, a hidden volume is stored within your encrypted standard volume , but its existence is concealed. Even when your standard volume is mounted , it is not possible to confirm the existence of a hidden volume without its passphrase which is separate from that of the standard volume.

A hidden volume is a bit like a secret compartment in a locked briefcase. You store decoy files that you do not mind having confiscated in the briefcase while keeping your most sensitive files in the secret compartment. The point of a hidden volume is to hide its own existence, thereby hiding the files within it, even if you are forced to reveal the passphrase to your standard volume. For this technique to be effective, you must create a situation where the person demanding to see your files will be satisfied by what you show them.

To do this, you may want to implement some of the following suggestions:. As mentioned above, a hidden volume is technically stored inside a standard volume. This is why VeraCrypt sometimes refers to them as "inner" and "outer" volumes. Fortunately, you do not have to mount the latter to access the former. Instead, VeraCrypt allows you to create two separate passphrases: one that opens the outer or "decoy" standard volume one that opens the inner hidden volume.

There are two different ways to create a hidden volume , and they are both very similar to the process of creating a standard volume. Normal mode walks you through the process of creating both a standard volume and the hidden volume within it. You are creating a briefcase with a secret compartment.

Direct mode assumes that you already have a standard volume in which you want to create a hidden volume. You already have the briefcase, but you want to add the secret compartment. In this section, we will focus on direct mode. If you do not yet have a standard volume , simply follow the steps outlined in Creating a standard volume , then return to this section. Click [Next] to accept the default Create an encrypted file container option. Check the [Hidden VeraCrypt volume] option.

Click [Next] to choose whether you want to create your hidden volume using normal mode or direct mode. Click [Next] to select your existing standard volume. Click [Select File] and locate your standard volume container file. If you want to create a VeraCrypt container on a USB storage device, simply navigate to the device rather than to a folder on your computer before choosing a file name. Click [Next] to enter the passphrase of your existing standard volume.

Type in the passphrase you selected when creating the standard volume you have selected. Click [Next] to prepare this standard volume for the addition of a hidden volume. Click [Next] , and you will be prompted to specify the size of the Hidden Volume you are about to create. As when you created your standard volume , consider the number and types of files you intend to store in your hidden volume. Also, make sure to leave some space for decoy files in your standard volume. If you select the maximum size available for the Hidden Volume , you will not be able to put any more files into the existing standard volume.

In this section, we will create a MB hidden volume inside a MB standard volume. This will leave approximately 50 MB of space for decoy files. Click [Next] to choose a passphrase for your hidden volume. You must now choose a passphrase for the hidden volume that is different from the one you chose for your standard volume. Again, remember to choose a strong passphrase.

Please refer to the Create and maintain strong passwords section to learn more. Tip : If you use a password manager such as KeePassX and are concerned about being pressured to reveal the contents of your VeraCrypt container, you can store the passphrase for your decoy standard volume in KeePassX , but you should memorise the passphrase for your hidden volume.

Otherwise, by handing over your KeePassX passphrase, you will also reveal your hidden volume passphrase. Choose a passphrase and type it in twice. Click [Next] to activate the Hidden Volume Format screen. Click [Format] to format the hidden volume. When VeraCrypt is done, it will display a warning about protecting the files in your hidden volume when adding content to your standard volume. Normally, when you open your outer standard volume , both VeraCrypt and Windows will think that it occupies all of the space available within your encrypted container file.

About MB in this example. In fact, we created a MB hidden volume and left only about 50 MB for decoy files in our standard volume. This is because, if it did warn you, it would reveal to an observer that you had reserved space for a hidden volume. Instead, it will allow you to copy that 60 MB file. And, by doing so, it will delete or corrupt the files inside your hidden volume.

In other words, this design is based on the assumption that you would rather lose the contents of your hidden volume than reveal their existence. So, whenever you want to add decoy files to your standard volume, you must check the protect hidden volume against damage If you enable this feature, VeraCrypt will be able to warn you if you try to copy too much data into your outer volume. Clearly, entering both passphrases in front of someone else will reveal the existence of your hidden volume , so this is something you should only do in private or in the company of those you trust.

The specific steps required to modify the contents of your standard volume are covered in more detail in the following section, under Protecting your hidden volume when modifying the contents of your outer volume. Click [OK] to finish creating your hidden volume. Click [OK] to return to the main VeraCrypt window. You can now store files in your hidden volume. They will remain undetectable even to someone who has obtained the passphrase for your standard volume.

In VeraCrypt, to mount a volume is to make it available for use. When you successfully mount a volume it appears as if you have attached a portable storage device to your computer. You can use this disk as usual to access, create, modify or delete files and folders.

When you are done using it, you can dismount it and the new disk will disappear. You mount a hidden volume the same way as a standard volume. Depending on which passphrase you enter, VeraCrypt will determine whether to mount the standard or hidden volume. Select a drive from the list in the main window of VeraCrypt.

Note : In Figure 1 , we have chosen to mount our encrypted volume on drive F:. You may choose any of the drive letters shown each time you mount a volume. Click [Select File…] and locate your VeraCrypt container file. Select the container file you want to mount, then click [Open] to return to the VeraCrypt main window.

The location of your container file will be displayed just to the left of the [Select File Click [Mount] to enter your passphrase. To open a standard volume in a container that holds a hidden volume — while being observed by someone from whom you would like to hide the existence of that volume — enter your standard volume passphrase.

To open a standard volume in a container that holds a hidden volume — in order to modify your "decoy" files and assuming you are not being observed — please read about protecting your hidden volume when modifying the contents of its outer volume!

Click [OK] to begin mounting the standard volume. If the passphrase you entered is incorrect, VeraCrypt will prompt you to enter it again. If it is correct, your encrypted volume will be mounted as follows:. The volume shown below is empty. Once you have stored files there, they will be accessible and editable whenever you open the volume.

This virtual disk behaves like an external storage device, except that it is fully encrypted. You can copy files to and from it just like you would for a USB storage device.

By dragging and dropping them, for example, or by saving them directly to the volume from within another application. Files are automatically encrypted when you copy, move or save them to this virtual disk. And, when you move a file out of the VeraCrypt volume, it is automatically decrypted. If your computer is shutdown or switched off suddenly, the encrypted volume will remain inaccessible until it is mounted again.

To protect your sensitive files, you must dismount your VeraCrypt volume when you are not using it. Keep this in mind when you step away from your computer and in circumstances where you face an increased risk of confiscation or theft. Leaving your encrypted volumes mounted is like owning a safe and leaving the door wide open. Sign in. United States English. Ask a question. Quick access.

Search related threads. Remove From My Forums. Answered by:. Archived Forums. Windows 10 General. Sign in to vote. Wednesday, October 28, PM. Wu Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help. Thursday, October 29, AM. Can you explain what the problem is or why you are looking for the files in this folder?

It puzzles me about the IE folder, I don't have any problem with it, thanks. Thang Mo.



0コメント

  • 1000 / 1000