SlideShare uma empresa Scribd logo
1 de 38
How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
1. Download TrueCrypt. http://www.truecrypt.org/downloads
2. Accept the licensing agreement.
3. Begin the install process…
4. Select your setup options.
5. Click “OK” to acknowledge that TrueCrypt is installed.
6. You will see an option to view a beginner’s tutorial. It’s your call…
7. Click “Finish” to complete the install process.
8. Double-click the TrueCrypt icon to start the program.
9. To encrypt the whole system hard drive, click “Create Volume”.
10. Select “Encrypt the system partition or entire  system drive” and then click “Next”.
11. Select “Normal” and then click “Next”.
12. Select “Encrypt the whole drive” and then click “Next”.
13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
19. This screen confirms your encryption keys have been generated. Click “Next”.
20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
22. The “Windows Disc Image Burner” displays an initial message that the process has started…
23.  …then a message that it is finalizing the disc image…
24.  …then a message that it is actually burning the disc image to the recordable disc…
25. …and then a message that the disc image has been successfully burned. Click “Close”.
26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
29. This screen shows the System Encryption Pretest. Click “Test”.
30. Read or print the notes, as you wish, and then click “OK”.
31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
33.  …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
36. Once done, click “Finish”. Voila!  Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system.  Be assured no one else will, for that matter, unless they have the  correct password.

Mais conteúdo relacionado

Destaque

Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basicsDavid Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursDavid Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudDavid Busby, CISSP
 

Destaque (9)

MySQL 1, introduction
MySQL 1, introductionMySQL 1, introduction
MySQL 1, introduction
 
Effective user training
Effective user trainingEffective user training
Effective user training
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yours
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloud
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
 

Semelhante a How to Encrypt Your Laptop with TrueCrypt

Semelhante a How to Encrypt Your Laptop with TrueCrypt (20)

Vj software-win7
Vj software-win7Vj software-win7
Vj software-win7
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
vistasetup.ppt
vistasetup.pptvistasetup.ppt
vistasetup.ppt
 
Vistasetup
VistasetupVistasetup
Vistasetup
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Truecrypt
TruecryptTruecrypt
Truecrypt
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
 
Bad ram or ddr
Bad ram or ddrBad ram or ddr
Bad ram or ddr
 
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
 
Win7guide
Win7guideWin7guide
Win7guide
 
Support article1224
Support article1224Support article1224
Support article1224
 
Activating x entry 9.2020
Activating x entry 9.2020Activating x entry 9.2020
Activating x entry 9.2020
 
Os Virtualization
Os VirtualizationOs Virtualization
Os Virtualization
 
Kali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-StepKali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-Step
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 

Último

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

How to Encrypt Your Laptop with TrueCrypt

  • 1. How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
  • 2. 1. Download TrueCrypt. http://www.truecrypt.org/downloads
  • 3. 2. Accept the licensing agreement.
  • 4. 3. Begin the install process…
  • 5. 4. Select your setup options.
  • 6. 5. Click “OK” to acknowledge that TrueCrypt is installed.
  • 7. 6. You will see an option to view a beginner’s tutorial. It’s your call…
  • 8. 7. Click “Finish” to complete the install process.
  • 9. 8. Double-click the TrueCrypt icon to start the program.
  • 10. 9. To encrypt the whole system hard drive, click “Create Volume”.
  • 11. 10. Select “Encrypt the system partition or entire system drive” and then click “Next”.
  • 12. 11. Select “Normal” and then click “Next”.
  • 13. 12. Select “Encrypt the whole drive” and then click “Next”.
  • 14. 13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
  • 15. 14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
  • 16. 15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
  • 17. 16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
  • 18. Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
  • 19. 17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
  • 20. 18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
  • 21. 19. This screen confirms your encryption keys have been generated. Click “Next”.
  • 22. 20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
  • 23. 21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
  • 24. 22. The “Windows Disc Image Burner” displays an initial message that the process has started…
  • 25. 23. …then a message that it is finalizing the disc image…
  • 26. 24. …then a message that it is actually burning the disc image to the recordable disc…
  • 27. 25. …and then a message that the disc image has been successfully burned. Click “Close”.
  • 28. 26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
  • 29. 27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
  • 30. 28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
  • 31. 29. This screen shows the System Encryption Pretest. Click “Test”.
  • 32. 30. Read or print the notes, as you wish, and then click “OK”.
  • 33. 31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
  • 34. 32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
  • 35. 33. …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
  • 36. 34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
  • 37. 35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
  • 38. 36. Once done, click “Finish”. Voila! Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system. Be assured no one else will, for that matter, unless they have the correct password.