Everyone knows that if the mobile hard disk is lost, the data inside is completely freely readable and writable for other users. If you are in business or sales. That may cause serious losses to the company's interests. So we have to use technology to arm ourselves and protect our key data. On the Windows system platform, there are many ways to encrypt data, such as the EFS file encryption system. But today I mainly explain how to protect the hard disk data security from another aspect, that is to take advantage of the TrueCrypt software.
Create a virtual encryption disk
After installing the software on the computer, the Language in the directory will be extracted. Copy the .zh-cn file to the installation directory, so that it can be displayed in Chinese interface. Run TrueCrypt software and select a drive letter (such as H) that is not occupied by the system under “Drive letter”. Click “Create”. Encrypted volume” Enter the creation wizard. At this time, three encryption volume creation methods are provided. If the computer is shared by multiple people, it is recommended to select the first item. If it is an encrypted hard disk partition, a mobile hard disk or a flash memory, you need to select the second item. The third item is generally for private use of computers. Source: Exam
After clicking “Next”, prompt the user to choose whether the encrypted volume needs to be hidden. If the data needs to be completely secure, it is recommended to select “Hidden TrueCrypt Encrypted Volume”, common user selection. “Standard TrueCrypt Encrypted Volume Click “Next” then specify the location to create the encrypted disk. For example, you need to create the encrypted disk in the D partition. Just click the “Select Device” button and select the D partition in the pop-up interface; Create an encrypted disk on a file, click “select file”, and enter an arbitrary file name.
After clicking “Next”, the user is prompted to select the encryption algorithm. It is recommended to select “AES” is better, the others are all default settings, click “Next”, then prompt Enter the size of the compact disk. According to the hard disk partition capacity and personal storage needs, enter the storage capacity of the encrypted disk in the blank space, and then enter the password of the encrypted volume. You can also click “Use key file” to generate easy to use flash memory and mobile hard disk. The key file, select the file system in the "encrypted volume format", and finally click "Format" to start creating the virtual disk.
Using a virtual encryption disk
After creating a virtual disk, a virtual disk file appears in the hard disk partition. At this time, it cannot be used. It must be loaded before it can store data. Yes: Click on “Select File” in the main interface of the software, then open the virtual disk file just created, right click on the H drive letter, select “Load the selected encrypted volume”, and the encrypted volume will appear. Information, then a "local disk(H)" drive letter appears in "My Computer" and shows the capacity it can store.
When using, copy the file to be protected to the H drive, close the virtual disk, right click on the TrueCrypt icon in the system tray area, then select “Uninstall H:”X option, then exit TrueCrypt software is all right. The next time you use the virtual encryption disk, you must run the TrueCrypt software again, load the virtual disk file according to the previous method, and you must also enter the set encryption password. Otherwise, you cannot use the files in the H disk, thus realizing the hard disk or mobile storage device. The data protection in China solves the loss of business users due to data theft.
Knowledge Extension:
TrueCrypt is a free PC data encryption software that supports Vista and Linux systems. It can create one or more virtual disks on the hard disk or flash memory on all virtual disks. The files are automatically encrypted. After encryption, they need to be accessed by password. Because of the AES-256 encryption algorithm, encrypted data is almost impossible. For ordinary computers without business security functions, or for businesses that are not willing to purchase encrypted flash memory. Users, TrueCrypt can make their data storage safe and reliable.
The Boot.ini file is mainly used to determine the operating system category that th
Some WinXP users find that their desktop icons have blue shadows, which affects the
Each persons computer is equipped with a variety of input methods, the system comes
Some WinXP users found that when installing the graphics driver, the system prompts
Experts analyze common faults and solutions for recorders
How to use five kinds of windows password settings and crack
How to solve the error on the WinXP webpage?
Copying the text in the "Pop-up Warning Window" has a high-profile
WinXP mouse click to change double-click repair method
The secret to making data more secure, use the Windows disk to set up
Easily solve the problem of insufficient virtual memory in Windows
Let xp easily have a small coup of win7 taskbar
A few strokes to easily solve the WinXP anomaly
What should I do if the WinXP computer broadband connection is slow? How to solve?
Windows XP system wireless network technology is completely detailed
How to disable Netmeeting whiteboard program in Win7 system
Live account login win8 system does not need to lose the password method
The reason why Windows 8 is not warm
Win7 can not start the wireless pan dhcp server service prompt 1067 error how to do?
How to make the media center support more video formats
Win10 system running anti-war black screen how to do
Win XP search for hidden files in two ways
Win8.1 library where to retrieve the Win8.1 resource manager library method