Version Information


Download 0.88 Mb.
Pdf ko'rish
bet105/122
Sana18.06.2023
Hajmi0.88 Mb.
#1590799
1   ...   101   102   103   104   105   106   107   108   ...   122
Bog'liq
TrueCrypt User Guide

I2P

Tor
, or a similar anonymizing network. 
 
3. Verify the digital signatures of the downloaded file (see the section Digital Signatures for 
more information). 
 


128 
4. Run the downloaded file, and select Extract (instead of Install) on the second page of the 
TrueCrypt Setup wizard. Extract the contents to the RAM disk. 
 
5. Run the file TrueCrypt.exe from the RAM disk.
 
Note: You may also want to consider creating a hidden operating system (see the section Hidden 
Operating System). See also the chapter Plausible Deniability
 
 
Can I encrypt my system partition/drive if I don’t have a US keyboard? 
 
Yes, TrueCrypt supports all keyboard layouts. 
 
 
Can I save data to the decoy system partition without risking damage to the hidden system 
partition? 
Yes. You can write data to the decoy system partition anytime without any risk that the hidden 
volume will get damaged (because the decoy system is not installed within the same partition as 
the hidden system). For more information, see the section Hidden Operating System.
 
 
Can I use TrueCrypt in Windows if I do not have administrator privileges? 
 
See the chapter ‘Using TrueCrypt Without Administrator Privileges‘. 
Does TrueCrypt save my password to a disk? 
No.
 
 
How does TrueCrypt verify that the correct password was entered? 
 
See the chapter Technical Details, section Encryption Scheme

Download 0.88 Mb.

Do'stlaringiz bilan baham:
1   ...   101   102   103   104   105   106   107   108   ...   122




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling