Version Information


Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems


Download 0.88 Mb.
Pdf ko'rish
bet37/122
Sana18.06.2023
Hajmi0.88 Mb.
#1590799
1   ...   33   34   35   36   37   38   39   40   ...   122
Bog'liq
TrueCrypt User Guide


partition (i.e. on the outer volume).
Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems 
 
As a hidden operating system resides in a hidden TrueCrypt volume, a user of a hidden operating 
system must follow all of the security requirements and precautions that apply to normal hidden 
TrueCrypt volumes. These requirements and precautions, as well as additional requirements and 
precautions pertaining specifically to hidden operating systems, are listed in the subsection 
Security Requirements and Precautions Pertaining to Hidden Volumes
WARNING: If you do not protect the hidden volume (for information on how to do so, refer to the 
section Protection of Hidden Volumes Against Damage), do not write to the outer volume (note that 
the decoy operating system is not installed in the outer volume). Otherwise, you may overwrite and 
damage the hidden volume (and the hidden operating system within it)! 


53 
If all the instructions in the wizard have been followed and if the security requirements and 
precautions listed in the subsection Security Requirements and Precautions Pertaining to Hidden 
Volumes are followed, it should be impossible to prove that the hidden volume and hidden 
operating system exist, even when the outer volume is mounted or when the decoy operating 
system is decrypted or started. 


54 
Main Program Window 
Select File 
Allows you to select a file-hosted TrueCrypt volume. After you select it, you can perform various 
operations on it (e.g., mount it by clicking ‘Mount’). It is also possible to select a volume by 
dragging its icon to the ‘TrueCrypt.exe’ icon (TrueCrypt will be automatically launched then) or to 
the main program window. 
Select Device 
Allows you to select a TrueCrypt partition or a storage device (such as a USB memory stick). After 
it is selected, you can perform various operations with it (e.g., mount it by clicking ‘Mount’).
Note: There is a more comfortable way of mounting TrueCrypt partitions/devices – see the section 
Auto-Mount Devices for more information.
Mount 
After you click ‘Mount’, TrueCrypt will try to mount the selected volume using cached passwords (if 
there are any) and if none of them works, it prompts you for a password. If you enter the correct 
password (and/or provide correct keyfiles), the volume will be mounted. 
Important: Note that when you exit the TrueCrypt application, the TrueCrypt driver continues 
working and no TrueCrypt volume is dismounted. 

Download 0.88 Mb.

Do'stlaringiz bilan baham:
1   ...   33   34   35   36   37   38   39   40   ...   122




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling