Version Information
Mount volume as read-only
Download 0.88 Mb. Pdf ko'rish
|
TrueCrypt User Guide
- Bu sahifa navigatsiya:
- Mount partition using system encryption without pre-boot authentication
- Hidden Volume Protection
Mount volume as read-only
When checked, it will not be possible to write any data to the mounted volume. Mount volume as removable medium See section Volume Mounted as Removable Medium. Use backup header embedded in volume if available All volumes created by TrueCrypt 6.0 or later contain an embedded backup header (located at the end of the volume). If you check this option, TrueCrypt will attempt to mount the volume using the embedded backup header. Note that if the volume header is damaged, you do not have to use this option. Instead, you can repair the header by selecting Tools > Restore Volume Header. Mount partition using system encryption without pre-boot authentication Check this option, if you need to mount a partition that is within the key scope of system encryption without pre-boot authentication. For example, if you need to mount a partition located on the encrypted system drive of another operating system that is not running. This can be useful e.g. when you need to back up or repair an operating system encrypted by TrueCrypt (from within another operating system). Note that this option can be enabled also when using the ‘Auto-Mount Devices’ or ‘Auto-Mount All Device-Hosted Volumes’ functions. Hidden Volume Protection Please see the section Protection of Hidden Volumes Against Damage. 63 Parallelization When your computer has a multi-core processor (or multiple processors), TrueCrypt uses all of the cores (or processors) in parallel for encryption and decryption. For example, when TrueCrypt is to decrypt a chunk of data, it first splits the chunk into several smaller pieces. The number of the pieces is equal to the number of the cores (or processors). Then, all of the pieces are decrypted in parallel (piece 1 is decrypted by thread 1, piece 2 is decrypted by thread 2, etc). The same method is used for encryption. So if your computer has, for example, a quad-core processor, then encryption and decryption are four times faster than on a single-core processor with equivalent specifications (likewise, they are twice faster on dual-core processors, etc). Increase in encryption/decryption speed is directly proportional to the number of cores and/or processors. Note: Processors with the Hyper-Threading technology provide multiple logical cores per one physical core (or multiple logical processors per one physical processor). When Hyper Threading is enabled in the computer firmware (e.g. BIOS) settings, TrueCrypt creates one thread for each logical core/processor. For example, on a 6-core processor that provides two logical cores per one physical core, TrueCrypt uses 12 threads. When your computer has a multi-core processor/CPU (or multiple processors/CPUs), header key derivation is parallelized too. As a result, mounting of a volume is several times faster on a multi- core processor (or multi-processor computer) than on a single-core processor (or a single- processor computer) with equivalent specifications. Note: Parallelization was introduced in TrueCrypt 6.0. Download 0.88 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling