Version Information


Mount volume as read-only


Download 0.88 Mb.
Pdf ko'rish
bet45/122
Sana18.06.2023
Hajmi0.88 Mb.
#1590799
1   ...   41   42   43   44   45   46   47   48   ...   122
Bog'liq
TrueCrypt User Guide

Mount volume as read-only 
 
When checked, it will not be possible to write any data to the mounted volume.
Mount volume as removable medium 
See section Volume Mounted as Removable Medium
Use backup header embedded in volume if available 
All volumes created by TrueCrypt 6.0 or later contain an embedded backup header (located at the 
end of the volume). If you check this option, TrueCrypt will attempt to mount the volume using the 
embedded backup header. Note that if the volume header is damaged, you do not have to use this 
option. Instead, you can repair the header by selecting Tools > Restore Volume Header. 
Mount partition using system encryption without pre-boot authentication 
Check this option, if you need to mount a partition that is within the key scope of system encryption 
without pre-boot authentication. For example, if you need to mount a partition located on the 
encrypted system drive of another operating system that is not running. This can be useful e.g. 
when you need to back up or repair an operating system encrypted by TrueCrypt (from within 
another operating system). Note that this option can be enabled also when using the ‘Auto-Mount 
Devices’ or ‘Auto-Mount All Device-Hosted Volumes’ functions. 
Hidden Volume Protection 
Please see the section Protection of Hidden Volumes Against Damage


63 
Parallelization 
When your computer has a multi-core processor (or multiple processors), TrueCrypt uses all of the 
cores (or processors) in parallel for encryption and decryption. For example, when TrueCrypt is to 
decrypt a chunk of data, it first splits the chunk into several smaller pieces. The number of the 
pieces is equal to the number of the cores (or processors). Then, all of the pieces are decrypted in 
parallel (piece 1 is decrypted by thread 1, piece 2 is decrypted by thread 2, etc). The same method 
is used for encryption. 
So if your computer has, for example, a quad-core processor, then encryption and decryption are 
four times faster than on a single-core processor with equivalent specifications (likewise, they are 
twice faster on dual-core processors, etc). 
Increase in encryption/decryption speed is directly proportional to the number of cores and/or 
processors. 
Note: Processors with the Hyper-Threading technology provide multiple logical cores per one 
physical core (or multiple logical processors per one physical processor). When Hyper Threading is 
enabled in the computer firmware (e.g. BIOS) settings, TrueCrypt creates one thread for each 
logical core/processor. For example, on a 6-core processor that provides two logical cores per one 
physical core, TrueCrypt uses 12 threads. 
When your computer has a multi-core processor/CPU (or multiple processors/CPUs), header key 
derivation is parallelized too. As a result, mounting of a volume is several times faster on a multi-
core processor (or multi-processor computer) than on a single-core processor (or a single-
processor computer) with equivalent specifications. 
Note: Parallelization was introduced in TrueCrypt 6.0. 

Download 0.88 Mb.

Do'stlaringiz bilan baham:
1   ...   41   42   43   44   45   46   47   48   ...   122




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling