Version Information
Download 0.88 Mb. Pdf ko'rish
|
TrueCrypt User Guide
only administrators to view and dismount system favorite volumes in TrueCrypt’; note that this option can be
enabled or disabled only by an administrator) . • Create a file-hosted TrueCrypt volume containing a FAT or no file system (provided that the relevant folder permissions allow it). • Change the password, keyfiles, and header key derivation algorithm for, and restore or back up the header of, a file-hosted TrueCrypt volume (provided that the file permissions allow it). • Access the filesystem residing within a TrueCrypt volume mounted by another user on the system (however, file/folder/volume permissions can be set to prevent this). • Use passwords (and processed keyfiles) stored in the password cache (note that caching can be disabled; for more information see the section Settings -> Preferences, subsection Cache passwords in driver memory) . • View the basic properties (e.g. the size of the encrypted area, encryption and hash algorithms used, etc.) of the encrypted system partition/drive when the encrypted system is running. • Run and use the TrueCrypt application (including the TrueCrypt Volume Creation Wizard) provided that the TrueCrypt device driver is running and that the file permissions allow it. Under Linux, a user without administrator privileges can (assuming the default TrueCrypt and operating system configurations): • Create a file-hosted or partition/device-hosted TrueCrypt volume containing a FAT or no file system provided that the relevant folder/device permissions allow it. • Change the password, keyfiles, and header key derivation algorithm for, and restore or back up the header of, a file-hosted or partition/device-hosted TrueCrypt volume provided that the file/device permissions allow it. • Access the filesystem residing within a TrueCrypt volume mounted by another user on the system (however, file/folder/volume permissions can be set to prevent this). • Run and use the TrueCrypt application (including the TrueCrypt Volume Creation Wizard) provided that file permissions allow it. • In the TrueCrypt application window, see the path to and properties of any TrueCrypt volume mounted by him or her. 85 Under Mac OS X, a user without administrator privileges can (assuming the default TrueCrypt and operating system configurations): • Mount any file-hosted or partition/device-hosted TrueCrypt volume provided that the file/device permissions allow it. • Dismount, using TrueCrypt, (and, in the TrueCrypt application window, see the path to and properties of) any TrueCrypt volume mounted by him or her. • Create a file-hosted or partition/device-hosted TrueCrypt volume provided that the relevant folder/device permissions allow it. • Change the password, keyfiles, and header key derivation algorithm for, and restore or back up the header of, a file-hosted or partition/device-hosted TrueCrypt volume (provided that the file/device permissions allow it). • Access the filesystem residing within a TrueCrypt volume mounted by another user on the system (however, file/folder/volume permissions can be set to prevent this). • Run and use the TrueCrypt application (including the TrueCrypt Volume Creation Wizard) provided that the file permissions allow it. TrueCrypt does not support the set-euid root mode of execution. Additional information and details regarding the security model are contained in the chapter Security Requirements and Precautions. |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling