In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article mainly introduces "how to encrypt files with open source VeraCrypt". In daily operation, I believe many people have doubts about how to use open source VeraCrypt to encrypt files. Xiaobian consulted all kinds of materials and sorted out simple and easy-to-use methods of operation. I hope it will be helpful to answer the doubts about "how to use open source VeraCrypt to encrypt files". Next, please follow the editor to study!
VeraCrypt provides cross-platform open source file encryption.
Many years ago, there was an encryption software called TrueCrypt. Its source code is available, although no one claims to have audited or contributed to it. Its author is (and still is) anonymous. However, it is cross-platform, easy to use, and really useful.
TrueCrypt allows you to create an encrypted file "vault" where you can store any type of sensitive information (text, audio, video, images, PDF, etc.). As long as you have the correct password, TrueCrypt can decrypt the vault and provide read and write access on any computer running TrueCrypt. This is a useful technology that basically provides a virtual, removable, fully encrypted drive (except for files) where you can store your data securely.
TrueCrypt eventually shut down, but an alternative project called VeraCrypt sprang up to fill the gap. VeraCrypt is based on TrueCrypt 7.1a and has many improvements over the original version (including major changes in the algorithm for standard encrypted and bootstrapped volumes). In VeraCrypt 1.12 and later, you can use custom iterations to improve encryption security. Better yet, VeraCrypt can load old TrueCrypt volumes, so if you are a TrueCrypt user, you can easily transfer them to VeraCrypt.
Install VeraCrypt
You can download the appropriate installation files from the VeraCrypt download page, and then install VeraCrypt on all major platforms.
In addition, you can build it yourself from the source code. On Linux, it requires wxGTK3, makeself, and the usual development stack (Binutils, GCC, and so on).
When you install, launch VeraCrypt from your application menu.
Create a VeraCrypt volume
If you are new to VeraCrypt, you must first create a VeraCrypt encrypted volume (otherwise, you have nothing to decrypt). In the VeraCrypt window, click the "Create Volume" button on the left.
Creating a volume with VeraCrypt
In the VeraCrypt Volume creation Wizard window that appears, select whether you want to create an encrypted file container or encrypt the entire drive or partition. The wizard will create a vault for your data, so follow the prompts.
In this article, I created a file container. The VeraCrypt container is much like any other file: it is stored on a hard disk, external hard drive, cloud storage, or any other place you can think of to store data. Like other files, it can be moved, copied, and deleted. Unlike most other files, it can hold _ more files, which is why I think it is a "vault" and VeraCrypt developers call it a "container". Its developers call VeraCrypt files "containers" because they can contain other data objects; it has nothing to do with LXC, Kubernetes, and other container technologies popular with modern IT mechanisms.
Select a file system
During the process of creating a volume, you will be asked to select a file system to determine how the files you put in the vault will be stored. Microsoft FAT format is outdated, non-journal, and limits the size of volumes and files, but it is a format that can be read and written on all platforms. If you are going to make your VeraCrypt vault cross-platform, FAT is your best choice.
In addition, NTFS is suitable for Windows and Linux. The open source EXT series is suitable for Linux.
Mount the VeraCrypt encrypted volume
When you create a VeraCrypt volume, you can load it in the VeraCrypt window. To mount an encrypted library, click the "Select File" button on the right. Select your encrypted file, select a number bar in the upper half of the VeraCrypt window, and then click the "Mount" button in the lower left corner of the VeraCrypt window.
The volume you mount is in the list of available volumes in the VeraCrypt window, and you can access it through the file manager as if it were an external drive. For example, on KDE, I open Dolphin, enter / media/veracrypt1, and then I can copy the files into my vault.
As long as you have VeraCrypt on your device, you can access your vault at any time. Files are encrypted until you manually mount them in VeraCrypt, where they remain decrypted until you close the volume again.
Shut down VeraCrypt Volum
To ensure the security of your data, it is important to close the VeraCrypt volume when you do not need to open it. This can ensure the security of the data, not to be spied on, and not to be taken advantage of by people to commit crimes.
Mounting a VeraCrypt volume
Closing the VeraCrypt container is as simple as opening the container. Select the listed volume in the VeraCrypt window and click "Dismount". You will not be able to access the files in the vault, and no one else will have access.
Easy implementation of cross-platform encryption with VeraCrypt
There are many ways to keep your data secure, and VeraCrypt tries to make it easier for you, no matter what platform you need to use it. If you want to experience simple, open source file encryption, try VeraCrypt.
At this point, the study on "how to encrypt files with open source VeraCrypt" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.