Solved

How to setup Truecrypt properly?

Posted on 2007-03-28
1
731 Views
Last Modified: 2013-11-15
Hi,

I do have a 2nd harddrive where I'd like to store sensitive data encrypted by TrueCrypt. Now I'd like to know what the "best" way to setup the new drive.

- It's a 500gb drive, are there any pro's/con's when using the whole 500gb as one container or would it be better to not use a container (select file), but the "select device" option for the whole drive.

- Is it possible to defrag the drive, or can this cause problems? Should the dive be defrag'd when mounted?

- I want to use "weak" password, but with a keyfile. As one without the other is useless, the "weak" password shouldn't be a problem? What do you think?

- Which hash algo. should be used?

Any further advices are greatly welcome.

Thanks,
su-n
0
Comment
Question by:su-n
1 Comment
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 500 total points
ID: 18806445
I dont believe that there is really best practice for using TrueCrypt it comes down to what you prefer. Regarding your questions I would suggest:
- if you use "Select file.." instead of "Select device..." file can be easily transfered to other disk.
- You can defrag contetnts of a drive when drive is mounted but I'm not sure it will significantly improve performance, I believe it's more important to have TrueCrypt file as contiguous file. You can use "contig" from sysinternals to achive that (http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx)
- I would never use weak passwords, even if you choose use keyfiles. Strong password is the best security, keyfiles get lost, corrupted or can be stolen!
- I believe that all three supported hash algorithms can be safely used. For encryption I would choose one of the available "cascade" options and that would depend on level of performance. You can benchmark your TrueCrypt volume to see differences.

HTH

Toni
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
This guide will walk you through the essential considerations and tech stack for building scalable websites. Know how to grow your business the smart way!
The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.
An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now