Solved

How to setup Truecrypt properly?

Posted on 2007-03-28
1
732 Views
Last Modified: 2013-11-15
Hi,

I do have a 2nd harddrive where I'd like to store sensitive data encrypted by TrueCrypt. Now I'd like to know what the "best" way to setup the new drive.

- It's a 500gb drive, are there any pro's/con's when using the whole 500gb as one container or would it be better to not use a container (select file), but the "select device" option for the whole drive.

- Is it possible to defrag the drive, or can this cause problems? Should the dive be defrag'd when mounted?

- I want to use "weak" password, but with a keyfile. As one without the other is useless, the "weak" password shouldn't be a problem? What do you think?

- Which hash algo. should be used?

Any further advices are greatly welcome.

Thanks,
su-n
0
Comment
Question by:su-n
1 Comment
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 500 total points
ID: 18806445
I dont believe that there is really best practice for using TrueCrypt it comes down to what you prefer. Regarding your questions I would suggest:
- if you use "Select file.." instead of "Select device..." file can be easily transfered to other disk.
- You can defrag contetnts of a drive when drive is mounted but I'm not sure it will significantly improve performance, I believe it's more important to have TrueCrypt file as contiguous file. You can use "contig" from sysinternals to achive that (http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx)
- I would never use weak passwords, even if you choose use keyfiles. Strong password is the best security, keyfiles get lost, corrupted or can be stolen!
- I believe that all three supported hash algorithms can be safely used. For encryption I would choose one of the available "cascade" options and that would depend on level of performance. You can benchmark your TrueCrypt volume to see differences.

HTH

Toni
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I annotated my article on ransomware somewhat extensively, but I keep adding new references and wanted to put a link to the reference library.  Despite all the reference tools I have on hand, it was not easy to find a way to do this easily. I finall…
Developer portfolios can be a bit of an enigma—how do you present yourself to employers without burying them in lines of code?  A modern portfolio is more than just work samples, it’s also a statement of how you work.
This video shows how use content aware, what it’s used for, and when to use it over other tools.
This video will demonstrate how to find the puppet warp tool from the edit menu and where to put the points to edit.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now