Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

How to setup Truecrypt properly?

Posted on 2007-03-28
1
Medium Priority
?
741 Views
Last Modified: 2013-11-15
Hi,

I do have a 2nd harddrive where I'd like to store sensitive data encrypted by TrueCrypt. Now I'd like to know what the "best" way to setup the new drive.

- It's a 500gb drive, are there any pro's/con's when using the whole 500gb as one container or would it be better to not use a container (select file), but the "select device" option for the whole drive.

- Is it possible to defrag the drive, or can this cause problems? Should the dive be defrag'd when mounted?

- I want to use "weak" password, but with a keyfile. As one without the other is useless, the "weak" password shouldn't be a problem? What do you think?

- Which hash algo. should be used?

Any further advices are greatly welcome.

Thanks,
su-n
0
Comment
Question by:su-n
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 2000 total points
ID: 18806445
I dont believe that there is really best practice for using TrueCrypt it comes down to what you prefer. Regarding your questions I would suggest:
- if you use "Select file.." instead of "Select device..." file can be easily transfered to other disk.
- You can defrag contetnts of a drive when drive is mounted but I'm not sure it will significantly improve performance, I believe it's more important to have TrueCrypt file as contiguous file. You can use "contig" from sysinternals to achive that (http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx)
- I would never use weak passwords, even if you choose use keyfiles. Strong password is the best security, keyfiles get lost, corrupted or can be stolen!
- I believe that all three supported hash algorithms can be safely used. For encryption I would choose one of the available "cascade" options and that would depend on level of performance. You can benchmark your TrueCrypt volume to see differences.

HTH

Toni
0

Featured Post

Tech or Treat! - Giveaway

Submit an article about your scariest tech experience—and the solution—and you’ll be automatically entered to win one of 4 fantastic tech gadgets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Invest in your employees with these five simple steps to improve employee engagement and retention.
The core idea of this article is to make you acquainted with the best way in which you can export Exchange mailbox to PST format.
Video by: Tony
This video teaches viewers how to export a project from Adobe Premiere Pro and the various file types involved.
Using Adobe Premiere Pro, the viewer will learn how to set up a sequence with proper settings, importing pictures, rendering, and exporting the finished product.

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question