Solved

How to setup Truecrypt properly?

Posted on 2007-03-28
1
736 Views
Last Modified: 2013-11-15
Hi,

I do have a 2nd harddrive where I'd like to store sensitive data encrypted by TrueCrypt. Now I'd like to know what the "best" way to setup the new drive.

- It's a 500gb drive, are there any pro's/con's when using the whole 500gb as one container or would it be better to not use a container (select file), but the "select device" option for the whole drive.

- Is it possible to defrag the drive, or can this cause problems? Should the dive be defrag'd when mounted?

- I want to use "weak" password, but with a keyfile. As one without the other is useless, the "weak" password shouldn't be a problem? What do you think?

- Which hash algo. should be used?

Any further advices are greatly welcome.

Thanks,
su-n
0
Comment
Question by:su-n
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 500 total points
ID: 18806445
I dont believe that there is really best practice for using TrueCrypt it comes down to what you prefer. Regarding your questions I would suggest:
- if you use "Select file.." instead of "Select device..." file can be easily transfered to other disk.
- You can defrag contetnts of a drive when drive is mounted but I'm not sure it will significantly improve performance, I believe it's more important to have TrueCrypt file as contiguous file. You can use "contig" from sysinternals to achive that (http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx)
- I would never use weak passwords, even if you choose use keyfiles. Strong password is the best security, keyfiles get lost, corrupted or can be stolen!
- I believe that all three supported hash algorithms can be safely used. For encryption I would choose one of the available "cascade" options and that would depend on level of performance. You can benchmark your TrueCrypt volume to see differences.

HTH

Toni
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
Let’s list some of the technologies that enable smooth teleworking. 
This video demonstrates basic masking and how to edit the mask to reveal the desired image.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question