Solved

How to setup Truecrypt properly?

Posted on 2007-03-28
1
735 Views
Last Modified: 2013-11-15
Hi,

I do have a 2nd harddrive where I'd like to store sensitive data encrypted by TrueCrypt. Now I'd like to know what the "best" way to setup the new drive.

- It's a 500gb drive, are there any pro's/con's when using the whole 500gb as one container or would it be better to not use a container (select file), but the "select device" option for the whole drive.

- Is it possible to defrag the drive, or can this cause problems? Should the dive be defrag'd when mounted?

- I want to use "weak" password, but with a keyfile. As one without the other is useless, the "weak" password shouldn't be a problem? What do you think?

- Which hash algo. should be used?

Any further advices are greatly welcome.

Thanks,
su-n
0
Comment
Question by:su-n
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 31

Accepted Solution

by:
Toni Uranjek earned 500 total points
ID: 18806445
I dont believe that there is really best practice for using TrueCrypt it comes down to what you prefer. Regarding your questions I would suggest:
- if you use "Select file.." instead of "Select device..." file can be easily transfered to other disk.
- You can defrag contetnts of a drive when drive is mounted but I'm not sure it will significantly improve performance, I believe it's more important to have TrueCrypt file as contiguous file. You can use "contig" from sysinternals to achive that (http://www.microsoft.com/technet/sysinternals/fileanddiskutilities.mspx)
- I would never use weak passwords, even if you choose use keyfiles. Strong password is the best security, keyfiles get lost, corrupted or can be stolen!
- I believe that all three supported hash algorithms can be safely used. For encryption I would choose one of the available "cascade" options and that would depend on level of performance. You can benchmark your TrueCrypt volume to see differences.

HTH

Toni
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Microsoft Dynamics Roles question 4 126
Need job search tool for follow-ups 6 130
Christmas family picture with greetings 19 127
CPU at 100% usage, why? 27 157
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
The viewer will learn how to set up a document for the web and print and the recommended PPI for printing.
The viewer will learn how to create multiple layers to apply various filters and how to delete areas from each layer’s filter.

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question