Solved

Encrypting Network Drives

Posted on 2007-11-14
3
2,880 Views
Last Modified: 2013-11-08
Can the volume created by Truecrypt be shared so you can access it, mount it etc. on any computer on the network?  Can it become a network drive?  And if so, how do you create it as a network drive and it can it be accessed via a VPN connection?

0
Comment
Question by:depechesinge
  • 2
3 Comments
 
LVL 17

Expert Comment

by:RDAdams
ID: 20284212
According to the user manual.  Yes.

http://www.truecrypt.org/docs/ 
0
 
LVL 17

Expert Comment

by:RDAdams
ID: 20284215
You can use your NTFS security to address access per users.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 250 total points
ID: 20287473
You can share and mount your Truecrypt volume in two modes.

First, if you mount and share the mounted volume, it becomes a volume of whatever format type you defined - so is shared as a FAT32 or NTFS volume as appropriate.

Second, if you share the container file, you can remote-mount that *provided it is shared using SMB* - some other share protocols (NFS and Novell spring to mind) don't "mount" at a low enough driver level that the truecrypt driver can "see" them. In this case, you should be careful not to mount the container on two machines simultaneously, as this can lead to data corruption.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
Gift cards are not a new concept - it's been around for a very long time.  Undoubtedly, over the past you have received such a card or purchased one for a friend or relative.  Are you aware that you've been feeding the machine?  If not, read on :)
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now