[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Encrypting Network Drives

Posted on 2007-11-14
3
Medium Priority
?
2,893 Views
Last Modified: 2013-11-08
Can the volume created by Truecrypt be shared so you can access it, mount it etc. on any computer on the network?  Can it become a network drive?  And if so, how do you create it as a network drive and it can it be accessed via a VPN connection?

0
Comment
Question by:depechesinge
  • 2
3 Comments
 
LVL 17

Expert Comment

by:RDAdams
ID: 20284212
According to the user manual.  Yes.

http://www.truecrypt.org/docs/ 
0
 
LVL 17

Expert Comment

by:RDAdams
ID: 20284215
You can use your NTFS security to address access per users.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 750 total points
ID: 20287473
You can share and mount your Truecrypt volume in two modes.

First, if you mount and share the mounted volume, it becomes a volume of whatever format type you defined - so is shared as a FAT32 or NTFS volume as appropriate.

Second, if you share the container file, you can remote-mount that *provided it is shared using SMB* - some other share protocols (NFS and Novell spring to mind) don't "mount" at a low enough driver level that the truecrypt driver can "see" them. In this case, you should be careful not to mount the container on two machines simultaneously, as this can lead to data corruption.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Suggested Courses
Course of the Month17 days, 23 hours left to enroll

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question