Solved

Encrypting Network Drives

Posted on 2007-11-14
3
2,884 Views
Last Modified: 2013-11-08
Can the volume created by Truecrypt be shared so you can access it, mount it etc. on any computer on the network?  Can it become a network drive?  And if so, how do you create it as a network drive and it can it be accessed via a VPN connection?

0
Comment
Question by:depechesinge
  • 2
3 Comments
 
LVL 17

Expert Comment

by:RDAdams
ID: 20284212
According to the user manual.  Yes.

http://www.truecrypt.org/docs/ 
0
 
LVL 17

Expert Comment

by:RDAdams
ID: 20284215
You can use your NTFS security to address access per users.
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 250 total points
ID: 20287473
You can share and mount your Truecrypt volume in two modes.

First, if you mount and share the mounted volume, it becomes a volume of whatever format type you defined - so is shared as a FAT32 or NTFS volume as appropriate.

Second, if you share the container file, you can remote-mount that *provided it is shared using SMB* - some other share protocols (NFS and Novell spring to mind) don't "mount" at a low enough driver level that the truecrypt driver can "see" them. In this case, you should be careful not to mount the container on two machines simultaneously, as this can lead to data corruption.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

With the shift in today’s hiring climate (http://blog.experts-exchange.com/ee-blog/5-tips-on-succeeding-in-the-new-gig-economy/?cid=Blog_031816), many companies are choosing to hire freelancers to get projects completed efficiently and inexpensively…
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Articles on a wide range of technology and professional topics are available on Experts Exchange. These resources are written by members, for members, and can be written about any topic you feel passionate about. Learn how to best write an article t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question