Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

TrueCrypt Setup for Network HD Folder (simultaneous access but not simultaneous changes)

Posted on 2009-05-10
2
Medium Priority
?
727 Views
Last Modified: 2013-11-08
Hello,

Im having a hard time understanding the TrueCrypt limitation(s) on sharing encrypted files amongst multiple users that all have access to a shared network hard drive (the dive has a common drive letter mapped to each User PC).

We have a small office network comprised of a router, User 1 PC (XP Pro), User 2 PC (XP Pro), User 3 PC (XP Pro), and a network hard drive.  Everything is stored on the network hard drive and nothing is stored on the User 1, the User 2, or the User 3 PC.

In terms of workflow, we routinely generate a series of updated materials for Customer A, Customer B, Customer C, etc.  The updating process requires verbal (but not electronic) collaboration amongst each of the Users.  For example, User 1 opens a file, makes updates, closes the file, and then verbally informs User 2 that the file is ready for User 2 inputs.  User 2 opens the file, makes changes, closes the file, and then informs User 3 that the file is ready for their inputs.  

Each customer has a unique folder containing a set of sub-folders and each sub-folder is comprised of multiple files.  When updates are being made, Users 1, 2 and 3 are working on multiple customer folders in the same span of time but *never* on the same file at the same time.

What I would like to do: 1) create a single TrueCrypt combined-customer folder on the mapped hard drive that contains all of our customer folders, sub-folders and files; 2) allow each User to have simultaneous access to the TrueCrypt combined-customer folder (for making sequential but *not* simultaneous changes to individual files).

With the usage scenario described above, Im concerned about the potential for file corruption based on what Ive read on Experts-Exchange as well as the TrueCrypt knowledge base.

In terms of what Im trying to protect against, please: 1) compromise of customer data should the network hard drive ever be physically removed from the office and 2) compromise of customer data whenever the TrueCrypt combined-customer folder is not in use and is un-mounted.

Thanks!
0
Comment
Question by:blockmental
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
coredatarecovery earned 1000 total points
ID: 24360076
I'd trade in your truecrypt in this case for a maxtor Black Armor hard disk.

Once it's unlocked, it is just a hard disk to the OS. No software required, and If someone steals the drive, without the password it's useless.

No need to deal with possible corruptions/software encryption in this case. If it was on 1 computer and only that computer was reading/writing to the drive, I'd say Great! use truecrypt. but in your case I'd go hardware encryption all the way.
0
 

Author Closing Comment

by:blockmental
ID: 31580029
Thanks!  Not having to deal with the TrueCrypt issue would be a REALLY big plus on this end.  
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I wrote an article (http://www.experts-exchange.com/articles/2245/Anti-rootkit-software.html) some time ago with a reference to nLite  (http://www.nliteos.com/)slipstreaming software.  I recently changed that link to point to NTLite (https://www.ntl…
This article shows how to use a free utility called 'Parkdale' to easily test the performance and benchmark any Hard Drive(s) installed in your computer. We also look at RAM Disks and their speed comparisons.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question