Solved

Truecrypt and RAID 1

Posted on 2011-09-19
4
1,984 Views
Last Modified: 2012-05-12
I have used Truecrypt for full system encryption on 2 laptops. I am very happy with that setup. Recently purchased desktop with RAID 1 setup - 2 hard drives using Intel Matrix Storage Technology and RAID controllers in Windows 7.

I would prefer to do full system encryption on the desktop computer but am not sure if this would work appropriately in RAID 1 protocol. In other words, not sure if the RAID functionality boots before Truecrypt (or perhaps some other challenge). As a backup plan, I could always mount a volume to store the most important files. Any input would be greatly appreciated.

Many thanks!
0
Comment
Question by:jjs1959
  • 2
  • 2
4 Comments
 
LVL 12

Expert Comment

by:geowrian
Comment Utility
If I am understanding you right, the RAID controller is integrated into motherboard. If so, you should be fine for any full-disk encryption, since they won't load the necessary decryption keys until after they have access the hard drive (at which point the storage drivers must have already been loaded).
0
 

Author Comment

by:jjs1959
Comment Utility
I don't know if the RAID controller is integrated in the motherboard. I can access a software application called "Intel Matrix Storage Technology" which allows me to manage the RAID system. Is there an easy way to determine if the RAID control is hardware (motherboard) or software mediated?
0
 
LVL 12

Accepted Solution

by:
geowrian earned 500 total points
Comment Utility
The Intel Matrix drivers are for Intel chipset based controllers. They are not software-only RAID (like LVM and such), so you should be fine.
0
 

Author Closing Comment

by:jjs1959
Comment Utility
Thanks so much....
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Today, security is a big concern in an organization to prevent sensitive data leakage. In Outlook you can secure your Outlook items (emails, calendars, contacts and other stuff) using various techniques like by marking item as private, or you can pu…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now