[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Truecrypt and RAID 1

Posted on 2011-09-19
4
Medium Priority
?
2,132 Views
Last Modified: 2016-12-08
I have used Truecrypt for full system encryption on 2 laptops. I am very happy with that setup. Recently purchased desktop with RAID 1 setup - 2 hard drives using Intel Matrix Storage Technology and RAID controllers in Windows 7.

I would prefer to do full system encryption on the desktop computer but am not sure if this would work appropriately in RAID 1 protocol. In other words, not sure if the RAID functionality boots before Truecrypt (or perhaps some other challenge). As a backup plan, I could always mount a volume to store the most important files. Any input would be greatly appreciated.

Many thanks!
0
Comment
Question by:jjs1959
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 12

Expert Comment

by:geowrian
ID: 36564339
If I am understanding you right, the RAID controller is integrated into motherboard. If so, you should be fine for any full-disk encryption, since they won't load the necessary decryption keys until after they have access the hard drive (at which point the storage drivers must have already been loaded).
0
 

Author Comment

by:jjs1959
ID: 36564420
I don't know if the RAID controller is integrated in the motherboard. I can access a software application called "Intel Matrix Storage Technology" which allows me to manage the RAID system. Is there an easy way to determine if the RAID control is hardware (motherboard) or software mediated?
0
 
LVL 12

Accepted Solution

by:
geowrian earned 2000 total points
ID: 36564432
The Intel Matrix drivers are for Intel chipset based controllers. They are not software-only RAID (like LVM and such), so you should be fine.
0
 

Author Closing Comment

by:jjs1959
ID: 36564503
Thanks so much....
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question