Solved

Can TrueCrypt be portable within the USB without the need of install

Posted on 2012-12-22
4
1,111 Views
Last Modified: 2013-01-13
We started using TrueCrypt some short time and so far, so good.  We came upon a situation overlooked.  We all have TrueCrypt installed, so all PC can read all others TrueCrypt volumes with no problems.  But we had to send a TrueCrypt USB to a supervisor out of state and his PC has no TrueCrypt installed and that night he didn't had internet to downloaded.  So we would like to know if TrueCrypt has an executable that we can just be saved inside the USB drive.  When the person has no TrueCrypt, he just open the USB drive and run the executable and use it.

Can this be done? if not, are there any other option?
0
Comment
Question by:rayluvs
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
Rinil earned 250 total points
ID: 38716546
Hi,

Yes , the true crypt can be run in the portable mode. please read the following link that has details for this kind of usage.

http://www.truecrypt.org/docs/?s=truecrypt-portable

hope that helps
0
 
LVL 8

Assisted Solution

by:-Mystique-
-Mystique- earned 250 total points
ID: 38716570
Yes.
http://www.truecrypt.org/docs/?s=truecrypt-portable

Portable Mode
TrueCrypt can run in so-called portable mode, which means that it does not have to be installed on the operating system under which it is run. However, there are two things to keep in mind:

You need administrator privileges in order to be able to run TrueCrypt in portable mode (for the reasons, see the chapter Using TrueCrypt Without Administrator Privileges).
After examining the registry file, it may be possible to tell that TrueCrypt was run (and that a TrueCrypt volume was mounted) on a Windows system even if it had been run in portable mode.
Note: If that is a problem, see this question in the FAQ for a possible solution.

There are two ways to run TrueCrypt in portable mode:

After you extract files from the TrueCrypt self-extracting package, you can directly run TrueCrypt.exe.

Note: To extract files from the TrueCrypt self-extracting package, run it, and then select Extract (instead of Install) on the second page of the TrueCrypt Setup wizard.

You can use the Traveler Disk Setup facility to prepare a special traveler disk and launch TrueCrypt from there.

The second option has several advantages, which are described in the following sections in this chapter.

Note: When running in portable mode, the TrueCrypt driver is unloaded when it is no longer needed (e.g., when all instances of the main application and/or of the Volume Creation Wizard are closed and no TrueCrypt volumes are mounted). However, if you force dismount on a TrueCrypt volume when TrueCrypt runs in portable mode, or mount a writable NTFS-formatted volume on Windows Vista or later, the TrueCrypt driver may not be unloaded when you exit TrueCrypt (it will be unloaded only when you shut down or restart the system). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start TrueCrypt again as long as there are applications using the dismounted volume).
0
 

Author Comment

by:rayluvs
ID: 38716676
Will try
0
 

Author Comment

by:rayluvs
ID: 38733344
Thanx
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Remove Installed Application 1 43
Win 7 - Devices and Printers folder doesn't populate 10 23
File Explorer crashes 6 62
Mouse goes crazy when flash drive is inserted 7 44
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now