Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

TrueCrypt CLI Linux Command Line Create Volume Automatically

Posted on 2014-09-04
10
441 Views
Last Modified: 2014-09-05
Hope someone will be able to assist:

I have used TrueCrypt for many years and have recently wanted to start creating my own volumes "automatically" via perl script. I would like to be able to specify all the options using CLI instead of interactive mode to create a virtual volume file.

My example of what I'm going for (just an example I know this isn't correct)

truecrypt -c /path/to/virtual_volume --cypher sha-256-blowfish --random-source <path to random source> --volume-password 123456 --create-key /path/to/keyfile

Any help would be SO appreciated!

Thanks!

dr34m3r
0
Comment
Question by:dr34m3rs
  • 4
  • 3
  • 3
10 Comments
 
LVL 28

Accepted Solution

by:
FishMonger earned 250 total points
ID: 40303592
You can use the system function to execute your truecrypt command.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40303632
Hi FishMonger,

Yes I am aware of how to do the perl side programming: It's the truecrypt cli programming without using interactive mode that I need help with.....
0
 
LVL 28

Expert Comment

by:FishMonger
ID: 40303663
Sorry, I've never used truecrypt.
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 
LVL 28

Expert Comment

by:FishMonger
ID: 40303676
I just did a quick google search and good number of the hit suggest not using it.

http://truecrypt.sourceforge.net/
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40303760
Using it on windows? Then why perl, did you read the batch documentation?
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304636
I understand that the devs "want us to stop using it" but that will never happen.

Anyone able to figure out the command CLI to auto create virtual containers? Thanks!! :)
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40304694
Sorry, missed that it is Linux. Documentation advises to run truecrypt -h.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304951
It's cool. Doesn't that just display "help" ? ;)
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 40305231
No syntax help displayed?
0
 
LVL 1

Author Closing Comment

by:dr34m3rs
ID: 40305846
I decided to write my own ...  <3 thanks for the help
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question