Solved

TrueCrypt CLI Linux Command Line Create Volume Automatically

Posted on 2014-09-04
10
438 Views
Last Modified: 2014-09-05
Hope someone will be able to assist:

I have used TrueCrypt for many years and have recently wanted to start creating my own volumes "automatically" via perl script. I would like to be able to specify all the options using CLI instead of interactive mode to create a virtual volume file.

My example of what I'm going for (just an example I know this isn't correct)

truecrypt -c /path/to/virtual_volume --cypher sha-256-blowfish --random-source <path to random source> --volume-password 123456 --create-key /path/to/keyfile

Any help would be SO appreciated!

Thanks!

dr34m3r
0
Comment
Question by:dr34m3rs
  • 4
  • 3
  • 3
10 Comments
 
LVL 28

Accepted Solution

by:
FishMonger earned 250 total points
ID: 40303592
You can use the system function to execute your truecrypt command.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40303632
Hi FishMonger,

Yes I am aware of how to do the perl side programming: It's the truecrypt cli programming without using interactive mode that I need help with.....
0
 
LVL 28

Expert Comment

by:FishMonger
ID: 40303663
Sorry, I've never used truecrypt.
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 28

Expert Comment

by:FishMonger
ID: 40303676
I just did a quick google search and good number of the hit suggest not using it.

http://truecrypt.sourceforge.net/
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40303760
Using it on windows? Then why perl, did you read the batch documentation?
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304636
I understand that the devs "want us to stop using it" but that will never happen.

Anyone able to figure out the command CLI to auto create virtual containers? Thanks!! :)
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40304694
Sorry, missed that it is Linux. Documentation advises to run truecrypt -h.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304951
It's cool. Doesn't that just display "help" ? ;)
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 40305231
No syntax help displayed?
0
 
LVL 1

Author Closing Comment

by:dr34m3rs
ID: 40305846
I decided to write my own ...  <3 thanks for the help
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
security string in a noisy bar 5 85
Network Security Solution 7 44
How do You Stop a DDoS Attack 7 26
Read Only access to a Facebook Profile 9 18
Here are the five steps I suggest to every sysadmin to fix the fall-out from a security breach.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question