Solved

TrueCrypt CLI Linux Command Line Create Volume Automatically

Posted on 2014-09-04
10
449 Views
Last Modified: 2014-09-05
Hope someone will be able to assist:

I have used TrueCrypt for many years and have recently wanted to start creating my own volumes "automatically" via perl script. I would like to be able to specify all the options using CLI instead of interactive mode to create a virtual volume file.

My example of what I'm going for (just an example I know this isn't correct)

truecrypt -c /path/to/virtual_volume --cypher sha-256-blowfish --random-source <path to random source> --volume-password 123456 --create-key /path/to/keyfile

Any help would be SO appreciated!

Thanks!

dr34m3r
0
Comment
Question by:dr34m3rs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 3
10 Comments
 
LVL 28

Accepted Solution

by:
FishMonger earned 250 total points
ID: 40303592
You can use the system function to execute your truecrypt command.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40303632
Hi FishMonger,

Yes I am aware of how to do the perl side programming: It's the truecrypt cli programming without using interactive mode that I need help with.....
0
 
LVL 28

Expert Comment

by:FishMonger
ID: 40303663
Sorry, I've never used truecrypt.
0
Scamming the Scammers!

Have you ever heard of Scam Baiting?
It's a highly entertaining sport that you can participate in.
Introduction to beating scammers at their own game and how you can help
Share your thoughts, ideas and experiences on the topic.
Links to top Anti-Scam resources provided.

 
LVL 28

Expert Comment

by:FishMonger
ID: 40303676
I just did a quick google search and good number of the hit suggest not using it.

http://truecrypt.sourceforge.net/
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40303760
Using it on windows? Then why perl, did you read the batch documentation?
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304636
I understand that the devs "want us to stop using it" but that will never happen.

Anyone able to figure out the command CLI to auto create virtual containers? Thanks!! :)
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40304694
Sorry, missed that it is Linux. Documentation advises to run truecrypt -h.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304951
It's cool. Doesn't that just display "help" ? ;)
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 40305231
No syntax help displayed?
0
 
LVL 1

Author Closing Comment

by:dr34m3rs
ID: 40305846
I decided to write my own ...  <3 thanks for the help
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question