Solved

TrueCrypt CLI Linux Command Line Create Volume Automatically

Posted on 2014-09-04
10
444 Views
Last Modified: 2014-09-05
Hope someone will be able to assist:

I have used TrueCrypt for many years and have recently wanted to start creating my own volumes "automatically" via perl script. I would like to be able to specify all the options using CLI instead of interactive mode to create a virtual volume file.

My example of what I'm going for (just an example I know this isn't correct)

truecrypt -c /path/to/virtual_volume --cypher sha-256-blowfish --random-source <path to random source> --volume-password 123456 --create-key /path/to/keyfile

Any help would be SO appreciated!

Thanks!

dr34m3r
0
Comment
Question by:dr34m3rs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 3
10 Comments
 
LVL 28

Accepted Solution

by:
FishMonger earned 250 total points
ID: 40303592
You can use the system function to execute your truecrypt command.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40303632
Hi FishMonger,

Yes I am aware of how to do the perl side programming: It's the truecrypt cli programming without using interactive mode that I need help with.....
0
 
LVL 28

Expert Comment

by:FishMonger
ID: 40303663
Sorry, I've never used truecrypt.
0
Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

 
LVL 28

Expert Comment

by:FishMonger
ID: 40303676
I just did a quick google search and good number of the hit suggest not using it.

http://truecrypt.sourceforge.net/
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40303760
Using it on windows? Then why perl, did you read the batch documentation?
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304636
I understand that the devs "want us to stop using it" but that will never happen.

Anyone able to figure out the command CLI to auto create virtual containers? Thanks!! :)
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40304694
Sorry, missed that it is Linux. Documentation advises to run truecrypt -h.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304951
It's cool. Doesn't that just display "help" ? ;)
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 40305231
No syntax help displayed?
0
 
LVL 1

Author Closing Comment

by:dr34m3rs
ID: 40305846
I decided to write my own ...  <3 thanks for the help
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question