Solved

TrueCrypt CLI Linux Command Line Create Volume Automatically

Posted on 2014-09-04
10
458 Views
Last Modified: 2014-09-05
Hope someone will be able to assist:

I have used TrueCrypt for many years and have recently wanted to start creating my own volumes "automatically" via perl script. I would like to be able to specify all the options using CLI instead of interactive mode to create a virtual volume file.

My example of what I'm going for (just an example I know this isn't correct)

truecrypt -c /path/to/virtual_volume --cypher sha-256-blowfish --random-source <path to random source> --volume-password 123456 --create-key /path/to/keyfile

Any help would be SO appreciated!

Thanks!

dr34m3r
0
Comment
Question by:dr34m3rs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 3
10 Comments
 
LVL 28

Accepted Solution

by:
FishMonger earned 250 total points
ID: 40303592
You can use the system function to execute your truecrypt command.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40303632
Hi FishMonger,

Yes I am aware of how to do the perl side programming: It's the truecrypt cli programming without using interactive mode that I need help with.....
0
 
LVL 28

Expert Comment

by:FishMonger
ID: 40303663
Sorry, I've never used truecrypt.
0
Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

 
LVL 28

Expert Comment

by:FishMonger
ID: 40303676
I just did a quick google search and good number of the hit suggest not using it.

http://truecrypt.sourceforge.net/
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
0
 
LVL 55

Expert Comment

by:McKnife
ID: 40303760
Using it on windows? Then why perl, did you read the batch documentation?
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304636
I understand that the devs "want us to stop using it" but that will never happen.

Anyone able to figure out the command CLI to auto create virtual containers? Thanks!! :)
0
 
LVL 55

Expert Comment

by:McKnife
ID: 40304694
Sorry, missed that it is Linux. Documentation advises to run truecrypt -h.
0
 
LVL 1

Author Comment

by:dr34m3rs
ID: 40304951
It's cool. Doesn't that just display "help" ? ;)
0
 
LVL 55

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 40305231
No syntax help displayed?
0
 
LVL 1

Author Closing Comment

by:dr34m3rs
ID: 40305846
I decided to write my own ...  <3 thanks for the help
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Six Sigma Control Plans

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question