SlideShare une entreprise Scribd logo
1  sur  38
How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
1. Download TrueCrypt. http://www.truecrypt.org/downloads
2. Accept the licensing agreement.
3. Begin the install process…
4. Select your setup options.
5. Click “OK” to acknowledge that TrueCrypt is installed.
6. You will see an option to view a beginner’s tutorial. It’s your call…
7. Click “Finish” to complete the install process.
8. Double-click the TrueCrypt icon to start the program.
9. To encrypt the whole system hard drive, click “Create Volume”.
10. Select “Encrypt the system partition or entire  system drive” and then click “Next”.
11. Select “Normal” and then click “Next”.
12. Select “Encrypt the whole drive” and then click “Next”.
13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
19. This screen confirms your encryption keys have been generated. Click “Next”.
20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
22. The “Windows Disc Image Burner” displays an initial message that the process has started…
23.  …then a message that it is finalizing the disc image…
24.  …then a message that it is actually burning the disc image to the recordable disc…
25. …and then a message that the disc image has been successfully burned. Click “Close”.
26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
29. This screen shows the System Encryption Pretest. Click “Test”.
30. Read or print the notes, as you wish, and then click “OK”.
31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
33.  …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
36. Once done, click “Finish”. Voila!  Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system.  Be assured no one else will, for that matter, unless they have the  correct password.

Contenu connexe

En vedette

Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basicsDavid Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursDavid Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudDavid Busby, CISSP
 

En vedette (9)

MySQL 1, introduction
MySQL 1, introductionMySQL 1, introduction
MySQL 1, introduction
 
Effective user training
Effective user trainingEffective user training
Effective user training
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yours
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloud
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
 

Similaire à How to Encrypt Your Laptop with TrueCrypt

Similaire à How to Encrypt Your Laptop with TrueCrypt (20)

Vj software-win7
Vj software-win7Vj software-win7
Vj software-win7
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
vistasetup.ppt
vistasetup.pptvistasetup.ppt
vistasetup.ppt
 
Vistasetup
VistasetupVistasetup
Vistasetup
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Truecrypt
TruecryptTruecrypt
Truecrypt
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
 
Bad ram or ddr
Bad ram or ddrBad ram or ddr
Bad ram or ddr
 
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
 
Win7guide
Win7guideWin7guide
Win7guide
 
Support article1224
Support article1224Support article1224
Support article1224
 
Activating x entry 9.2020
Activating x entry 9.2020Activating x entry 9.2020
Activating x entry 9.2020
 
Os Virtualization
Os VirtualizationOs Virtualization
Os Virtualization
 
Kali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-StepKali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-Step
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

How to Encrypt Your Laptop with TrueCrypt

  • 1. How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
  • 2. 1. Download TrueCrypt. http://www.truecrypt.org/downloads
  • 3. 2. Accept the licensing agreement.
  • 4. 3. Begin the install process…
  • 5. 4. Select your setup options.
  • 6. 5. Click “OK” to acknowledge that TrueCrypt is installed.
  • 7. 6. You will see an option to view a beginner’s tutorial. It’s your call…
  • 8. 7. Click “Finish” to complete the install process.
  • 9. 8. Double-click the TrueCrypt icon to start the program.
  • 10. 9. To encrypt the whole system hard drive, click “Create Volume”.
  • 11. 10. Select “Encrypt the system partition or entire system drive” and then click “Next”.
  • 12. 11. Select “Normal” and then click “Next”.
  • 13. 12. Select “Encrypt the whole drive” and then click “Next”.
  • 14. 13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
  • 15. 14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
  • 16. 15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
  • 17. 16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
  • 18. Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
  • 19. 17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
  • 20. 18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
  • 21. 19. This screen confirms your encryption keys have been generated. Click “Next”.
  • 22. 20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
  • 23. 21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
  • 24. 22. The “Windows Disc Image Burner” displays an initial message that the process has started…
  • 25. 23. …then a message that it is finalizing the disc image…
  • 26. 24. …then a message that it is actually burning the disc image to the recordable disc…
  • 27. 25. …and then a message that the disc image has been successfully burned. Click “Close”.
  • 28. 26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
  • 29. 27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
  • 30. 28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
  • 31. 29. This screen shows the System Encryption Pretest. Click “Test”.
  • 32. 30. Read or print the notes, as you wish, and then click “OK”.
  • 33. 31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
  • 34. 32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
  • 35. 33. …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
  • 36. 34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
  • 37. 35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
  • 38. 36. Once done, click “Finish”. Voila! Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system. Be assured no one else will, for that matter, unless they have the correct password.