VeraCrypt User Guide [1.24-Update6 ed.]

1,052 173 2MB

English Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

VeraCrypt User Guide [1.24-Update6 ed.]

  • Author / Uploaded
  • IDRIX

Table of contents :
Preface
Introduction
Beginner's Tutorial
VeraCrypt Volume
Creating a New VeraCrypt Volume
Favorite Volumes
System Favorite Volumes
System Encryption
Hidden Operating System
Operating Systems Supported for System Encryption
VeraCrypt Rescue Disk
Plausible Deniability

Hidden Volume
Protection of Hidden Volumes Against Damage
Security Requirements and Precautions Pertaining to Hidden Volumes
Hidden Operating System
Main Program Window
Program Menu
Mounting Volumes
Parallelization
Pipelining
Hardware acceleration
Hot keys
Keyfiles
Security Tokens & Smart Cards
Portable Mode
TrueCrypt Support
Converting TrueCrypt Volumes & Partitions
Default Mount Parameters
Language Packs
Encryption Algorithms
AES
Camellia
Kuznyechik
Serpent
Twofish
Cascades of ciphers
Hash Algorithms
RIPEMD-160
SHA-256
SHA-512
Whirlpool
Streebog
Supported Operating Systems
Command Line Usage
Security Model
Security Requirements And Precautions

Data Leaks
Paging File
Memory Dump Files
Hibernation File
Unencrypted Data in RAM
Physical Security
Malware
Multi-User Environment
Authenticity and Integrity
Choosing Passwords and Keyfiles
Changing Passwords and Keyfiles
Trim Operation
Wear-Leveling
Reallocated Sectors
Defragmenting
Journaling File Systems
Volume Clones
Additional Security Requirements and Precautions
How To Back Up Securely
Miscellaneous
Using VeraCrypt Without Administrator Privileges
Sharing Over Network
VeraCrypt Background Task
Volume Mounted as Removable Medium
VeraCrypt System Files & Application Data
How To Remove Encryption
Uninstalling VeraCrypt
Digital Signatures
Troubleshooting
Incompatibilities
Known Issues and Limitations
Frequently Asked Questions
Technical Details
Notation
Encryption Scheme
Modes of Operation
Header Key Derivation, Salt, and Iteration Count
Random Number Generator
Keyfiles
PIM
VeraCrypt Volume Format Specification
Compliance with Standards and Specifications
Source Code
Contact
Legal Information
Version History
Acknowledgements
References

Polecaj historie