Information Technology Reference
In-Depth Information
Setting Up and Installing
Start by downloading TRUECRYPT from HTTP://WWW.TRUECRYPT.COM . Select the Mac OS
X “.dmg package” release. You might also choose to download the versions
for any other operating systems you'd like to use your new filestore under.
Once the download has finished, install the software by browsing to the
location you downloaded it to, double-clicking the .DMG file and then right-
clicking the .MPKG installation file, and selecting Open. You'll be warned that
the package is from an unidentified developer, but this is fine—just click the
Open button in the dialog box.
Creating an Encrypted Archive
Run the program (you can find it in Applications). The following instructions
explain how to create an initial encrypted filestore:
1.
Encrypted filestores are known as volumes . So, click the Create Volume
button in the middle left of the program window. A wizard will appear.
Ensure that “Create an encrypted file container” is selected, and click
Next. (Note that the second option, “Create a volume within a parti-
tion/drive,” might seem to suit your needs better, but creating a container
file allows the encrypted filestore to be transferred easily from one USB
key stick to another, if need be; thus, it's the best choice here.)
2.
Select the type of volume you want to create. The default choice of Stan-
dard TrueCrypt volume is fine. You might want to investigate the Hidden
TrueCrypt volume option at some point, but it has a specific purpose and
adds some complications. When done, click Next.
3.
On the Volume Location screen, click Select File to type a filename and
select a location for the new archive. By default TrueCrypt archives don't
need a file extension, but it's a good idea to give it one, so add the exten-
sion .TC . This will enable you to double-click the filestore to open it in
Windows. Once you're done, click the Save button in the dialog box; click
the Next button in the wizard to move to the next step.
4.
You'll be invited to choose the encryption algorithm you want to use. You
can select each in the list to read a description underneath the list
showing the pros and cons of each choice. AES is a good choice for most
uses. You can also change the hash algorithm if you want, but there
shouldn't be any need to do this. Once you are done, click Next.
 
 
 
 
Search WWH ::




Custom Search