VeraCrypt is a data encryption program

Mutt

Professional
Messages
1,459
Reaction score
1,105
Points
113
Good day, this article will focus on the program for encrypting data - VeraCrypt.

d87d15da-eb50-4a95-bdc8-473f9e3ca0bd.png


The program is free and exists for all operating systems. Consider the version for Windows. First, download the program from the official website, install it. There is also a portable version that you just need to unpack.

Program interface.

To encrypt something, click "create volume".
We have three options:

1. Create an encrypted file container. That is, create a simple file in which we will hide something.

2. Encrypt non-system partition / disk. Here we can encrypt a disk, flash drive, or create a separate encrypted partition.

3. Encrypt a partition or an entire disk with a system. Encryption of the main operating system and all files in it. When starting the OS, we will need to enter a password.

Let's create a file container, after typing on "Next", you can select the type of volume Hidden and Normal.

A regular VeraCrypt volume is a regular volume.
Hidden VeraCrypt volume - needed to create a double container, that is, when you enter one password, some files are decrypted, and when you enter a different password, other files are decrypted. We will create a regular one. We select the location of the volume, and its name. You can also specify an extension (txt mp4, etc.).

Next, select the encryption algorithm and the hashing algorithm, you can leave everything as default. Next, select the size of the volume, enter the password (It is advisable, of course, to use 20 characters or more, but if you are not a cybercriminal, then you can shorter)

And here we are waiting for the indicator to fill.

Next, the program will notify us about the successful creation of the volume, and in order to use it, we select the letter where we will mount the volume, select the file (or disk / partition, depending on what you encrypted), click "mount", enter our password in the window that opens. We are waiting for about 10 seconds, if the password is incorrect, the program will tell us about it. After a successful mount, we will see this in the program, and in the explorer we will see the connected disk. We put everything valuable there.

To encrypt everything back, we click to unmount it.
You can also customize keyboard shortcuts for unmounting.
If you create an encrypted disk / partition, its creation will take much more time, about 2-3 hours, depending on the size of the volume, and so that the computer does not swear and does not ask to format the volume when connected, you can remove the letter from it or in disk management , or in third-party programs, MiniToolPartitionWizard for example. When encrypting the system, a backup is required!
 
Top