laptop

VeraCrypt

A few years ago, the TrueCrypt program, which allows you to encrypt data on the fly, was discontinued. However, this does not mean that there are no free applications with similar functionality left. Based on the TrueCrypt source codes, VeraCrypt is developing quite successfully and dynamically. Its developers release updates, fix bugs and add functionality quite steadily.

Installation of the program follows almost a standard scenario, where you need to confirm the license agreement, select the folder where the program files will be located and where to add icons to run the program. Plus there is an option to let everyone use VeraCrypt and create a restore point for the operating system in case something goes wrong. After that you have to wait a couple of seconds for all files to be unpacked. At the last step VeraCrypt kindly offers beginners to study a step-by-step guide on how to use the basic features, so that users don’t waste their precious time on experiments or accidentally make a mess of their personal data.

VeraCrypt allows you to make encrypted containers as files or completely encrypt a logical hard disk partition. Moreover, risky people can even encrypt the system partition from which the operating system is loaded. However, if something goes wrong, all data will be lost, the computer will not boot, and will have to reinstall the operating system.

I’m also glad that support for two partitions inside one container is implemented here. That is, two passwords that allow access to different partitions with different files stuffed into one container. In case you are pressed and there is no way out, you give out the password from the partition where you don’t store anything important.

To create a new encrypted partition you need to press the “Create Volume” button, after which the settings wizard will help you make all operations and settings, explaining in detail why each item is needed.

To connect an encrypted partition as a file, select it through the “Files…” button, and if you need to connect a logical disk, you need to do it through the “Device…” section. After that we press the “Mount” button, type the password, and as if by magic a new disk will appear on your computer. But do not forget, before that you need to select the letter under which your encrypted disk will appear in the system.

Various manipulations with encrypted partitions can be done through the context menu, which is called by pressing the right mouse button and clicking the “Operations with volumes” button. The most interesting thing is that most of the items are different. From the context menu you can check and fix the file system of the encrypted container, if possible, fully decrypt the partition and add it to the favorites list for quick access. At the click of a button you can change buttons, encryption method, backup and restore volume header (this is the section where information about encrypted files is stored) and add/modify/remove key files (a set of files used to encrypt and decrypt partitions).