SlideShare a Scribd company logo
1 of 38
How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
1. Download TrueCrypt. http://www.truecrypt.org/downloads
2. Accept the licensing agreement.
3. Begin the install process…
4. Select your setup options.
5. Click “OK” to acknowledge that TrueCrypt is installed.
6. You will see an option to view a beginner’s tutorial. It’s your call…
7. Click “Finish” to complete the install process.
8. Double-click the TrueCrypt icon to start the program.
9. To encrypt the whole system hard drive, click “Create Volume”.
10. Select “Encrypt the system partition or entire  system drive” and then click “Next”.
11. Select “Normal” and then click “Next”.
12. Select “Encrypt the whole drive” and then click “Next”.
13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
19. This screen confirms your encryption keys have been generated. Click “Next”.
20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
22. The “Windows Disc Image Burner” displays an initial message that the process has started…
23.  …then a message that it is finalizing the disc image…
24.  …then a message that it is actually burning the disc image to the recordable disc…
25. …and then a message that the disc image has been successfully burned. Click “Close”.
26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
29. This screen shows the System Encryption Pretest. Click “Test”.
30. Read or print the notes, as you wish, and then click “OK”.
31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
33.  …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
36. Once done, click “Finish”. Voila!  Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system.  Be assured no one else will, for that matter, unless they have the  correct password.

More Related Content

Viewers also liked

Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basicsDavid Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursDavid Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudDavid Busby, CISSP
 

Viewers also liked (9)

MySQL 1, introduction
MySQL 1, introductionMySQL 1, introduction
MySQL 1, introduction
 
Effective user training
Effective user trainingEffective user training
Effective user training
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yours
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloud
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
 

Similar to How to Encrypt Your Laptop with TrueCrypt

Similar to How to Encrypt Your Laptop with TrueCrypt (20)

Vj software-win7
Vj software-win7Vj software-win7
Vj software-win7
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
vistasetup.ppt
vistasetup.pptvistasetup.ppt
vistasetup.ppt
 
Vistasetup
VistasetupVistasetup
Vistasetup
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Truecrypt
TruecryptTruecrypt
Truecrypt
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
 
Bad ram or ddr
Bad ram or ddrBad ram or ddr
Bad ram or ddr
 
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
 
Win7guide
Win7guideWin7guide
Win7guide
 
Support article1224
Support article1224Support article1224
Support article1224
 
Activating x entry 9.2020
Activating x entry 9.2020Activating x entry 9.2020
Activating x entry 9.2020
 
Os Virtualization
Os VirtualizationOs Virtualization
Os Virtualization
 
Kali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-StepKali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-Step
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

How to Encrypt Your Laptop with TrueCrypt

  • 1. How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
  • 2. 1. Download TrueCrypt. http://www.truecrypt.org/downloads
  • 3. 2. Accept the licensing agreement.
  • 4. 3. Begin the install process…
  • 5. 4. Select your setup options.
  • 6. 5. Click “OK” to acknowledge that TrueCrypt is installed.
  • 7. 6. You will see an option to view a beginner’s tutorial. It’s your call…
  • 8. 7. Click “Finish” to complete the install process.
  • 9. 8. Double-click the TrueCrypt icon to start the program.
  • 10. 9. To encrypt the whole system hard drive, click “Create Volume”.
  • 11. 10. Select “Encrypt the system partition or entire system drive” and then click “Next”.
  • 12. 11. Select “Normal” and then click “Next”.
  • 13. 12. Select “Encrypt the whole drive” and then click “Next”.
  • 14. 13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
  • 15. 14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
  • 16. 15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
  • 17. 16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
  • 18. Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
  • 19. 17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
  • 20. 18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
  • 21. 19. This screen confirms your encryption keys have been generated. Click “Next”.
  • 22. 20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
  • 23. 21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
  • 24. 22. The “Windows Disc Image Burner” displays an initial message that the process has started…
  • 25. 23. …then a message that it is finalizing the disc image…
  • 26. 24. …then a message that it is actually burning the disc image to the recordable disc…
  • 27. 25. …and then a message that the disc image has been successfully burned. Click “Close”.
  • 28. 26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
  • 29. 27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
  • 30. 28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
  • 31. 29. This screen shows the System Encryption Pretest. Click “Test”.
  • 32. 30. Read or print the notes, as you wish, and then click “OK”.
  • 33. 31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
  • 34. 32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
  • 35. 33. …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
  • 36. 34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
  • 37. 35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
  • 38. 36. Once done, click “Finish”. Voila! Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system. Be assured no one else will, for that matter, unless they have the correct password.