SlideShare a Scribd company logo
How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
1. Download TrueCrypt. http://www.truecrypt.org/downloads
2. Accept the licensing agreement.
3. Begin the install process…
4. Select your setup options.
5. Click “OK” to acknowledge that TrueCrypt is installed.
6. You will see an option to view a beginner’s tutorial. It’s your call…
7. Click “Finish” to complete the install process.
8. Double-click the TrueCrypt icon to start the program.
9. To encrypt the whole system hard drive, click “Create Volume”.
10. Select “Encrypt the system partition or entire  system drive” and then click “Next”.
11. Select “Normal” and then click “Next”.
12. Select “Encrypt the whole drive” and then click “Next”.
13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
19. This screen confirms your encryption keys have been generated. Click “Next”.
20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
22. The “Windows Disc Image Burner” displays an initial message that the process has started…
23.  …then a message that it is finalizing the disc image…
24.  …then a message that it is actually burning the disc image to the recordable disc…
25. …and then a message that the disc image has been successfully burned. Click “Close”.
26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
29. This screen shows the System Encryption Pretest. Click “Test”.
30. Read or print the notes, as you wish, and then click “OK”.
31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
33.  …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
36. Once done, click “Finish”. Voila!  Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system.  Be assured no one else will, for that matter, unless they have the  correct password.

More Related Content

Viewers also liked

MySQL 1, introduction
MySQL 1, introductionMySQL 1, introduction
MySQL 1, introduction
Fahri Firdausillah
 
Effective user training
Effective user trainingEffective user training
Effective user training
Ari Elias-Bachrach
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
Fahri Firdausillah
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
David Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
David Busby, CISSP
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yours
David Busby, CISSP
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
David Busby, CISSP
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloud
David Busby, CISSP
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
Ari Elias-Bachrach
 

Viewers also liked (9)

MySQL 1, introduction
MySQL 1, introductionMySQL 1, introduction
MySQL 1, introduction
 
Effective user training
Effective user trainingEffective user training
Effective user training
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
PLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yoursPLMCE - Security and why you need to review yours
PLMCE - Security and why you need to review yours
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
Cumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloudCumulonimbus fortification-secure-your-data-in-the-cloud
Cumulonimbus fortification-secure-your-data-in-the-cloud
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
 

Similar to How to Encrypt Your Laptop with TrueCrypt

Vj software-win7
Vj software-win7Vj software-win7
Vj software-win7
creatrios
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
Ghanshyam Prakash
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
Shah Mamun Kabir
 
vistasetup.ppt
vistasetup.pptvistasetup.ppt
vistasetup.ppt
JhoelKenneth
 
Vistasetup
VistasetupVistasetup
Vistasetup
LowrenceTobias1
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Theron Gilmer
 
Truecrypt
TruecryptTruecrypt
Truecrypt
wncstudent1
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
naaaaz
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
bizet
 
Bad ram or ddr
Bad ram or ddrBad ram or ddr
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
François Dénommée
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
ajay_mane22
 
6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx
JohnKingjohnkingmond
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Win7guide
Win7guideWin7guide
Win7guide
Sandeep Rao
 
Support article1224
Support article1224Support article1224
Support article1224
Breanna.org
 
Activating x entry 9.2020
Activating x entry 9.2020Activating x entry 9.2020
Activating x entry 9.2020
OBDbytes1
 
Os Virtualization
Os VirtualizationOs Virtualization
Os Virtualization
Don Bosco BSIT
 
Kali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-StepKali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-Step
Supriya G
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
Ismail Mukiibi
 

Similar to How to Encrypt Your Laptop with TrueCrypt (20)

Vj software-win7
Vj software-win7Vj software-win7
Vj software-win7
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
vistasetup.ppt
vistasetup.pptvistasetup.ppt
vistasetup.ppt
 
Vistasetup
VistasetupVistasetup
Vistasetup
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Truecrypt
TruecryptTruecrypt
Truecrypt
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
 
Bad ram or ddr
Bad ram or ddrBad ram or ddr
Bad ram or ddr
 
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx6_2020_03_05!06_46_22_PM.pptx
6_2020_03_05!06_46_22_PM.pptx
 
Virtualization.pdf
Virtualization.pdfVirtualization.pdf
Virtualization.pdf
 
Win7guide
Win7guideWin7guide
Win7guide
 
Support article1224
Support article1224Support article1224
Support article1224
 
Activating x entry 9.2020
Activating x entry 9.2020Activating x entry 9.2020
Activating x entry 9.2020
 
Os Virtualization
Os VirtualizationOs Virtualization
Os Virtualization
 
Kali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-StepKali Linux Installation process in VMware Step-By-Step
Kali Linux Installation process in VMware Step-By-Step
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 

How to Encrypt Your Laptop with TrueCrypt

  • 1. How to Encrypt Your Laptop with TrueCrypt Ed Lachgar Legal Services of Northern California
  • 2. 1. Download TrueCrypt. http://www.truecrypt.org/downloads
  • 3. 2. Accept the licensing agreement.
  • 4. 3. Begin the install process…
  • 5. 4. Select your setup options.
  • 6. 5. Click “OK” to acknowledge that TrueCrypt is installed.
  • 7. 6. You will see an option to view a beginner’s tutorial. It’s your call…
  • 8. 7. Click “Finish” to complete the install process.
  • 9. 8. Double-click the TrueCrypt icon to start the program.
  • 10. 9. To encrypt the whole system hard drive, click “Create Volume”.
  • 11. 10. Select “Encrypt the system partition or entire system drive” and then click “Next”.
  • 12. 11. Select “Normal” and then click “Next”.
  • 13. 12. Select “Encrypt the whole drive” and then click “Next”.
  • 14. 13. Select “No” (so you don’t encrypt hidden areas) and then click “Next”.
  • 15. 14. Most commonly you will want to select “Single boot” for your system; then click “Next”.
  • 16. 15. Accept the default encryption options (“AES” is just dandy) and then click “Next”.
  • 17. 16. Type in your password and then confirm it. (Leave “Use key files” unchecked.) Click “Next”.
  • 18. Since we are on the topic of passwords… … be sure to read what TrueCrypt recommends for creating a good password. … whatever password you use, make sure to write it down and put it somewhere you can find it later.
  • 19. 17. Despite the warning message, if you think your password is strong enough, just click “Yes”.
  • 20. 18. This next screen just shows the cryptographic strength of your encryption. Click “Next”.
  • 21. 19. This screen confirms your encryption keys have been generated. Click “Next”.
  • 22. 20. You need to create a Rescue Disk so you can restore your drive if things go awry. Click “Next”.
  • 23. 21. Be sure you insert a blank recordable CD/DVD into your CD/DVD drive. Click “OK”.
  • 24. 22. The “Windows Disc Image Burner” displays an initial message that the process has started…
  • 25. 23. …then a message that it is finalizing the disc image…
  • 26. 24. …then a message that it is actually burning the disc image to the recordable disc…
  • 27. 25. …and then a message that the disc image has been successfully burned. Click “Close”.
  • 28. 26. Since you already burned the image to a disc, you don’t need to do it again. Click “Next” .
  • 29. 27. The TrueCrypt Rescue Disk is now verified. Remove the disc and then click “Next”.
  • 30. 28. Select “3 pass (US DoD 5220.22-M)” at this screen, then click “Next”.
  • 31. 29. This screen shows the System Encryption Pretest. Click “Test”.
  • 32. 30. Read or print the notes, as you wish, and then click “OK”.
  • 33. 31. TrueCrypt is now ready to do the actual the encryption. Click “Yes” to restart your computer.
  • 34. 32. After the restart, this message confirms the Pretest is completed. Click “Encrypt” to begin…
  • 35. 33. …but first you get instructions about how to use the TrueCrypt Rescue Disk! Click “OK”.
  • 36. 34. At this screen, click “Encrypt” (yes, again!) and let the process run. This may take a long time, possibly overnight, so make sure your laptop is plugged into a power outlet so that it doesn’t lose power during the encryption.
  • 37. 35. Eventually you see a message confirming the hard drive has been encrypted. Click “OK”.
  • 38. 36. Once done, click “Finish”. Voila! Your system is now fully encrypted. Make sure you know your password or where you wrote it down, otherwise you won’t be able to get in to your system. Be assured no one else will, for that matter, unless they have the correct password.