VeraCrypt
In this blog:
- What is VeraCrypt?
- Installation.
- Creating an encrypted file container.
- Mounting devices.
- Inside locked-container.
What is VeraCrypt?
VeraCrypt can be downloaded on
Mac, Windows, and most other Linux based operating systems.
It is a free and open source
disk encryption program.
VeraCrypt can create virtual
encrypted disks, encrypt partitions, or encrypt the entire storage device with
pre-boot authentication.
Uses enhanced security in
algorithms which makes it fairly immune to advancements in brute force attacks.
The latest Linux tarball of
VeraCrypt can be found at https://www.veracrypt.fr/en/Downloads.html. ➡️
![]() |
VeraCrypt website. |
To make it easier to find, I made a new directory called Veracrpyt and moved the download file into this directory.
I completed both commands in one using the pipe function.
Type – ‘mkdir
veracrypt | mv <veracrypt tarball> veracrypt’.
![]() |
Moving the tarball install to a new directory for ease of use. |
Open the file. There are 32-bit and 64-bit versions for both the command line and gui versions of the software. Download the 64-bit gui version of VeraCrypt.
![]() |
Choosing the 64-bit gui version for download. |
![]() |
Install prompt. |
I went with option 1.
Read the terms and conditions (or don’t) and click enter to exit the prompt.
Go to the start menu and search for VeraCrypt. It should be available now.
![]() |
VeraCrypt home page. |
Creating an encrypted file container
![]() |
Create New Volume. |
![]() |
Create an encrypted file container. |
Go to where you saved the extracted file and create an empty file
named lock-container.
Choose standard VeraCrypt Volume and choose the lock-container file to save it to.
![]() |
Encryption standards. |
For the size I will choose an arbitrary 750 MB.
![]() |
Selecting volume size. |
Click here to see a breakdown ➡️
![]() |
Random password generator script. |
For the next page, I stuck with the default FAT filesystem for the volume format.
![]() |
FAT filesystem. |
For the final step, move the mouse around inside the window as randomly as possible as this will allow the cryptographic generator to create a stronger encryption key.
Then click format.
Mounting Devices
Click on a slot and select the lock-container file and click mount.
You will be prompted for the password you set when creating the VeraCrypt account and then you will be asked for your administrator password.
![]() |
Select the lock-container to place in the first slot. |
![]() |
Checking the Mount Directory.Inside locked-containerI will use the lbkl (list block) command which
lists block devices (devices that are read and written to a block at a time,
usually 512MB – common block devices include hard disks.) |
![]() |
Moving files into the encrypted folder. |
Now we can exit out of the command line and click dismount in VeraCrypt.
Checking the directory now shows that it doesn’t exist. Our files are encrypted and hidden.
![]() |
Locked-container folder is hidden. |
To see our files again, start up VeraCrypt and mount the
lock-container file with your passwords. In the command line we can now see our
unencrypted files.
Comments
Post a Comment