In this issue: Create an Encrypted Container To Hide All Your Secrets With VeraCrypt - [View in browser](
Wednesday, June 12, 2019
Create an Encrypted Container To Hide All Your Secrets With VeraCrypt
by Mark O'Neill | [Online Tech Tips](
Once upon a time, there was an encryption protocol called TrueCrypt. It was said to be totally impregnable with the FBI unable to break in. Then [the TrueCrypt project was suddenly shut down]( and [rumors started flying]( that the FBI had finally busted its encryption.
TrueCrypt has now been replaced by [VeraCrypt]( which, from the outside, looks more or less identical. But unless your enemy is a government or an evil emperor on a fully operational Death Star, VeraCrypt is more than sufficient to keep nosy parents, spouses, and roommates from reading your private business (porn).
In this first part of a three-part article, I will be showing you how to set up an encrypted volume with VeraCrypt. In part two, I will show you how to hide a hidden section inside the encrypted volume for extra super-special security. In part three, I will explain how to encrypt your entire operating system with the program.
Setting Up VeraCrypt For The Very First Time
First, head on over to [the Veracrypt website]( and choose your operating system. I particularly like the portable Windows version which stays on my USB stick.
Now install the program as you usually would with any other program.
Opening It Up
When you open up the program, this is what you will see.
The first step is to click âCreate Volumeâ. This now pops up.
Today, weâre going with door number one. So click on âCreate an encrypted file containerâ and then âNextâ.
The hidden volume option will be discussed in more depth in part two. So for the moment, choose âStandard VeraCrypt volumeâ and then âNextâ.
The next step is to specify the location of the encrypted volume and the name of it. Click on âSelect Fileâ and navigate to the folder where you want to put it. Then type the name of it. Both the location and the name can be changed later if need be.
The next screen now asks you to choose your encryption algorithm. It will default to AES, which is perfectly fine. If itâs good enough for the US Governmentâs Top Secret files, then itâs good enough for your Katy Perry albums. No need to overthink this one.
Equally, donât touch the hash algorithm, unless you absolutely know what youâre doing.
You now need to decide how big the volume has to be.
You have to take two considerations into account.
- What will the encrypted volume be used for? Videos and music for example will need a larger volume than just purely files.
- How much free space do you have on your computer? VeraCrypt volumes can be moved onto removable media such as USB sticks and portable hard-drives. Or cloud storage. But you need to find out in advance if you have the storage space needed, as changing the volume size later is not possible.
For the purposes of this article, I went with 1GB. But my main VeraCrypt volume is 150GB.
Now the most important part of all – the password.
Before choosing a password, you have to remember the following. VeraCrypt does not, for the sake of security, do password resets or password reminders. So if you forget your password, you are quite literally up the creek without the proverbial paddle.
So although the password should not be something stupid like â12345â, it should also be something you will always remember.
I would avoid keyfiles and PIMâs for the moment. They have the potential to make your volume much more secure but you need to have a solid understanding of how they work. I am still trying to figure it out so I am not going to expect you to suddenly become an expert in it. Letâs keep it simple for now.
Last of all, itâs time to generate your encryption keys.
Move your mouse randomly around the VeraCrypt window until the red bar at the bottom gets to the other end and turns green. As the window says, the longer you move it and the more random the moves, the better the encryption strength.
When the bar at the bottom is green, click âFormatâ and your volume will be made and placed in the location you specified.
Opening Up Your VeraCrypt Volume
Now that you have your nice shiny new volume, itâs time to open it up and hide some files in there.
Go back to the VeraCrypt main window, highlight a drive letter with your mouse, click âSelect Fileâ, and double-click the volume. Remember not to use any drive letters currently being used by other drives, portable media or software. When the volume is showing, click âMountâ.
I would advise you to keep âNever save historyâ ticked. Otherwise, VeraCrypt will keep a record of all the volume locations on your computer that were recently accessed.
Now enter your password. âTrueCrypt Modeâ is only for people who had old TrueCrypt volumes which were suddenly rendered useless when the software was abandoned. But you can ignore that if you have never used TrueCrypt.
Once the password has been successfully entered, go to Windows Explorer (or Finder if you are using MacOS) and you will see the volume âmountedâ as a drive.
Or you can double-click on the volume in VeraCrypt to be taken directly there.
Now you can just drag files into the volume and they will show up.
To close the volume and secure the files, click âDismountâ on the VeraCrypt window.
And that is how to make an encrypted folder/volume. You can create as many of these as you want – VeraCrypt does not impose any limits. Of course, the more volumes you have on the go, the more passwords you have to remember. So maybe donât go too crazy.
Next time, weâll look at hidden volumes within normal volumes. Stay tuned for that.
You may also like these other posts from OTT:
[The Five Best Android Antivirus and Security Apps](
[TripIt vs Google Trips](
[The Best Add-Ons To Power Up Your Gmail Inbox](
[Enjoy Responsibly: New Tech Thatâs Helping People Drink Smarter](
[10 Useful Gadgets to Make Practically Any Car Smart](
Check out more posts from our publishing family:
Help Desk Geek Posts
[How To Batch Rename All Of Your MP3 Metadata Files](
Jun 12, 2019 by Mark O'Neill
Nowadays, if you want to listen to music, you would either stream it through a service such as Spotify, or buy the digital file from Amazon or iTunes. But if you have a big stack of old CDâs cluttering up your house, and youâve sat and ripped them all to MP3 files, itâs then time […]
[READ MORE](
[How To Create a Windows 10 Installation USB Stick](
Jun 11, 2019 by Mark O'Neill
Back in March, I wrote about making a MacOS installer on a USB stick. But you may not be aware that it is entirely possible to do the same with Windows 10 (or whatever the current version of Windows is). Windows comes pre-installed with every PC but there are times when a USB version becomes […]
[READ MORE](
The Backroom Tech Posts
[Using Wireshark to Sniff an SMB transmission](
May 22, 2019 by Dan Franciscus
Have you ever wondered what is happening under the hood when connecting to a Windows share? There is one easy way to find out. Use a packet sniffer such as Wireshark. What is Wireshark? Wireshark is a simple to install and easy to use packet capturing tool that is supported on both Windows and Linux. […]
[READ MORE](
[How to Configure IPSec on Windows](
May 13, 2019 by Dan Franciscus
There are many applications which will implement authentication and encryption of network traffic through a separate third party program. However, the Microsoft operating system can also implement this natively through the configuration of IPSEC. In this article we will look at what IPSEC is and a simple example of implementation. What is IPSEC? Internet Protocol […]
[READ MORE](
Switching To Mac Posts
[How to Change the Function of AirPods](
Jun 12, 2019 by Patrick Hearn
Bluetooth headphones have been around for years, but Apple changed the game when they introduced the AirPods. The AirPods look great and are built to be the most comfortable option for the average person, but their true power of the AirPods comes through in their functionality and versatility. AirPods are activated (or deactivated) by double […]
[READ MORE](
[Upgrading a MacBook thatâs Over 10 Years Old](
May 31, 2019 by Christian Thompson
It was the fall of my junior year in high school when my aunt bought me my first laptop. A brand-new MacBook Pro and I absolutely couldnât believe it. As it turns out, this same computer is still running almost 10 years later; but is it running as efficiently? With a little tender, love, and […]
[READ MORE](
ABOUT ONLINE TECH TIPS
Welcome to Online Tech Tips â A blog that provide readers with daily computer tutorials, technology news, software reviews, and personal computing tips. My name is Aseem Kishore and I am a full-time professional blogger. I graduated from Emory University with a degree in Computer Science and Mathematics.
Copyright © 2019 Online-Tech-Tips.com, LLC, All rights reserved.
You are receiving this email because you joined our newsletter on our website, www.Online-Tech-Tips.com. You'll get an email whenever we post a new article!
[Update Preferences]( | [Unsubscribe](