Veracrypt review 20158/3/2023 ![]() However, these systems typically contain vast quantities of confidential details. Especially the portability of these devices makes them extremely popular amongst the general public and business users alike. Once VeraCrypt has been successfully installed, and an existing Truecrypt volume converted to the new file format, the operation of the VeraCrypt utility is almost identical to that which was required previously for Truecrypt.The use of Laptops, mobile phones, and USB flash drives is now more common than ever. The encrypted volume may now be mounted and unmounted directly by VeraCrypt. On VeraCrypt’s main menu, navigate to Volumes – Change Volume Password and check the box labelled TrueCrypt Mode. This is achieved by running VeraCrypt and using Select File to select the Truecrypt volume. The final important step is to open the existing Truecrypt volume and convert it to VeraCrypt format. That seems a little more complex than necessary, but VeraCrypt is indeed installed through this mechanism. Sure enough, once the password is entered, a series of commands shows the progression of the installation of the various VeraCrypt modules and completion of this process. ![]() The installer requires authorization in the form of the root password in order to continue with the installation process. However, with the initial two lines of text, the developers are merely trying to inform us of the command required to uninstall the software should we subsequently wish to do so. We aren’t uninstalling VeraCrypt, we are trying to install this software. Once again, the instructions are a little confusing. To uninstall VeraCrypt, please run 'veracrypt-uninstall.sh'. Multiple presses of the space bar were required to browse through the license text.įinally, when agreeing to be bound by the license terms, the following text was displayed: Uninstalling VeraCrypt: ![]() The instructions indicated to “Press Enter or space bar to see the rest of the license.” However, “Enter” didn’t work. The next issue was the display of the software license. Nevertheless, selecting this option did result in the installation process starting. I found this terminology to be a little confusing since I had already extracted the four internal modules from the (tar.bz2) tarball file and was actually running the file veracrypt-1.15-setup-gui-圆4. In particular, this produced an option to “Install veracrypt_1.15_”. On my system, it proved necessary to use the “Run in Terminal” command to make something happen. Despite instructions found on the web, trying to use the “Run” command, after double-clicking on one of the installation files, didn’t do anything. So, let the installation begin…ĭownloading the tarball and extracting the four included files was not a problem however, getting any of the executables to actually run proved to be an issue. ![]() Fortunately, with the demise of Truecrypt, a fork of the software – VeraCrypt – has been produced, and this open-source product has already been patched to fix the coding flaws. Since this application is no longer under development, the problems were not going to be fixed, and it was time to move on from my go-to file encryption software. Recent postings on the web indicated that two critical flaws had been discovered in Truecrypt. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |