Skip to ContentSkip to Footer
  • Business

    View all Business

    • Acquisition
    • Careers & training
    • Data & insights
    • Data protection
    • Digital transformation
    • Leadership
    • Marketing & comms
    • Policy & legislation
    • Public sector
    • VoIP
  • Cloud

    View all Cloud

    • Cloud management
    • Cloud security
    • Cloud storage
    • Hybrid cloud
    • Infrastructure as a service (IaaS)
    • Platform as a service (PaaS)
    • Private cloud
    • Public cloud
    • Software as a service (SaaS)
    • Virtualisation
  • Hardware

    View all Hardware

    • Desktops
    • Laptops
    • Mobile phones
    • Monitors
    • Printers
    • Routers
    • Tablets
    • Windows Migration
  • Infrastructure

    View all Infrastructure

    • Backup
    • Broadband
    • Email providers
    • Internet
    • Internet of Things (IoT)
    • Mobile networks
    • Networking
    • Servers
    • Web hosting
  • Security

    View all Security

    • Software
    • Antivirus
    • Cyber attacks
    • Data breaches
    • Encryption
    • Firewalls
    • Hacking
    • Malware
    • Privacy
    • Ransomware
    • Unified threat management (UTM)
  • Software

    View all Software

    • Apple iOS
    • Business apps
    • Development
    • Google Android
    • Google Docs
    • Linux
    • Microsoft Office
    • Microsoft Windows
    • Open source
    • Operating systems
    • Windows Migration
  • Technology

    View all Technology

    • Artificial Intelligence (AI)
    • Augmented reality (AR)
    • Blockchain
    • Cognitive technology
    • Cryptocurrencies
    • Machine learning
    • Neural network
    • Smart city
    • Voice assistants
    • Voice recognition
  • Resources
  • .co.uk
    • .com
Tutorials
  • Home
  • Security

Encrypt your files for free with TrueCrypt (Step by Step)

Create a secure hard drive with these 5 steps.

by: IT Pro team
12 Oct 2012
Go to: Encrypt your files for free with TrueCrypt
  • Step 1: Obtaining TrueCrypt

    Step 1: Obtaining TrueCrypt

  • Step 2: Generate a Keyfile

    Step 2: Generate a Keyfile

  • Step 3: Build a Volume

    Step 3: Build a Volume

  • Step 4: Mount Volume and Copy Files

    Step 4: Mount Volume and Copy Files

  • Step 5: Shred the Originals

    Step 5: Shred the Originals

Recommended

1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk
Internet of Things (IoT)

New DNS vulnerabilities put millions of IoT devices at risk

13 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

13 Apr 2021
5G will accelerate cyber crime, predicts former White House CIO
5G

5G will accelerate cyber crime, predicts former White House CIO

13 Apr 2021
How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021
Logo
  • CloudPro
  • ChannelPro
  • Expert Reviews
  • About us
  • Contact us
  • Cookie Policy
  • Privacy Policy
  • Accessibility
  • Privacy Preferences

Get the IT Pro newsletter

Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies

Copyright © Dennis Publishing Limited 2021. All rights reserved.
IT Pro™ is a registered trademark.

Follow us on FacebookFollow us on TwitterConnect on LinkedIn