Though there hasn’t been too much on the forums asking about encrypting files, several people have expressed interest in protecting files from others’ eyes. Through encryption, all of a user’s data, or just the data they wish, can be hidden as seemingly random data to anyone without the correct password. The easiest way to encrypt and transfer files is through a program known as TrueCrypt.

TrueCrypt offers several means for accessing it’s program, be it through Mac, Linux, or Windows, or through a traveling USB key. The wonderful open sourceness that is TrueCrypt allows users to protect any data they wish through easy to understand methods, using industry grade encryption. A user can simply install the program, or choose to use a portable version; either way, the default downloadable file can be found at TrueCrypt’s website.

Once the program is installed, users have several options. If they have a single-boot system running one operating system, they can opt for a full drive encryption that must be authenticated during boot. This option allows for a user to securely lock anyone out of their computer’s hard drive, even if physical access is available. Anyone looking at the drive will either see random data, or find that the drive is not formatted at all. This same concept can be applied to removable hard drives, thumbdrives, or partitions. None of these require pre-boot authentication, merely a password through the program once the operating system is launched.

Even easier, the ability to create virtual disks exists, allowing a user to store the encrypted data anywhere for easy transport.

Through the next few pictures, I’ll walk through the steps for setting up a simple virtual encrypted disk.
truecrypt1
This is the main screen of the Windows TrueCrypt program. It will look similar in other OSes, though all of the functions are the same.
truecrypt2
We’ll be using a simple encrypted file container, though if you wish you can encrypt full drives or system partitions in the same manner. If you choose to encrypt your system partition, you will need to burn the .iso it creates for you. If anything goes wrong, it will allow you to revert to your pre-encrypted state.

truecrypt3
The Hidden TrueCrypt volume allows a user to create files that contain both files you wish to hide, as well as files you wish to use as bait if someone should happen to determine your password, or you are forced to give up your password. For more information, check out the Hak5 video podcast on the subject.

truecrypt4
You can save your encrypted file anywhere you choose, be it a removable hard disk, or just on your desktop.

truecrypt5
You can choose any of the encryption algorithms and hash algorithms, though I would recommend using the Benchmark feature to determine if what you want is fast enough for your purposes. If you intend on encrypting an entire partition for regular use, I would recommend something that does not take as much time to decrypt. If you are looking for a longer term storage, go with a 3-stage encryption. Use the information links built in the program for more information.

truecrypt6
Choose any size you wish

truecrypt7
Use any password you wish, though the program will ask you to verify that you wish to use a low strength password.

truecrypt8
For information about keyfiles (something else required along with a password for the file to be accessed), check the Hak5 video I mentioned earlier in the post.

truecrypt9

truecrypt10
Choose a file system, or allow the program to determine one for you. If you intend on a file system for multiple operating systems, choose FAT. If you’re going to be staying on Windows and intend on having files over 4gb in size, you’ll need to use NTFS.

truecrypt11

truecrypt12
Select any drive letter not currently in use before finding your file. Selecting a drive letter further down in the alphabet will prevent against potential problems with other devices attached to your computer. Just enter your password, and locate keyfiles if necessary to mount your encrypted file.

truecrypt13
Your mounted file will look exactly like a removable disk, and technically it is. When you’re done, dismount the volume from within the TrueCrypt program. I would also recommend going into the settings and allowing the program to dismount if no data is read/written for a set period of time.

Steganography

For those who don’t want to use a complex technique, another type of hiding files exists. Steganography is a technique that hides messages (or in our case, data) in a way that no one apart from the sender and someone who is looking for the message can find. In our case, we’ll be combining simple rar and a jpeg file.

The steps are as follows – Zip / Rar any files you wish, and store them in a simple folder, such as C:\A. Take any jpeg, or gif and place it in the same folder (C:\A). In a command prompt window (Launch cmd.exe from Run, or if you’re on Vista / Windows 7, type cmd.exe in the search function in the Start Menu), type cd C:\foldername, and then press enter. Type the following command “ copy /b image.jpg + hide.rar newimagename.jpg “ where hide.rar is your to-be-hidden rar file, image.jpg is the picture you’ll be hiding the rar in, and newimagename.jpg is the aptly named new image with rar inside of it. This technique can be used with .zip as well, depending on your preferences.

The beauty of this technique is that you can open the picture in your choice of viewer, and it will look exactly as it did pre-combining. However, if you open it with an archive program such as 7-Zip, WinRAR, or WinZip, it will open the rar/zip.

If you want to be really crafty, try combining both encryption and Steganography to really conceal any data.

wtfbabyrar
Here’s a quick image to verify your skills..

You can message me on Runewire, Twitter, or the Forums if you have any questions, or suggestions for future articles.

Virtualization: Now and The Future

posted by on 28th July 2009, at 9:20pm | 2 Comments
What is Virtualization? The most common use of the word virtual for most people is “virtual environment” or “virtual world.” Expanding to the realm of computers also expands the areas in which “virtual” objects can be used. Before we move any further it’s important to state that hardware will be defined as the physical technology […]

64- vs. 32-bit: Which should you choose?

posted by on 30th June 2009, at 11:52pm | 4 Comments
With the upcoming release of Windows 7 this October I’ve been facing a flurry of questions about what version to choose. Ultimately 95% of you will want to stick with Home Premium, this is half of the battle. The other half of the decision is deciding which architecture you will use, 64-bit or 32-bit. Most […]

Twitter – Microblogging for everyone

posted by on 24th June 2009, at 4:04pm | 2 Comments
If you haven’t been locked away in dungeon for the past few years, you’ve probably at least heard of something called ‘Twitter’. Twitter is a website that allows its users to post 140 character updates for what they are currently doing. Designed to allow for the use of a text message update, 140 character posts have become normal in what is now known as Micro-Blogging.

A Windows 7 Experiment [Part 2]

posted by on 9th June 2009, at 7:04pm | 1 Comment
As you may remember in part 1 of this experiment I outlined the general purpose and my expectations. With that said if you’ve not read it please go back and do so. This part will cover the post-experiment review and also compare Windows 7 to Leopard. Using Windows 7 full time was hard, at first. […]

« Previous PageNext Page »