CONTENTS
Introduction .......................................................................................................................................... 5
Beginner’s Tutorial ............................................................................................................................... 7
How to Create and Use a VeraCrypt Container ......................................................................... 7
How to Create and Use a VeraCrypt-Encrypted Partition/Device ........................................... 24
VeraCrypt Volume ................................................................................................................................ 25
Creating a New VeraCrypt Volume ............................................................................................................... 25
Favorite Volumes ........................................................................................................................................... 28
System Favorite Volumes .............................................................................................................................. 30
System Encryption ............................................................................................................................. 32
Hidden Operating System ........................................................................................................ 32
Operating Systems Supported for System Encryption ............................................................. 33
VeraCrypt Rescue Disk ............................................................................................................ 33
Plausible Deniability........................................................................................................................... 36
Hidden Volume .............................................................................................................................................. 37
Protection of Hidden Volumes Against Damage...................................................................... 39
Security Requirements and Precautions Pertaining to Hidden Volumes .................................. 42
Hidden Operating System .............................................................................................................................. 46
Main Program Window ..................................................................................................................... 53
Program Menu............................................................................................................................................... 56
Volumes -> Auto-Mount All Device-Hosted Volumes ............................................................ 56
Volumes -> Dismount All Mounted Volumes ......................................................................... 56
Volumes -> Change Volume Password .................................................................................... 56
Volumes -> Set Header Key Derivation Algorithm ................................................................. 56
Volumes -> Add/Remove Keyfiles to/from Volume Volumes -> Remove All Keyfiles from
Volume ..................................................................................................................................... 57
Favorites -> Add Mounted Volume to Favorites Favorites -> Organize Favorite Volumes
Favorites -> Mount Favorites Volumes .................................................................................... 57
Favorites -> Add Mounted Volume to System Favorites Favorites -> Organize System
Favorite Volumes ..................................................................................................................... 57
System -> Change Password .................................................................................................... 57
System -> Mount Without Pre-Boot Authentication ................................................................ 57
Tools -> Clear Volume History ................................................................................................ 58
Tools -> Traveler Disk Setup ................................................................................................... 58
Tools -> Keyfile Generator ...................................................................................................... 58
Tools -> Backup Volume Header Tools -> Restore Volume Header ...................................... 58
Settings -> Performance and Driver Options ........................................................................... 59
Settings -> Preferences ............................................................................................................. 60
Mounting VeraCrypt Volumes ...................................................................................................................... 62
Cache Password in Driver Memory ......................................................................................... 62
Mount Options.......................................................................................................................... 62
Parallelization ..................................................................................................................................... 63
Praat mee over dit product
Laat hier weten wat jij vindt van de VeraCrypt 1.16. Als je een vraag hebt, lees dan eerst zorgvuldig de handleiding door. Een handleiding aanvragen kan via ons contactformulier.