documentation
.HELP!
VeraCrypt Documentation
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
VeraCrypt
previous page
next page
Home
Source Code
Downloads
Documentation
Donate
Forums
Documentation
>" style="margin-top: 5px">
Miscellaneous
Miscellaneous
Use Without Admin Rights
Sharing over Network
Background Task
Removable Medium Volumes
VeraCrypt System Files
Removing Encryption
Uninstalling VeraCrypt
Digital Signatures
previous page
start
next page
Menu
Homepage
Table of contents
Table Of Contents
Preface
Introduction
Beginner's Tutorial
VeraCrypt Volume
Creating a New VeraCrypt Volume
Favorite Volumes
System Favorite Volumes
System Encryption
Hidden Operating System
Operating Systems Supported for System Encryption
VeraCrypt Rescue Disk
Plausible Deniability
Hidden Volume
Protection of Hidden Volumes Against Damage
Security Requirements and Precautions Pertaining to Hidden Volumes
Hidden Operating System
Main Program Window
Program Menu
Mounting Volumes
Parallelization
Pipelining
Hardware acceleration
Hot keys
Keyfiles
Security Tokens & Smart Cards
Portable Mode
TrueCrypt Support
Converting TrueCrypt Volumes & Partitions
Default Mount Parameters
Language Packs
Encryption Algorithms
AES
Camellia
Kuznyechik
Serpent
Twofish
Cascades of ciphers
Hash Algorithms
RIPEMD-160
SHA-256
SHA-512
Whirlpool
Streebog
Supported Operating Systems
Command Line Usage
Security Model
Security Requirements And Precautions
Data Leaks
Paging File
Memory Dump Files
Hibernation File
Unencrypted Data in RAM
Physical Security
Malware
Multi-User Environment
Authenticity and Integrity
Choosing Passwords and Keyfiles
Changing Passwords and Keyfiles
Trim Operation
Wear-Leveling
Reallocated Sectors
Defragmenting
Journaling File Systems
Volume Clones
Additional Security Requirements and Precautions
How To Back Up Securely
Miscellaneous
Using VeraCrypt Without Administrator Privileges
Sharing Over Network
VeraCrypt Background Task
Volume Mounted as Removable Medium
VeraCrypt System Files & Application Data
How To Remove Encryption
Uninstalling VeraCrypt
Digital Signatures
Troubleshooting
Incompatibilities
Known Issues and Limitations
Frequently Asked Questions
Technical Details
Notation
Encryption Scheme
Modes of Operation
Header Key Derivation, Salt, and Iteration Count
Random Number Generator
Keyfiles
PIM
VeraCrypt Volume Format Specification
Compliance with Standards and Specifications
Source Code
Contact
Legal Information
Version History
Acknowledgements
References
Get in touch
Submit feedback about this site to:
[email protected]