Examples of using Veracrypt in English and their translations into Thai
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Note: Users are encouraged to consult the VeraCrypt Beginner's Tutorial after working through this guide.
Figure 5: Specify the location and filename of the VeraCrypt container you are about to create.
You can learn how to do this in How to protect the sensitive files on your computer and in the VeraCrypt Guide.
Double click the highlighted entry in the main window of VeraCrypt as shown above.
VeraCrypt- A FOSS file encryption tool that allows you to store sensitive information securely.
Click[Select File…] to choose a location for your VeraCrypt container file and specify a name for it.
When VeraCrypt is done, it will display a warning about protecting the files in your hidden volume when adding content to your standard volume.
Figure 5: The VeraCrypt main window displaying the newly mounted volume.
With the VeraCrypt main window open, and your new VeraCrypt volume mounted, follow the steps below.
Even in circumstances where you are concerned about self-incrimination, it may be safest to use VeraCrypt anyway, while attempting to disguise your encrypted volume as best you can.
As always, it is a good idea to encrypt your backup files using a tool such as VeraCrypt. More information about about data encryption can be found in How to protect the sensitive files on your computer.
Step 8. Click either button to finish installing VeraCrypt. Depending on your installation preferences, you may now have a VeraCrypt shortcut on your desktop.
If you decide to keep your VeraCrypt volume on a USB memory stick, you can also keep a copy of the VeraCrypt program with it. This will allow you to access your data on other people's computers. The usual rules still apply, however: if you don't trust the machine to be free of malware, you probably shouldn't be typing in your passwords or accessing your sensitive data.
There are two general approaches to the challenge of securing your data in this way. You can encrypt your files, making them unreadable to anyone but you, or you can hide them in the hope that an intruder will be unable to find your sensitive information. There are tools to help you with either approach, including a FOSS application called VeraCrypt, which can both encrypt and hide your files.
Returning to the analogy of a locked safe, there are a few things you should bear in mind when using VeraCrypt and tools like it. No matter how sturdy your safe is, it won't do you a whole lot of good if you leave the door open. When your VeraCrypt volume is'mounted'(whenever you can access the contents yourself), your data may be vulnerable, so you should keep it closed except when you are actually reading or modifying the files inside it.
Figure 12: Installation of VeraCrypt.
Figure 5: Location of extracted VeraCrypt file.
Figure 3: Choosing where to extract the VeraCrypt Setup file.
Step 7 Click[Finish] and consider reading the VeraCrypt tutorial.
Step 6. Double-click the VeraCrypt installer to open the installation screen.