Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
dcc:itsol:veracrypt [2025/04/01 11:44] – added disclaimer about when and how to use encryption + rewording giulio | dcc:itsol:veracrypt [2025/05/20 07:33] (current) – alba | ||
---|---|---|---|
Line 1: | Line 1: | ||
{{indexmenu_n> | {{indexmenu_n> | ||
- | ====== VeraCrypt Simplified User Manual for RUG employees ====== | + | ====== VeraCrypt Simplified User Manual for UG employees ====== |
This is a simplified version of the VeraCrypt user manual created by the DCC using a Windows 10 system. It is meant to guide you through the installation of VeraCrypt, | This is a simplified version of the VeraCrypt user manual created by the DCC using a Windows 10 system. It is meant to guide you through the installation of VeraCrypt, | ||
Line 17: | Line 17: | ||
---- | ---- | ||
- | **Important Note**: Encryption is designed to prevent unauthorized access to data or a location in your file system. Your password is the way to prove your are authorized to access the data. If you lose your password, then **nobody will be able to recover the data** for you. Please **pay close attention** to where and how you manage your password(s). If you are in doubt, consider using a password manager. | + | **Important Note**: Encryption is designed to prevent unauthorized access to data or a location in your file system. Your password is the way to prove you are authorized to access the data. If you lose your password, then **nobody will be able to recover the data** for you. Please **pay close attention** to where and how you manage your password(s). If you are in doubt, consider using a password manager. |
- | VeraCrypt is useful for encrypting multiple files or a folder in your file system. If all you need to protect with encryption is a single | + | VeraCrypt is useful for encrypting multiple files or a folder in your file system. If all you need to protect with encryption is a single |
---- | ---- | ||
Line 25: | Line 25: | ||
==== What can you expect from VeraCrypt? ==== | ==== What can you expect from VeraCrypt? ==== | ||
- | The way the DCC advises you to use VeraCrypt | + | The DCC advises you to use VeraCrypt |
The way VeraCrypt encrypts and decrypts data is explained in detail in its manual. The short version of it is that the encrypted volume appears to contain random data and is inaccessible until the user provides a password and the volume is mounted by VeraCrypt. The data contained in the volume is decrypted by VeraCrypt when and while you are working on it. The decrypted information is stored in your RAM and will be overwritten once you dismount VeraCrypt. Only the encrypted data is saved on disk. This prevents sensitive data from ever being written in a location where it might be left unprotected should anyone gain access to your machine. | The way VeraCrypt encrypts and decrypts data is explained in detail in its manual. The short version of it is that the encrypted volume appears to contain random data and is inaccessible until the user provides a password and the volume is mounted by VeraCrypt. The data contained in the volume is decrypted by VeraCrypt when and while you are working on it. The decrypted information is stored in your RAM and will be overwritten once you dismount VeraCrypt. Only the encrypted data is saved on disk. This prevents sensitive data from ever being written in a location where it might be left unprotected should anyone gain access to your machine. | ||
[[dcc: | [[dcc: |