<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.hpc.rug.nl/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.hpc.rug.nl/feed.php">
        <title>CIT Research Documentation - dcc:itsol:veracrypt</title>
        <description>University of Groningen</description>
        <link>https://wiki.hpc.rug.nl/</link>
        <image rdf:resource="https://wiki.hpc.rug.nl/_media/wiki/logo.png" />
       <dc:date>2026-05-14T20:58:12+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/installation?rev=1748960039&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/password?rev=1748959144&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/precautions?rev=1748960543&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/protection?rev=1748960621&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/use?rev=1722340017&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.hpc.rug.nl/_media/wiki/logo.png">
        <title>CIT Research Documentation</title>
        <link>https://wiki.hpc.rug.nl/</link>
        <url>https://wiki.hpc.rug.nl/_media/wiki/logo.png</url>
    </image>
    <item rdf:about="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/installation?rev=1748960039&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-06-03T14:13:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Installation</title>
        <link>https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/installation?rev=1748960039&amp;do=diff</link>
        <description>Installation

How to make sure the VeraCrypt installation file is legitimate

Go to the VeraCrypt website to download the Windows installer. Since you will be securing sensitive data, VeraCrypt points out that an attacker might have found a way to modify or replace the installer in order to gain access to your data. It is thus good practice to verify if the installer is legitimate or not. To do so, you want to verify the digital signature of the installer by following these steps:</description>
    </item>
    <item rdf:about="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/password?rev=1748959144&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-06-03T13:59:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>How to change your password</title>
        <link>https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/password?rev=1748959144&amp;do=diff</link>
        <description>How to change your password

There are cases where you need to change your password, either because you would like to change it as an additional security measure or because you suspect someone might have gained access to your current password. No matter which case applies to you, this short section is going to show you how to change your password to a VeraCrypt volume.</description>
    </item>
    <item rdf:about="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/precautions?rev=1748960543&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-06-03T14:22:23+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Security requirements and precautions</title>
        <link>https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/precautions?rev=1748960543&amp;do=diff</link>
        <description>Security requirements and precautions

IMPORTANT: Please take into account that you can use VeraCrypt yourself at any level of protection suggested in this guide. The risk of losing important data is mainly linked to losing your password or your keyfiles. As long as you follow the encryption guide provided here and are careful about the things we warn you about, you should not need assistance in setting this up.</description>
    </item>
    <item rdf:about="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/protection?rev=1748960621&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-06-03T14:23:41+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Volume Protection Level</title>
        <link>https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/protection?rev=1748960621&amp;do=diff</link>
        <description>Volume Protection Level

Based on the recommendation you received from the DCC or on what you would like to have for your encryption level, you can follow the instructions in the sections below to set up your VeraCrypt volume.

IMPORTANT: Please keep in mind when deciding on your Protection level that higher encryption does not always mean higher data safety. Depending on the encryption you choose, you might need to follow certain guidelines to secure your data. If you&#039;re uncertain, please conta…</description>
    </item>
    <item rdf:about="https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/use?rev=1722340017&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-07-30T11:46:57+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>How to use a VeraCrypt volume</title>
        <link>https://wiki.hpc.rug.nl/dcc/itsol/veracrypt/use?rev=1722340017&amp;do=diff</link>
        <description>How to use a VeraCrypt volume

	*  In order to use a VeraCrypt volume, you need to first mount it. Open VeraCrypt and choose the drive you would like the volume to be mounted on. Keep in mind that you can only assign the volume to an unused drive. A good choice for said drive are the letters M:, N:, O:, or P: (red box), as Windows will most likely not be using them. In any case, the list of drives VeraCrypt offers to mount your volume on consists of only unused drives, so you should not run into…</description>
    </item>
</rdf:RDF>
