How to Use TrueCrypt (Advanced)

Refering to the previous post, this is a more advanced step by step to use TrueCrypt.

Creating a Hidden Volume within a TrueCrypt Volume
We have seen how to get a TrueCrypt volume created in the previous section. In this section, we will create a TrueCrypt volume that has a hidden volume in it. As this is a more advanced level, certain basic steps will be skipped. If you are having any difficulties following, you can report to the author at

1. Start your TrueCrypt and click on the Create Volume button from the main screen.

2. Select ‘create an encrypted file container’ on the next screen as shown in Figure 1.

3.This time around, select the Hidden TrueCrypt Volume.
Figure 1: Hidden TrueCrypt Volume

4. Use the Normal Mode to slowly guide us through the process.
Figure 12: Normal Mode

5. Specify your desired filename and its location and click next to continue.

6. You will be notified that you are going to create the outer layer first. Nothing much to do so just clicks next for the time being.

7. You are required to specify your encryption and hash algorithm. The author again will use the default selection.

8. At this screen, you need to specify your volume size. The author will use 50MB for this example.

9. On the password screen, the author will use ‘outerlayer1234567890’ as password.
Figure 13: Outer Layer Password

10. Click on the format button to complete the creation of the drive.

11. Now comes the core part which is to create the hidden volume. Nothing much for this two screens, so just click next for two times.

12. You will be required to specify your encryption and hash algorithms again. The author will stick to the default again.

13. Now in this part, you need to specify the size. Remember that this is a hidden volume within your actual volume. Thus, you cannot specify the size which is larger than the outer layer. The author will just use 20MB for this example.
Figure 14: Hidden Volume Size

14. Now you need to specify the hidden volume’s password. The author will use ‘hiddenlayer0987654321’ for the hidden volume.
Figure 15: Hidden Volume Password

15. Last of all, click on the format button to complete this phase.

Mounting a Hidden TrueCrypt Volume
Alright, we all know how to mount a TrueCrypt drive by now. But then, how we mount a hidden volume? In fact it is the same thing. The only difference is the password that you specify.

1. Let’s mount the outer layer of your TrueCrypt volume by specifying the password ‘outerlayer1234567890’.

2. Once you got the drive mounted, create a text document called ‘mypassword.txt’.

3. Unmount that drive and mount again by specifying the hidden volume password which is ‘hiddenlayer0987654321’.

4. You should have the drive mounted and it should be as well empty. Create a text document called ‘myactualpassword.txt’.

5. Now unmount that drive.

By now, you have your actual password stored in the hidden layer and leave a dummy fake password in your outer layer. If someone forcing you to mount the TrueCrypt drives, you can use the outer layer password to encrypt the volume and gave him the fake information. You have your privacy properly protected at this time.
TrueCrypt is good data protection software to be used. You don’t have to pay big amount of money to protect your data if cost is the main concern. TrueCrypt is good enough for a normal end user. This software is open source and you can get it downloaded at here.

You can also obtain the PDF version of this guide at here.
P/S: Sorry for using sendspace to upload this PDF. I will find a better solution to this issue.

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Man In The Browser
  2. TrueCrypt: Protecting Data The Free Way
  3. How to Use TrueCrypt (Beginner)
About Alan Tay

This blog is owned and operated by myMediaInc. My Media operates content based online portals for IT professionals, technology managers and decision makers as well as business leaders. We publish original quality content focused in Software Development, IT Security, SaaS, Cloud Computing, Outsourcing, Project Management and Mobile and Wireless. Our mission is to explore how to help you optimize your resources in each of these areas.

Find us here IT Security Column.

Speak Your Mind


CommentLuv badge

This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)