We’re going to encrypt the hard drive so that no one can access it without our permission. After a few drinks, we’ll be ready to go.
How To Encrypt Your Windows Hard-Drive To Keep Out Snoopers
- Make sure your computer is up-to-date with the latest security patches.
- Install VeraCrypt if you haven’t already.
- Create a VeraCrypt volume (or files) to store your data in.
- Encrypt the volume (or files) using VeraCrypt’s encryption algorithm and key.
- Save the encrypted volume (or files) to a location on your computer where you will be able to access them later. ..
Next, enter in a name for your new volume and click on “Create”. Now, you will need to provide some information about your computer and the encryption algorithm you are using. Click on the “Details” tab and enter in your computer’s information. You can also choose to use a specific algorithm or generate a random number. Next, click on the “Create Volume” button and wait for VeraCrypt to create the volume.
If you want to keep your data safe, you should encrypt your system partition or entire system drive. ..
The next step is to identify the source of the leak.
In this case, we are going for a standard encryption, not a “hidden operating system”. So choose the first option and click “Next” to move on.
I believe that you only need to encrypt the hard drive with Windows operating system on it.
Option One: Encrypt the Windows system partition Option Two: Do not encrypt the Windows system partition
If you only have Windows on your computer, then you have a single-boot system. If you have multiple operating systems (say Windows and Linux for example) on your computer, then it’s a multi-boot system. So choose which one you have.
The next question is which encryption protocol you would like to use. The AES standard is used by governments to encrypt secret documents. It is also recommended that you leave the hash algorithm as it is, which is SHA-1. ..
To generate your encryption keys, you will need to move your mouse or trackpad around the VeraCrypt window in a “random order”. This will help to make your keys as strong as possible. ..
Next, you’ll need to complete a task to progress the game. Complete tasks to move the bar up and down, left and right. When the bar is at the far right-hand end of the screen, click “Next.”
If you encrypt a hard drive, make sure to create a VeraCrypt Rescue Disk in case you lose access to the encrypted data. This disk will help you fix any damage to the VeraCrypt boot loader or Windows, so that you can hopefully log in and access your data. ..
The encryption password for the rescue disk is not a security risk.
When you create a VeraCrypt rescue disk, it will be placed in an area of your computer that you choose. You can easily move it to another location if you want, by clicking the “Browse” button. Do NOT deselect “Skip Rescue Disk verification” – that is essential. ..
This next step opens up the Windows Disc Image Burner. You will see that the rescue disk is an ISO file and you need to choose the disc burner on your hard-drive. A normal 700MB CD disc is sufficient. Select “Verify disc after burning.”
Once the disc is in your burner drive, click “Burn” to start the process.
When the disc burner has finished its job, it will open its tray and let the disc run. Close the tray again, and then let the disc run through the burning process. If everything goes according to plan, then Disc Image Burner will verify that the disc was burned correctly and will show you a message telling you that it was.
I hope you will eventually see this. ..
VeraCrypt is now going to do some pre-testing on your hard drive or partition before it starts encrypting it.
If all goes well, your computer will restart and the boot loader will be installed. After that, Windows 10 will begin encrypting your data. Click “Test” to begin. ..
Windows will now start loading and you will see the following screen. ..
If you didn’t specify a PIM in the password settings, leave it blank when it asks for one and hit enter. ..
Your computer is trying to connect to the internet for the first time. If it’s the first time you’re doing this, it might take a little longer than usual to connect.
Once your password has been successfully verified, your system will begin encrypting. Depending on the size of your system, this process could take some time. In the meantime, you might want to leave your computer on overnight in order for it to finish. ..
After the installation is complete, your computer will be more secure. You’ll be able to laugh at your nosy roommates as they unsuccessfully try to break into your computer to read your love letters to your unrequited love. ..