July 15, 2019
  • 2:01 pm 7 Ways to Learn Linux In a Structured Manner
  • 2:00 pm How to Mount DVDs and CD-Roms Using Ubuntu
  • 1:59 pm 5 Ways to Open a Terminal Console Window Using Ubuntu
  • 1:58 pm Operating Systems: Unix vs. Windows
  • 1:57 pm Popular Flight Simulators for Linux
Pearson Education (InformIT)

The problem of information security can no longer be prevented. If you have sensitive info on your computer system, it should be encrypted. Why? Without encryption, that details is broad open, for all to see. Must anyone gain access to your desktop, they can view and extract that data. Instead of leaving that info large open, why not hide it behind a layer of file encryption? You might be believing, “If I’m using Linux, that must be a challenge.” It’s not. In truth, there are lots of tools that make this procedure rather simple.

One such tool is the open source (and free) VeraCrypt. VeraCrypt offers functions like easy virtual disk creation and encrypting entire storage devices. (such as USB flash drive or hard disk drive).

It even support automatic, real-time transparent file encryption. That means, with this feature allowed, your data remain secured without you need to keep in mind.

Our presentation platform will be Ubuntu Desktop 18.04, nevertheless the installation must work the same on all Linux platforms. Here are the actions for successful setup:

Download the necessary file from the VeraCrypt Downloads Page into your Downloads folder. For this setup, download the file significant Linux: veracrypt-1.23- setup.tar.bz2.

Open the file manager and double-click the Downloads folder.

Screenshot of extracting a compressed file in Linux.
Right-click the downloaded file and choose Extract Here.

Double-click on the recently produced veracrypt-XXX-setup folder (Where XXX is the release number).

Screenshot of opening a terminal from a Linux file manager.
In the brand-new folder, right-click on a blank space and choose Open in Terminal.

Screenshot of the VeraCrypt set up command.
As soon as the terminal opens, enter the command./ veracrypt-XXX-setup-gui-x64 (Where XXX is the release number).

Screenshot of the Install VeraCrypt prompt.
When triggered, click Install VeraCrypt.

Screenshot of the VeraCrypt license arrangement.
When triggered, click I accept and consent to be bound by the license terms.

Screenshot of a terminal triggering for a sudo password.
A terminal window will popup, requiring you to enter your user’s sudo password. Type your password and hit Get in.

Screenshot of the final setup screen.
When the setup completes, struck Enter on your keyboard to exit the installer.

The setup is total.

There are two types of encrypted volumes that can be created:

Encrypted file container: An encrypted file that, when installed, serves as a folder, but when unmounted is an encrypted file with information that can not be accessed without the encryption password.
Encrypted volume within a partition or drive: Formats an encrypted partition that can just be accessed with the file encryption password.

Creating an encrypted volume with VeraCrypt is easy. Here are the actions for producing a basic encrypted file container.

Screenshot of the primary VeraCrypt window.
Open VeraCrypt from your desktop start menu. From the application window, click Produce Volume.

Screenshot of picking a volume type.
Select Create an encrypted file container and click Next.

Screenshot of the volume type choice window.
Select Requirement VeraCrypt volume and click Next.

Screenshot of the Volume Place window.
Click the Select File button.

Screenshot of the volume naming window.
Provide the new container file a name and click Save.

Click Next.

Screenshot of the algorithm selection window.
Select the File Encryption Algorithm and the Hash Algorithm (or utilize the default, which is safe) and click Next.

Screenshot of the Volume Size window.
Get in a volume size (to be utilized for the encrypted volume) and click Next.

You can choose Kilobytes (KB), Megabytes (MB), or Gigabytes (GB) from the drop-down.
Screenshot of the password development window.
Type and validate a password for the encryption volume and click Next.

It is very important to use an unique and strong password for the file encryption, otherwise you run the risk of somebody being able to think the password and gain access to your information.
Screenshot of the filesystem type selection window.
Select the Filesystem type and click Next.

You can choose from Ext2/3/4, NTFS, FAT, or exFAT filesystem types.
Screenshot of the cross-platform support window.
Select I will install the volume on other platforms, if you need to be able to gain access to this encrypted volume from other operating systems (otherwise, select I will install the volume just on Linux) and click Next.

Screenshot of the randomness collection window.
In the next window, move your cursor around (within the VeraCrypt window) up until enough randomness has actually been gathered. As soon as that finishes, click the Format button.

When triggered, type your sudo password and click OK.

Click Exit.

Now that the encrypted volume has been developed, how do you use it? Simple.

From the VeraCrypt main window, click Select File.

Screenshot of finding the VeraCrypt file.
Found the encrypted volume file you just produced and click Open.

Select a slot to install the encrypted volume from the upper pane (in the VeraCrypt main window).

Click Mount.

Screenshot of getting in the file encryption password.
When triggered, type the file encryption password for the volume and click OK.

Screenshot of the installed VeraCrypt volume.
Open the file manager, click Other Areas, and then double-click on the recently mounted drive.

On some desktops (such as GNOME), you can just click the newly-created desktop icon to access the volume.
Include, modify, delete files from the mounted volume.

It is really essential, that when you’re made with the mounted volume, you unmount (otherwise, anybody can access the contents). To unmount the volume, select it from the slot (in the VeraCrypt primary window) and click the Dismount button. At that point, your information is back to being encrypted and safe from spying eyes.