How to Use VeraCrypt’s Advanced Features to Secure Important Files
Optional alternative title: How to Use VeraCrypt’s Advanced Features to Protect Sensitive Data
Many security experts recommend using VeraCrypt to secure sensitive files. It’s not hard to see why: VeraCrypt provides users with “military-grade” file encryption abilities. It’s free, open-source, and available on all major desktop operating systems. Anyone can use VeraCrypt’s basic functions for files that need safekeeping. But if you’re looking to take file security to another level, then VeraCrypt can keep you covered with its many advanced features.

How to Encrypt External Drives or Partitions
Users typicallycreate encrypted file containers with VeraCrypt. But the program also has the ability to encrypt entire drives and partitions. Windows users canencrypt their system drivesand partitions.
VeraCrypt users across all platforms can encrypt flash drives and other kinds of external drives too. In fact, it’s one of thebest programs for encrypting USB drives. To begin this process, open the VeraCrypt Volume Creation Wizard. SelectEncrypt a non-system partition/driveand clickNext.

When choosing a location for your encrypted drive, VeraCrypt will prompt you to choose a device drive or partition. ClickSelect Device.
You have the option to select an entire non-system drive or a partition within the drive for encryption. You can opt to create multiplepartitions in any external drive. Then, you can encrypt one partition while leaving the rest of the drive unencrypted. ClickOKonce you’ve selected a drive or partition to encrypt.

Be aware that any drive or partition you choose will have its data formatted, and its files destroyed.
Like any other files or drives, VeraCrypt is also vulnerable to unwanted data deletion or corruption. This is why you should alwayskeep backups of your files.

Only clickYeson the warning pop up if you’re sure about encrypting your selected drive/encryption.
If you plan on encrypting a non-system drive with multiple partitions, make sure you format it to remove the partitions first. ClickNexton the wizard.

As usual, VeraCrypt will prompt you to select the drive’s encryption options, password, and file format. ClickFormat, then clickYesonce you’re ready to create your encrypted external drive.
Once you’ve finished formatting your encrypted device, it will no longer be accessible outside VeraCrypt. To mount your encrypted device, select it withSelect Device,clickMount, and enter your password.
You can use the encrypted device like any other VeraCrypt volume and dismount it as usual. To decrypt your device, format the drive/partition with your desktop’s built-in disk management software.
How to Use More Safeguards for VeraCrypt Volumes
VeraCrypt’s default volume setupspaired with a strong passwordprovide plenty of security for most users. But they may not be enough if you or your group or business is more vulnerable tocertain threat actors. To make sure that your precious data is safe, VeraCrypt has even more features to render encrypted volumes impractical to crack.
Familiarize yourself withcommon encryption termsas we go through VeraCrypt’s extra features.
Using Encryption and Hash Algorithms
On the Volume Creation Wizard, you can choose between numerous options for encrypting and hashing your volume. The default AES algorithm is acommon but secure type of encryption. But you’re free to use other ciphers like Twofish and Serpent. You can even stack multiple algorithms on top of each other.
You can further choose the algorithm or method ofhashing your password. The hash algorithm determines the way your password is converted into a hash that VeraCrypt can use to decrypt your volume. Using a strong hash method like SHA-512 or Whirlpool, together with a high PIM number, will slow down anybrute-force attackon your volumes.
you may test the speed of the hash and encryption ciphers on your machine by clickingBenchmark. Faster encryption and hash times mean faster load times for your volume, but slower hash times mean better protection from brute-force attacks.
Using PIM Numbers
To set a Personal Iterations Multiplier (PIM) Number on your volume, tick theUse PIMcheckbox on the Volume Password window. ClickingNextwill bring you to the window where you could set your volume’s PIM.
Your volume’s PIM determines how many times VeraCrypt will need to hash your password from plain text. A default (SHA-512) VeraCrypt volume’s password will be hashed 500,000 times. it’s possible to set an even higher volume PIM for better security.
check that you remember your volumes' PIM numbers if they aren’t set to the default. Entering the wrong PIM number will lead to the wrong hash. VeraCrypt can’t decrypt your volume with the wrong hash, even if your password is correct.
Using Keyfiles
You can get even better security by using files that act as keys to your encrypted volumes. To add a keyfile for your volume, tick theUse keyfilescheckbox on the Volume Password window, then clickKeyfiles.
On the Select Security Token Keyfiles screen, you can set any file or folder path to serve as a volume keyfile. You could useAdd Token Filesto set ahardware security keyas your keyfile. If you keep your keyfile in a USB outside your volume’s drive, your USB can also act as a physical security key. If you need VeraCrypt to make a new keyfile, clickGenerate Random Keyfile.
When mounting a volume with a custom Volume PIM and keyfiles, you need to tick theUse PIMandUse keyfilescheckboxes and click theKeyfilesbutton. This will allow you to input the correct PIM and keyfiles, along with your password, to open your encrypted volume.
Making Changes to Existing VeraCrypt Volumes
Once you create an encrypted volume, you’re able to still make changes to how you decrypt it. To do this, click onVolume Toolson the VeraCrypt main window. You’ll have the option to change or remove your volume’s password, PIM, and keyfiles. You can do this if you need to change your passwords regularly.
How to Create Hidden VeraCrypt Volumes
One of VeraCrypt’s most useful advanced features is its ability to create hidden encrypted volumes. These are real encrypted volumes hidden inside an outer VeraCrypt volume.
Hidden volumes can come in handy if you’re forced to give your password up to acyber extortion attacker, for example. You can instead give up the password to the outer VeraCrypt volume, which will not expose your hidden volume to any threats.
To start creating a hidden volume, clickHidden VeraCrypt volumeon the Volume Type window of the Creation Wizard. ClickNext.
First, VeraCrypt will prompt you to select a device/file location for your hidden volume. ClickNextonce you’re done.
From here, you’ll need to create an encrypted outer volume. If you’re creating a hidden encrypted drive/partition, VeraCrypt will set the entire device as the outer volume. But if you’re creating a hidden encrypted file container, you will need to set the size of the outer volume.
You’ll also need to set the outer volume’s encryption options, password, and file format.
Once VeraCrypt formats the outer volume, you’ll be prompted to copy “sensitive-looking” files to the outer volume. These files show up instead of the hidden volume’s contents if you’re forced to give up your outer volume password. Do this by clickingOpen Outer Volume.
Here’s an example of an open outer volume. Note that the hidden volume and its contents will appear as free space on an open outer volume.
Once you’ve created a convincing outer volume, it’s time to create your hidden encrypted volume. You can give your hidden volume encryption options that are different from your outer volume.
You’ll also need to set your hidden volume’s size. It should be much smaller than the outer volume to prevent any future hidden volume damage.
Your real volume’s password should also be very different from the outer volume password. you could also opt to give your hidden volume a separate volume PIM and keyfiles, and file format.
Once you’ve finished creating your hidden volume, you could mount it like any other VeraCrypt volume.
Mounting the volume using the outer volume password will not open your hidden volume. It will instead lead to the outer volume, with VeraCrypt marking the volume as “Normal”.
You’ll need to remember the passwords, PIM numbers, and keyfiles of your outer and hidden volumes. This is why maintaining a hidden volume can be more difficult than using a regular VeraCrypt volume.
If you mount the volume using your hidden volume password, VeraCrypt will detect and open the hidden volume.
Do You Need to Use VeraCrypt’s Advanced Features?
Creating an encrypted file container with AES, SHA-512, and a strong password should be more than enough to secure most users' files. But if you need extra layers of file protection, you’ll be better safe than sorry with VeraCrypt. With keyfiles, a high PIM number, and strong ciphers like Twofish, you can create a VeraCrypt volume that the best hackers can only dream to crack.
Pretty Good Privacy is one method for encrypting messages between two people. Here’s how PGP works and how anyone can use it.
Who asked for these upgrades?
OneDrive is one of the best, but it has a catch.
Revolutionize your driving experience with these game-changing CarPlay additions.
Now, I actually finish the books I start.
Don’t let aging hardware force you into buying expensive upgrades.