CONTENTS
Introduction .......................................................................................................................................... 5
Beginner’s Tutorial ............................................................................................................................... 7
How to Create and Use a VeraCrypt Container ......................................................................... 7
How to Create and Use a VeraCrypt-Encrypted Partition/Device ........................................... 24
VeraCrypt Volume ................................................................................................................................ 25
Creating a New VeraCrypt Volume ............................................................................................................... 25
Favorite Volumes ........................................................................................................................................... 28
System Favorite Volumes .............................................................................................................................. 30
System Encryption ............................................................................................................................. 32
Hidden Operating System ........................................................................................................ 32
Operating Systems Supported for System Encryption ............................................................. 33
VeraCrypt Rescue Disk ............................................................................................................ 33
Plausible Deniability........................................................................................................................... 36
Hidden Volume .............................................................................................................................................. 37
Protection of Hidden Volumes Against Damage...................................................................... 39
Security Requirements and Precautions Pertaining to Hidden Volumes .................................. 42
Hidden Operating System .............................................................................................................................. 46
Main Program Window ..................................................................................................................... 53
Program Menu............................................................................................................................................... 56
Volumes -> Auto-Mount All Device-Hosted Volumes ............................................................ 56
Volumes -> Dismount All Mounted Volumes ......................................................................... 56
Volumes -> Change Volume Password .................................................................................... 56
Volumes -> Set Header Key Derivation Algorithm ................................................................. 56
Volumes -> Add/Remove Keyfiles to/from Volume Volumes -> Remove All Keyfiles from
Volume ..................................................................................................................................... 57
Favorites -> Add Mounted Volume to Favorites Favorites -> Organize Favorite Volumes
Favorites -> Mount Favorites Volumes .................................................................................... 57
Favorites -> Add Mounted Volume to System Favorites Favorites -> Organize System
Favorite Volumes ..................................................................................................................... 57
System -> Change Password .................................................................................................... 57
System -> Mount Without Pre-Boot Authentication ................................................................ 57
Tools -> Clear Volume History ................................................................................................ 58
Tools -> Traveler Disk Setup ................................................................................................... 58
Tools -> Keyfile Generator ...................................................................................................... 58
Tools -> Backup Volume Header Tools -> Restore Volume Header ...................................... 58
Settings -> Performance and Driver Options ........................................................................... 59
Settings -> Preferences ............................................................................................................. 60
Mounting VeraCrypt Volumes ...................................................................................................................... 62
Cache Password in Driver Memory ......................................................................................... 62
Mount Options.......................................................................................................................... 62
Parallelization ..................................................................................................................................... 63