Instrukcja obsługi VeraCrypt 1.19
Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla VeraCrypt 1.19 (169 stron) w kategorii Oprogramowanie do zdjęć i/lub wideo. Ta instrukcja była pomocna dla 7 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek
Strona 1/169
VERA
VERACRYPT
CRYPT
F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N
USER’S GUIDE
veracrypt.codeplex.com
Version Information
VeraCrypt User’s Guide, version 1.19
Released by IDRIX on October 17th, 2016
Legal Notices
THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY.
THE ENTIRE RISK AS TO THE QUALITY, CORRECTNESS, ACCURACY, OR COMPLETENESS OF THE CONTENT OF THIS
DOCUMENT IS WITH YOU. THE CONTENT OF THIS DOCUMENT MAY BE INACCURATE, INCORRECT, INVALID, INCOMPLETE
AND/OR MISLEADING. IN NO EVENT WILL ANY AUTHOR OF THE SOFTWARE OR DOCUMENTATION, OR ANY APPLICABLE
COPYRIGHT OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR (RE)DISTRIBUTE THIS SOFTWARE OR
DOCUMENTATION, BE LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO,
ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES,
A FAILURE OF THIS SOFTWARE TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING, BUT NOT
LIMITED TO, NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, MODIFICATION, OR (RE)DISTRIBUTION
OF THIS SOFTWARE OR DOCUMENTATION (OR A PORTION THEREOF), OR INABILITY TO USE THIS SOFTWARE OR
DOCUMENTATION, EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR
KNOWN TO ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY.
BY INSTALLING, RUNNING, USING, COPYING, (RE)DISTRIBUTING, AND/OR MODIFYING THIS SOFTWARE, INCLUDING, BUT
NOT LIMITED TO, ITS DOCUMENTATION, OR A PORTION THEREOF, YOU ACCEPT AND AGREE TO BE BOUND BY ALL TERMS
AND CONDITIONS OF THE VERACRYPT LICENSE THE FULL TEXT OF WHICH IS CONTAINED IN THE FILE License.txt
INCLUDED IN VERACRYPT BINARY AND SOURCE CODE DISTRIBUTION PACKAGES.
CONTENTS
Introduction..........................................................................................................................................5
Beginner’s Tutorial...............................................................................................................................6
How to Create and Use a VeraCrypt Container..........................................................................6
How to Create and Use a VeraCrypt-Encrypted Partition/Device............................................23
VeraCrypt Volume..............................................................................................................................24
Creating a New VeraCrypt Volume.............................................................................................................24
Favorite Volumes.........................................................................................................................................27
System Favorite Volumes............................................................................................................................29
System Encryption.............................................................................................................................31
Hidden Operating System........................................................................................................31
Operating Systems Supported for System Encryption.............................................................32
VeraCrypt Rescue Disk............................................................................................................32
Plausible Deniability...........................................................................................................................35
Hidden Volume............................................................................................................................................36
Protection of Hidden Volumes Against Damage......................................................................38
Security Requirements and Precautions Pertaining to Hidden Volumes..................................41
Hidden Operating System...........................................................................................................................45
Main Program Window.....................................................................................................................53
Program Menu............................................................................................................................................ 56
Volumes > Auto-Mount All Device-Hosted Volumes..............................................................56
Volumes > Dismount All Mounted Volumes............................................................................56
Volumes > Change Volume Password......................................................................................56
Volumes > Set Header Key Derivation Algorithm...................................................................56
Volumes > Add/Remove Keyfiles to/from Volume Volumes > Remove All Keyfiles from
Volume......................................................................................................................................57
Favorites > Add Mounted Volume to Favorites Favorites > Organize Favorite Volumes
Favorites > Mount Favorites Volumes.....................................................................................57
Favorites > Add Mounted Volume to System Favorites Favorites > Organize System Favorite
Volumes....................................................................................................................................57
System > Change Password.....................................................................................................57
System > Mount Without Pre-Boot Authentication.................................................................57
Tools > Clear Volume History..................................................................................................58
Tools > Traveler Disk Setup.....................................................................................................58
Tools > Keyfile Generator........................................................................................................58
Tools > Backup Volume Header Tools > Restore Volume Header...........................................58
Settings > Performance and Driver Options.............................................................................59
Settings > Preferences..............................................................................................................60
Mounting Volumes......................................................................................................................................62
Cache Password in Driver Memory.........................................................................................62
Mount Options..........................................................................................................................62
Parallelization.....................................................................................................................................63
Pipelining.............................................................................................................................................63
Hardware Acceleration......................................................................................................................64
2
Hot Keys..............................................................................................................................................65
Keyfiles................................................................................................................................................66
Keyfiles Dialog Window..........................................................................................................66
Security Tokens and Smart Cards.............................................................................................67
Keyfile Search Path..................................................................................................................68
Empty Password & Keyfile......................................................................................................68
Quick Selection........................................................................................................................68
Volumes > Add/Remove Keyfiles to/from Volume..................................................................69
Volumes > Remove All Keyfiles from Volume........................................................................69
Tools > Keyfile Generator........................................................................................................69
Settings > Default Keyfiles......................................................................................................69
Security Tokens & Smart Cards.......................................................................................................71
Portable Mode.....................................................................................................................................72
Tools > Traveler Disk Setup.....................................................................................................72
TrueCrypt Support.............................................................................................................................74
Converting TrueCrypt volumes and partitions...............................................................................74
Default Mount Parameters................................................................................................................75
Language Packs..................................................................................................................................76
Encryption Algorithms.......................................................................................................................77
AES.............................................................................................................................................................. 77
Serpent......................................................................................................................................................... 78
Twofish........................................................................................................................................................ 78
Camellia...................................................................................................................................................... 78
Kuznyechik.................................................................................................................................................. 78
Cascades of ciphers.....................................................................................................................................79
AES-Twofish............................................................................................................................79
AES-Twofish-Serpent...............................................................................................................79
Serpent-Twofish-AES...............................................................................................................79
Twofish-Serpent.......................................................................................................................79
Hash Algorithms.................................................................................................................................80
Supported Operating Systems...........................................................................................................81
Command Line Usage........................................................................................................................82
Security Model....................................................................................................................................87
Security Requirements and Precautions..........................................................................................90
Data Leaks................................................................................................................................90
Unencrypted Data in RAM.......................................................................................................93
Physical Security......................................................................................................................93
Malware....................................................................................................................................94
Multi-User Environment..........................................................................................................94
Authenticity and Integrity........................................................................................................95
Choosing Passwords and Keyfiles...........................................................................................95
Changing Passwords and Keyfiles...........................................................................................96
Trim Operation.........................................................................................................................96
Wear-Leveling..........................................................................................................................97
3
Specyfikacje produktu
Marka: | VeraCrypt |
Kategoria: | Oprogramowanie do zdjęć i/lub wideo |
Model: | 1.19 |
Potrzebujesz pomocy?
Jeśli potrzebujesz pomocy z VeraCrypt 1.19, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą
Instrukcje Oprogramowanie do zdjęć i/lub wideo VeraCrypt
19 Sierpnia 2024
Instrukcje Oprogramowanie do zdjęć i/lub wideo
- Oprogramowanie do zdjęć i/lub wideo Roland
- Oprogramowanie do zdjęć i/lub wideo Canon
- Oprogramowanie do zdjęć i/lub wideo Nikon
- Oprogramowanie do zdjęć i/lub wideo Google
- Oprogramowanie do zdjęć i/lub wideo Cyberlink
- Oprogramowanie do zdjęć i/lub wideo Apple
- Oprogramowanie do zdjęć i/lub wideo Panduit
- Oprogramowanie do zdjęć i/lub wideo Intellinet
- Oprogramowanie do zdjęć i/lub wideo Razer
- Oprogramowanie do zdjęć i/lub wideo Antares
- Oprogramowanie do zdjęć i/lub wideo LevelOne
- Oprogramowanie do zdjęć i/lub wideo Axis
- Oprogramowanie do zdjęć i/lub wideo Microsoft
- Oprogramowanie do zdjęć i/lub wideo Corel
- Oprogramowanie do zdjęć i/lub wideo Atomix
- Oprogramowanie do zdjęć i/lub wideo Smartwares
- Oprogramowanie do zdjęć i/lub wideo Terratec
- Oprogramowanie do zdjęć i/lub wideo Acronis
- Oprogramowanie do zdjęć i/lub wideo Sonos
- Oprogramowanie do zdjęć i/lub wideo Sweex
- Oprogramowanie do zdjęć i/lub wideo QSC
- Oprogramowanie do zdjęć i/lub wideo Pinnacle
- Oprogramowanie do zdjęć i/lub wideo Roxio
- Oprogramowanie do zdjęć i/lub wideo IoSafe
- Oprogramowanie do zdjęć i/lub wideo PayPal
- Oprogramowanie do zdjęć i/lub wideo AVG
- Oprogramowanie do zdjęć i/lub wideo Yuki
- Oprogramowanie do zdjęć i/lub wideo Auralog
- Oprogramowanie do zdjęć i/lub wideo ABN AMRO
- Oprogramowanie do zdjęć i/lub wideo FileMaker
- Oprogramowanie do zdjęć i/lub wideo Magix
- Oprogramowanie do zdjęć i/lub wideo Facebook
- Oprogramowanie do zdjęć i/lub wideo Ulead
- Oprogramowanie do zdjęć i/lub wideo Rabobank
- Oprogramowanie do zdjęć i/lub wideo Propellerhead
- Oprogramowanie do zdjęć i/lub wideo Albelli
- Oprogramowanie do zdjęć i/lub wideo R-Go Tools
- Oprogramowanie do zdjęć i/lub wideo Gimp
- Oprogramowanie do zdjęć i/lub wideo Wireshark
- Oprogramowanie do zdjęć i/lub wideo Laplink
- Oprogramowanie do zdjęć i/lub wideo Nik Software
- Oprogramowanie do zdjęć i/lub wideo Paragon
- Oprogramowanie do zdjęć i/lub wideo Western Bank
- Oprogramowanie do zdjęć i/lub wideo Showpad
- Oprogramowanie do zdjęć i/lub wideo Xils Lab
- Oprogramowanie do zdjęć i/lub wideo IRIS
- Oprogramowanie do zdjęć i/lub wideo Nuance
- Oprogramowanie do zdjęć i/lub wideo Cakewalk
- Oprogramowanie do zdjęć i/lub wideo Parallels
- Oprogramowanie do zdjęć i/lub wideo Lavasoft
- Oprogramowanie do zdjęć i/lub wideo Polyverse
- Oprogramowanie do zdjęć i/lub wideo AccSone
- Oprogramowanie do zdjęć i/lub wideo Mariner Software
- Oprogramowanie do zdjęć i/lub wideo Symantec
- Oprogramowanie do zdjęć i/lub wideo NewBlueFX
Najnowsze instrukcje dla Oprogramowanie do zdjęć i/lub wideo
15 Października 2024
13 Października 2024
8 Października 2024
4 Października 2024
4 Października 2024
4 Października 2024
2 Października 2024
2 Października 2024
2 Października 2024
2 Października 2024