Overclock.net › Forums › Software, Programming and Coding › Operating Systems › Windows › Help, I encrypted a drive where Truecrypt was installed now I can't mount my drive!
New Posts  All Forums:Forum Nav:

Help, I encrypted a drive where Truecrypt was installed now I can't mount my drive!

post #1 of 9
Thread Starter 
How stupid of a mistake! I installed windows on drive c:

All my other software including TrueCrypt is installed on drive D. I used Truecrypt to encrypt the entire system drive and then I created a volume and performed an in place encryption of my D; drive where Truecrypt was installed. I can boot into Windows after putting in the boot time password, but Truecrypt won't load because it's on the other hard drive that is encrypted. It seems this is a catch 22 situation! I have to have truecrypt to decrypt the hard drive but the hard drive has to be decrypted before Truecrypt can load.

Can I install Truecrypt on the C; drive and mount the volume to the other drive?

What do I do, I don't want to lose any data on my other drive.
post #2 of 9
Install truecrypt to C:, go form there.
    
CPUMotherboardGraphicsRAM
Xeon w3680 Gigabyte X58A-UD3R GTX 295 Engineering Samples 2X Corsair XMS3 
Hard DriveHard DriveCoolingOS
Sandisk SSD Seagate Corsair H50 W7 Ult 
MonitorMonitorKeyboardCase
Viewsonic VA1912wb Viewsonic VA912b K350 CM HAF 
Mouse
Logitech M570 
  hide details  
Reply
    
CPUMotherboardGraphicsRAM
Xeon w3680 Gigabyte X58A-UD3R GTX 295 Engineering Samples 2X Corsair XMS3 
Hard DriveHard DriveCoolingOS
Sandisk SSD Seagate Corsair H50 W7 Ult 
MonitorMonitorKeyboardCase
Viewsonic VA1912wb Viewsonic VA912b K350 CM HAF 
Mouse
Logitech M570 
  hide details  
Reply
post #3 of 9
Don't mess with encryption? Might I ask why it is you need truecrypt? Unless it's business I wouldn't see any reason for the hastle. If it was business I would suggest a hardware based encryption protocol, it's somewhat safer.
Current Rig
(14 items)
 
  
CPUMotherboardGraphicsRAM
FX-8350 4.6GHz@1.44v GA-990FXA-UD3 R4.0 HD 7950 (1100/1450) 8G Muskin DDR3 1866@8CLS 
Hard DriveOptical DriveOSMonitor
1TB WD LiteOn DVD-RW DL Linux/Windows 19" Phillips TV 1080p 
PowerCaseMouseMouse Pad
OCZ 600W Generic Junk Logitech MX400 Generic Junk 
Audio
SBL 5.1 
  hide details  
Reply
Current Rig
(14 items)
 
  
CPUMotherboardGraphicsRAM
FX-8350 4.6GHz@1.44v GA-990FXA-UD3 R4.0 HD 7950 (1100/1450) 8G Muskin DDR3 1866@8CLS 
Hard DriveOptical DriveOSMonitor
1TB WD LiteOn DVD-RW DL Linux/Windows 19" Phillips TV 1080p 
PowerCaseMouseMouse Pad
OCZ 600W Generic Junk Logitech MX400 Generic Junk 
Audio
SBL 5.1 
  hide details  
Reply
post #4 of 9
Quote:
Originally Posted by mushroomboy;13461851 
Don't mess with encryption? Might I ask why it is you need truecrypt? Unless it's business I wouldn't see any reason for the hastle. If it was business I would suggest a hardware based encryption protocol, it's somewhat safer.

A business will just set up BitLocker for all their laptops. But it's a royal pain to set up for your average person. And why shouldn't your average person have encryption? I've been encrypting my drives for years. Oh wait...
Underground
(14 items)
 
  
CPUMotherboardGraphicsRAM
Core i7 920 C0 ASUS P6T6 WS Revolution GTX 460 TR3X6G1600C8D 
Hard DriveOptical DriveCoolingOS
WD1001FALS SAMSUNG SH-S223F 22X DVD MULTI Corsair H50 Fedora 16 KDE x86_64 
MonitorKeyboardPowerCase
HP w19b Microsoft Comfort Curve Corsair CX600 Thermaltake Armor VA8003BWS 
MouseMouse Pad
Razer DeathAdder Black 
  hide details  
Reply
Underground
(14 items)
 
  
CPUMotherboardGraphicsRAM
Core i7 920 C0 ASUS P6T6 WS Revolution GTX 460 TR3X6G1600C8D 
Hard DriveOptical DriveCoolingOS
WD1001FALS SAMSUNG SH-S223F 22X DVD MULTI Corsair H50 Fedora 16 KDE x86_64 
MonitorKeyboardPowerCase
HP w19b Microsoft Comfort Curve Corsair CX600 Thermaltake Armor VA8003BWS 
MouseMouse Pad
Razer DeathAdder Black 
  hide details  
Reply
post #5 of 9
Thread Starter 
Ok I figured it out. After reading the manual where it says "Truecrypt volumes are independent of the operating system". Meaning Truecrypt volumes can be mounted on any OS.

So I installed it on C: but I am having other problems now. The problem now is that I have trouble getting my firewall to load properly even though it is installed on drive D which I have included as a system favorite, set to mount at bootup automatically. I am running as administrator, UAC disabled, Truecrypt set to run as administrator as well, all passwords cached ect. Drive D: is mounted early in the bootup process as possible, but the firewall will not initialize. Maybe it doesn't like encrypted hard drives...I will have to post on other help forums as well.

And as I am reading the manual, it is getting easier to understand the program. I use Truecrypt as an added layer of defense against hackers or thieves. I don't want anyone getting their hands on my personal information. Don't I have the right to protect my personal information?
post #6 of 9
Quote:
Originally Posted by error10;13462096 
A business will just set up BitLocker for all their laptops. But it's a royal pain to set up for your average person. And why shouldn't your average person have encryption? I've been encrypting my drives for years. Oh wait...

I wasn't talking about what a business will do, I was saying if I was encrypting data on my own PC/laptop that was ment for business I would use hardware based encryption. Otherwise it's just something extra your waiting for when it comes to daily tasks. If somebody gets physical access it won't matter if you got truecrypt on it or not, as it's hackable.

http://forums.hak5.org/index.php?showtopic=13859

I'm sure there are many methods, it just slows/deters people from viewing your stuff. That's all I'm saying.
Current Rig
(14 items)
 
  
CPUMotherboardGraphicsRAM
FX-8350 4.6GHz@1.44v GA-990FXA-UD3 R4.0 HD 7950 (1100/1450) 8G Muskin DDR3 1866@8CLS 
Hard DriveOptical DriveOSMonitor
1TB WD LiteOn DVD-RW DL Linux/Windows 19" Phillips TV 1080p 
PowerCaseMouseMouse Pad
OCZ 600W Generic Junk Logitech MX400 Generic Junk 
Audio
SBL 5.1 
  hide details  
Reply
Current Rig
(14 items)
 
  
CPUMotherboardGraphicsRAM
FX-8350 4.6GHz@1.44v GA-990FXA-UD3 R4.0 HD 7950 (1100/1450) 8G Muskin DDR3 1866@8CLS 
Hard DriveOptical DriveOSMonitor
1TB WD LiteOn DVD-RW DL Linux/Windows 19" Phillips TV 1080p 
PowerCaseMouseMouse Pad
OCZ 600W Generic Junk Logitech MX400 Generic Junk 
Audio
SBL 5.1 
  hide details  
Reply
post #7 of 9
Quote:
Originally Posted by mushroomboy;13465275 
I wasn't talking about what a business will do, I was saying if I was encrypting data on my own PC/laptop that was ment for business I would use hardware based encryption. Otherwise it's just something extra your waiting for when it comes to daily tasks. If somebody gets physical access it won't matter if you got truecrypt on it or not, as it's hackable.

http://forums.hak5.org/index.php?showtopic=13859

I'm sure there are many methods, it just slows/deters people from viewing your stuff. That's all I'm saying.

Sure, if you get a keylogger on your system then you're screwed.

And, just because you don't find something useful, doesn't mean it's not useful for everyone else.
Underground
(14 items)
 
  
CPUMotherboardGraphicsRAM
Core i7 920 C0 ASUS P6T6 WS Revolution GTX 460 TR3X6G1600C8D 
Hard DriveOptical DriveCoolingOS
WD1001FALS SAMSUNG SH-S223F 22X DVD MULTI Corsair H50 Fedora 16 KDE x86_64 
MonitorKeyboardPowerCase
HP w19b Microsoft Comfort Curve Corsair CX600 Thermaltake Armor VA8003BWS 
MouseMouse Pad
Razer DeathAdder Black 
  hide details  
Reply
Underground
(14 items)
 
  
CPUMotherboardGraphicsRAM
Core i7 920 C0 ASUS P6T6 WS Revolution GTX 460 TR3X6G1600C8D 
Hard DriveOptical DriveCoolingOS
WD1001FALS SAMSUNG SH-S223F 22X DVD MULTI Corsair H50 Fedora 16 KDE x86_64 
MonitorKeyboardPowerCase
HP w19b Microsoft Comfort Curve Corsair CX600 Thermaltake Armor VA8003BWS 
MouseMouse Pad
Razer DeathAdder Black 
  hide details  
Reply
post #8 of 9
Thread Starter 
In in order for the bootkit to work, the hacker has to get sequential access to the computer and you should know enough not to leave it on. what are the chances some having access to your computer? No one can install the bootkit and instantly have your passwords, that's not the way it works. And all this talk about keyloggers is silly. What are the chances that the person who is going to have access to your computer is going to be able to get you to install the keylogger in the first place or be able to install it if himself if the computer is off?
Edited by aweir - 5/11/11 at 11:26am
post #9 of 9
Quote:
Originally Posted by error10;13466337 
Sure, if you get a keylogger on your system then you're screwed.

And, just because you don't find something useful, doesn't mean it's not useful for everyone else.

It's not that, it's just the nature of software encryption. With hardware encryption you have to find how how they implemented it. Even then they might have modified the original design, that's if they even bought a patent to a design. If they made their own design you have to get the data sheets and figure out where things are going. It's probably a lot easier to bypass hardware encryption but a lot harder to get the specifications for each manufacturer.

[edit] That's opposed to BitLocker/TrueEncrypt, the only two major players in software encryption. There are more, but then the smaller the company which turns into less funds and the possibility of design flaws. Not that they would be poor coders but rather it's easier for a group of coders to work on this, so work gets double checked. You also can afford a larger team to "break" the software, which is easier with the bigger players.

[edit2]
Quote:
Originally Posted by aweir;13467297 
In in order for the bootkit to work, the hacker has to get sequential access to the computer and you should know enough not to leave it on. what are the chances some having access to your computer? No one can install the bootkit and instantly have your passwords, that's not the way it works. And all this talk about keyloggers is silly. What are the chances that the person who is going to have access to your computer is going to be able to get you to install the keylogger in the first place or be able to install it if himself if the computer is off?

I understand what your saying, though essentially don't they have to have access to your computer to get this data anyways? If they are going through the net it would be more likely that they would use something a little more fishy that you won't notice. A keylogger in that instance would be the best bet once they realized you had an encrypted drive elsewhere. Really once a good hacker ever got in he's not going to be noticed nor is he going to care. So it goes back to having physical access, which still leaves a keylogger very possible.

The other problem is, do you unmount your drive and shut off your computer? If you don't do a full power down sniffing dram isn't a problem, your password becomes useless.

If you have a lot of personal info on the drive and take it places as an external then I could see it as a feasible solution (though you have to haul your personal pc around). Just having your data drive encrypted at home isn't really that useful or practical. A simple password scheme will usually deter the general population. Either way software encryption has a larger soft spot than hardware. That's all.
Edited by mushroomboy - 5/11/11 at 4:29pm
Current Rig
(14 items)
 
  
CPUMotherboardGraphicsRAM
FX-8350 4.6GHz@1.44v GA-990FXA-UD3 R4.0 HD 7950 (1100/1450) 8G Muskin DDR3 1866@8CLS 
Hard DriveOptical DriveOSMonitor
1TB WD LiteOn DVD-RW DL Linux/Windows 19" Phillips TV 1080p 
PowerCaseMouseMouse Pad
OCZ 600W Generic Junk Logitech MX400 Generic Junk 
Audio
SBL 5.1 
  hide details  
Reply
Current Rig
(14 items)
 
  
CPUMotherboardGraphicsRAM
FX-8350 4.6GHz@1.44v GA-990FXA-UD3 R4.0 HD 7950 (1100/1450) 8G Muskin DDR3 1866@8CLS 
Hard DriveOptical DriveOSMonitor
1TB WD LiteOn DVD-RW DL Linux/Windows 19" Phillips TV 1080p 
PowerCaseMouseMouse Pad
OCZ 600W Generic Junk Logitech MX400 Generic Junk 
Audio
SBL 5.1 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Windows
Overclock.net › Forums › Software, Programming and Coding › Operating Systems › Windows › Help, I encrypted a drive where Truecrypt was installed now I can't mount my drive!