DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts

DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts (http://www.dreamteamdownloads1.com/index.php)
-   How To - (Tips and Tricks) & NEWS (http://www.dreamteamdownloads1.com/forumdisplay.php?f=98)
-   -   Hide Passwords in Encrypted Drive (FBI Can’t Get Into) (http://www.dreamteamdownloads1.com/showthread.php?t=209052)

Ladybbird 19-05-12 00:54

Hide Passwords in Encrypted Drive (FBI Can’t Get Into)
 
How To Hide Passwords in an Encrypted Drive Even the FBI Can’t Get Into

http://www.howtogeek.com/wp-content/...5538e680_o.jpg

Encryption tools exist to protect your privacy… and also to make you feel like you’re an awesome spy. Today we’ll use a portable USB drive to hold all of your passwords encrypted in a virtual disk hidden inside a file.

Certain kinds of cryptography were once called “weapons of mass destruction” because certain people thought it was so dangerous. Although clever people are making it good security more and more difficult, encryption tools like the one we’ll be using today are readily available, free, and provide a high level of security that is nearly impossible to break into if done properly. Put on your spy mask and keep reading to find out how to build the perfect encrypted password safe.
And for the skeptics that are curious about the “FBI” claim in our headline, you can read up on Operation Satyagraha, where money launderer Daniel Dantas has successfully encrypted his data and kept the FBI at bay for as long as a year with the very tools we’re going to use today.

Step 1: Get A Reliable USB Drive

http://www.howtogeek.com/wp-content/...05/image22.pnghttp://www.howtogeek.com/wp-content/...05/image22.png

If you’re like many geeks, you’ve had your fair share of USB keydrives die on you. The cheap ten dollar drives may not be hardy enough to put a vault of your most important passwords on, so you may have to get a little spendy and pick up one that will last for a while. We don’t endorse any particular brand of USB drives, but the author has had a lot of success with the Lacie Iamakey series. Lifehacker has featured them on several occasions, and they take a beating and keep your data safe. Use any brand that you think is good enough to hold keys to your online life—feel free to take the author’s recommendation with all the grains of salt you see fit.

Step 2: Create An Encrypted Drive or File with Truecrypt

http://www.howtogeek.com/wp-content/.../sshot-828.pnghttp://www.howtogeek.com/wp-content/.../sshot-828.png

A lot of software exists for encrypting files, but Truecrypt is a very solid choice. The two features we’re interested in are the ability to encrypt hidden files and the ability to run Truecrypt as portable software. You’ll need both if you ever intend to use your encrypted password key on any machine that isn’t your own.
http://www.howtogeek.com/wp-content/.../sshot-829.pnghttp://www.howtogeek.com/wp-content/.../sshot-829.png

We’ve done several great guides on how to use TrueCrypt, so we’re not going to delve too deeply into the details today. Here we’ll go over our a basic installation of a portable version of TrueCrypt on your USB disk. To begin, run the TrueCrypt installer and select “Extract” to install it on the USB disk.
http://www.howtogeek.com/wp-content/.../sshot-830.pnghttp://www.howtogeek.com/wp-content/.../sshot-830.png

TrueCrypt can’t be used “transparently” as a portable EXE file. This basically means that you’ll need administrator control over a machine to use it as a portable application. If this is okay to you, simply hit yes to go on to the next step. If not, you won’t really be able to open your encrypted drive on any machine but one with TrueCrypt installed, effectively tying it to your home PC. For today’s example, we’ll just be extracting it to the USB disk.
http://www.howtogeek.com/wp-content/.../sshot-832.pnghttp://www.howtogeek.com/wp-content/.../sshot-832.png

Extract the TrueCrypt files to any folder on the disk.
http://www.howtogeek.com/wp-content/.../sshot-834.pnghttp://www.howtogeek.com/wp-content/.../sshot-834.png

Find the TrueCrypt.exe file on your USB disk and run it. You’ll have to give that pesky administrator permission to start the program.
http://www.howtogeek.com/wp-content/.../sshot-857.pnghttp://www.howtogeek.com/wp-content/.../sshot-857.png
http://www.howtogeek.com/wp-content/.../sshot-835.pnghttp://www.howtogeek.com/wp-content/.../sshot-835.png

With TrueCrypt open, find “Create New Volume.”
http://www.howtogeek.com/wp-content/.../sshot-837.pnghttp://www.howtogeek.com/wp-content/.../sshot-837.png

We’ll be creating a volume hidden inside a file.

http://www.howtogeek.com/wp-content/.../sshot-840.pnghttp://www.howtogeek.com/wp-content/.../sshot-840.png

TrueCrypt asks us to pick a file to use as our hidden volume. Pick an empty, inconspicuous junk file. Don’t use anything important, because this file will be overwritten with your encrypted volume once you’re done.
http://www.howtogeek.com/wp-content/.../sshot-841.pnghttp://www.howtogeek.com/wp-content/.../sshot-841.png

With your volume file selected, click next to go onward.
http://www.howtogeek.com/wp-content/.../sshot-842.pnghttp://www.howtogeek.com/wp-content/.../sshot-842.png

TrueCrypt supports lots of different Encryptions Algorithms, but the default one will work well enough. Research them all if you care to, or just use the default AES encryption.
http://www.howtogeek.com/wp-content/.../sshot-843.pnghttp://www.howtogeek.com/wp-content/.../sshot-843.png

You’ll pick a size for your virtual disk. Unless your disk is full of big files, it might get noticed if it is too large. But don’t make it too small, because you might not be able to fit the portable application in the virtual disk.
http://www.howtogeek.com/wp-content/.../sshot-844.pnghttp://www.howtogeek.com/wp-content/.../sshot-844.png

Once that’s done, input a password or passphrase and optional keyfiles. You should probably be able to remember any password, but it should be secure enough that brute force methods of password cracking won’t break it easily.
http://www.howtogeek.com/wp-content/.../sshot-845.pnghttp://www.howtogeek.com/wp-content/.../sshot-845.png

TrueCrypt (and KeePass as well) can use practically any kind of file as part of the password. This can add extra layers of security beyond any password to your hidden volume. Simply be careful in your choice of file, since any change to the file’s contents may mean that it will no longer open your volume, and your data may be lost forever. When you’re done picking (or not using) keyfiles, hit OK, then hit Next on the “Outer Volume” screen.
http://www.howtogeek.com/wp-content/.../sshot-846.pnghttp://www.howtogeek.com/wp-content/.../sshot-846.png

Click format when you’re done looking at the random strings generated by your mouse movements.
http://www.howtogeek.com/wp-content/.../sshot-847.pnghttp://www.howtogeek.com/wp-content/.../sshot-847.png

Last warning—you’re overwriting the file you picked. Make sure you don’t use one you intend to keep!
http://www.howtogeek.com/wp-content/.../sshot-848.pnghttp://www.howtogeek.com/wp-content/.../sshot-848.png
http://www.howtogeek.com/wp-content/.../sshot-849.pnghttp://www.howtogeek.com/wp-content/.../sshot-849.png

You can now mount your “outer volume” on this screen and go on to create a “hidden volume” if you wish.

http://www.howtogeek.com/wp-content/.../sshot-850.pnghttp://www.howtogeek.com/wp-content/.../sshot-850.png

It’s pretty easy and can provide yet another layer to your labyrinth of encryption. But for our demonstration today, we’ll be skipping this step and mounting our drive to install KeePass.

Step 3: Mount the Hidden Drive and Install KeePass Portable

http://www.howtogeek.com/wp-content/.../sshot-851.pnghttp://www.howtogeek.com/wp-content/.../sshot-851.png

With TrueCrypt open, you can now open your hidden volume using your password and keyfile or keyfiles. Once you’ve mounted your virtual disk, you can open it by double clicking it in TrueCrypt.
http://www.howtogeek.com/wp-content/.../sshot-852.pnghttp://www.howtogeek.com/wp-content/.../sshot-852.png

If you’re following along, you’ll find that your new virtual disk is empty.
http://www.howtogeek.com/wp-content/.../sshot-858.pnghttp://www.howtogeek.com/wp-content/.../sshot-858.png

If you haven’t already, you can download KeePass portable to use on your new USB disk. You can download the standard version and only keep your passwords on the encrypted drive, but the portable version is also free and very easy to install on a USB disk.
http://www.howtogeek.com/wp-content/.../sshot-854.pnghttp://www.howtogeek.com/wp-content/.../sshot-854.png

Double click the installer to put the portable app on your (currently mounted) virtual disk.
http://www.howtogeek.com/wp-content/.../sshot-855.pnghttp://www.howtogeek.com/wp-content/.../sshot-855.png

In our example earlier, we mounted our encrypted disk as “G:” so we simply install KeePassPortable in that directory.
http://www.howtogeek.com/wp-content/.../sshot-856.pnghttp://www.howtogeek.com/wp-content/.../sshot-856.png

KeePass is a simple an intuitive program to use. It will generate and store long passwords as secure as we know how to make them. Even though the best practice may be turning towards passphrases over passwords, KeePass will store any either kind and recall it for you whenever you need to break into your accounts.
Assuming you’ve got the portable app installed, run it and select the option to create a new Password Database file. Like TrueCrypt, you can elect to use a password and keyfile, recommended to add security beyond a simple password or phrase. Just remember, the same rule applies—don’t use a file that is likely to change, because you may lock yourself out of your password safe forever if it does.
http://www.howtogeek.com/wp-content/.../sshot-859.pnghttp://www.howtogeek.com/wp-content/.../sshot-859.png

We won’t go into the wonders of KeePass today, but the program hasn’t functionally changed all that much. But, once you’ve created your password database, save it to the encrypted drive (G:/ in our example) to keep it away from prying eyes.

Step 4: Your Passwords are Now Safe From The KGB


http://www.howtogeek.com/wp-content/...c0977a6a_b.jpghttp://www.howtogeek.com/wp-content/...c0977a6a_b.jpg

Now that you’ve got your passwords locked away in an encrypted vault, you can rest assured they’re safe from all but the most insanely dedicated of users. So what else do you want to use your new cryptographic powers for? Sensitive, personal files can be stored here, and other portable apps can be installed in your hidden virtual disk.
Thanks to Geek Eric Z Goodnight

Image Credits: Anonymity and the Internet by Stian Eikeland, Creative Commons. Spy by sewing punzie, Creative Commons.


All times are GMT. The time now is 11:14.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.5.2