Thursday, May 19, 2011

Creating a Hidden Operating System

0 comments
Most people will wonder why a person need's a secondary operating system. But if your are sharing a computer with another person nor you are been held up for your valuable information on your computer or laptop that would be a worse case scenario as they might steal nor copy your valuable information.

If your traveling overseas and your laptop need to be search then having a decoy operating system would come in-handy. The truecrypt will create a decoy operating system that will allow you to have two operating system on a single laptop or computer.

The system is plain simple it helps you keep all your important document in another operating system allowing you to have another plain operating system that only has normal document as a decoy and this will be a life saver even your computer is been hacked nor been infected by virus as the operating system is installed on a different patition of the computer.

Not only that it comes with different login and password to access the two operating system. You can use it for multiple boot from any operating system that is available in the market.

What good a secondary operating system does:

- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time (on-the-fly) and transparent.

It provides two levels of plausible deniability, in case an adversary forces you to reveal the password:

1) Hidden volume (steganography) and hidden operating system.

2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
even by searching the hold hard drive.

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk simply by drag-and-drop operations. Files are automatically being decrypted on-the-fly while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly in RAM.

Source: http://goo.gl/qQ6oo

0 comments:

Post a Comment