5,337
edits
No edit summary |
|||
Line 1: | Line 1: | ||
VeraCrypt is the successor to the popular encryption utility TrueCrypt. | VeraCrypt is the successor to the popular encryption utility TrueCrypt. | ||
TrueCrypt had previously [http://istruecryptauditedyet.com/ been audited] and found to be secure. | TrueCrypt had previously [http://istruecryptauditedyet.com/ been audited] and found to be secure. | ||
==CLI== | |||
To use the cli, call <code>veracrypt</code> with <code>-t</code> as the first argument. | |||
Some examples output from <code>veracrypt --help</code>: | |||
<pre> | |||
Create a new volume: | |||
veracrypt -t -c | |||
Mount a volume: | |||
veracrypt volume.hc /media/veracrypt1 | |||
Mount a volume as read-only, using keyfiles: | |||
veracrypt -m ro -k keyfile1,keyfile2 volume.hc | |||
Mount a volume without mounting its filesystem: | |||
veracrypt --filesystem=none volume.hc | |||
Mount a volume prompting only for its password: | |||
veracrypt -t -k "" --pim=0 --protect-hidden=no volume.hc /media/veracrypt1 | |||
Dismount a volume: | |||
veracrypt -d volume.hc | |||
Dismount all mounted volumes: | |||
veracrypt -d | |||
</pre> | |||
===Flags=== | |||
* <code>-t</code> use text (CLI) interface | |||
* <code>--non-interactive</code> Add this when scripting with the CLI | |||
==Favoriting== | ==Favoriting== |