0% found this document useful (0 votes)
26 views4 pages

266 Using Vera Crypt

The document describes the process of using VeraCrypt to create a fully encrypted, mountable virtual drive. It details the transformation of the RandyBoyle.txt file from 0 KB to 20 MB after encryption and the successful copying of a License text file to a newly created Q drive. The author reports no difficulties during the project, highlighting the ease of use and drag-and-drop capability of the virtual drive.

Uploaded by

paul mulwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

266 Using Vera Crypt

The document describes the process of using VeraCrypt to create a fully encrypted, mountable virtual drive. It details the transformation of the RandyBoyle.txt file from 0 KB to 20 MB after encryption and the successful copying of a License text file to a newly created Q drive. The author reports no difficulties during the project, highlighting the ease of use and drag-and-drop capability of the virtual drive.

Uploaded by

paul mulwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

266 Using Vera Crypt

Student’s Name

Institution Affiliation

Instructor
266 Using Vera Crypt

The image above (Figure one) shows the text file RandyBoyle.txt

The image above (Figure two) shows the License text file that I copied from the security folder
to the newly created Q drive

The image above (Figure three) shows the RandyBoyle text file that has now become 20,480KB
(20MB) from 0 KB
Summary
The first image shows the RandyBoyle.txt file before applying the encryption algorithm.

In the second image, the License text file has been copied to a new and safe Q drive that was just

created. The third picture shows the RandyBoyle.txt file created, but the current file size of the

RandyBoyle.txt file is 20 MB, proving that the file has been encrypted and saved in the virtual

drive. I had no difficulty while working on this project. Using VeraCrypt, I created a fully

encrypted, mountable virtual drive from a file on my existing C: drive. This virtual drive tended

to have a drag-and-drop capability, and it was easy to use, and I did not encounter any challenges

in the project. When the files have been copied to the encrypted drive, all that one has to do is

dismount the drive, and it becomes just a normal file until it is required again.

Summary
The first image shows the RandyBoyle.txt file before applying the encryption algorithm.

In the second image, the License text file has been copied to a new and safe Q drive that was just

created. The third picture shows the RandyBoyle.txt file created, but the current file size of the

RandyBoyle.txt file is 20 MB, proving that the file has been encrypted and saved in the virtual

drive. I had no difficulty while working on this project. Using VeraCrypt, I created a fully

encrypted, mountable virtual drive from a file on my existing C: drive. This virtual drive tended

to have a drag-and-drop capability, and it was easy to use, and I did not encounter any challenges

in the project. When the files have been copied to the encrypted drive, all that one has to do is

dismount the drive, and it becomes just a normal file until it is required again.

Summary
The first image shows the RandyBoyle.txt file before applying the encryption algorithm.

In the second image, the License text file has been copied to a new and safe Q drive that was just
created. The third picture shows the RandyBoyle.txt file created, but the current file size of the

RandyBoyle.txt file is 20 MB, proving that the file has been encrypted and saved in the virtual

drive. I had no difficulty while working on this project. Using VeraCrypt, I created a fully

encrypted, mountable virtual drive from a file on my existing C: drive. This virtual drive tended

to have a drag-and-drop capability, and it was easy to use, and I did not encounter any challenges

in the project. When the files have been copied to the encrypted drive, all that one has to do is

dismount the drive, and it becomes just a normal file until it is required again.

You might also like