Praise to Allah who is honoring Islam with his victory, dishonoring polytheism with his defeat, resolving issues by his order, dragging the infidels with his cunningness He who made what goes around comes around with his justice, who gave Wellness to the pious with his grace Prayers and peace upon who Allah raises the light of Islam by his sword and his companions and their followers by beneficence till the Day of Judgment
📑 Article Index |
3- How to create an encrypted container.
4- Hide the container and program - to mislead the enemies.
5- Set up a hidden container (extra) inside the main container.
6- How to encrypt System disks and External Memory.
Encrypting files is necessary to protect your data and files from hackers, or physical access. So if the attacker hack your computer, He can not decrypt your personal data encrypted with VeraCrypt because the program relies on strong encryption algorithms.
VeraCrypt is an open Source program and a modified version of the TrueCrypt encryption program where TrueCrypt developers stopped developing the program after government agencies put pressure on them. Veracrypt has undergone security checks and source code checks by many security researchers and companies specializing in information security such as Quarks Lab. Although security vulnerabilities have been discovered in VeraCrypt recently, developers have been working on issuing stable versions to close detected vulnerabilities, making it an important step in the right direction in the filed of electronic protection.
❍ To download it from official website click here
❍ Then press DOWNLOAD to begin
❍ After the download is completed, you will find the installation file in the Downloads folder
❍ Open the file and select Extract to extract the files and press next
❍ Press OK
❍ Press Yes
❍ The program will extract the files in the default Downloads folder
❍ You can also choose folder where you want to extract files by clicking Browse
❍ Press Extract
----------------------------------------------
❍ Firstly, delete the program that you downloaded from the site, because we have extracted the required files and If your computer is hacked, investigators do not know about VeraCrypt, and then continue to install VeraCrypt through extracted files
❍ Go to the path where you extracted the files and you will find a folder named VeraCrypt
❍ You will find many files inside
❍ Click VeraCrypt-64x.exe If your processor core 64-bit, if the processor core is 32-bit , press VeraCrypt.exe
💡 Note:
To see the type of processor kernel for your device go to:
ControlPanel> System and Security> Security
----------------------------------------------------------------------
❍ Select Create Volume to create the encrypted container folder
❍ Select Standard VeraCrypt volume and click Next
❍ Press Select File and select where you want to create the encrypted container inside to place the files
💡 Note:
A container folder is an encrypted folder that encrypts all the files you move inside
❍ After selecting the folder, press Open
❍ Then click Next
❍ Now we will choose encryption algorithm
❍ Select AES-Twofish-Serpent, this option to encrypt files with 3 algorithms, if the attacker can decrypt one algorithm will not be able to decrypt the other algorithms
❍ Then click Next
❍ Enter a strong password and confirm it in the second box and press Next
💡 Note:
You can also add a file or image or code if you have lost the container password (optional) where the file serves as a key to open the folder of the encrypted container
❍ To add a file or image mark Use key files option and press Key file
❍ Select the file or image or PGP key and press OK
❍ After typing the password (if less than 20 characters) the following message will appear: Click Yes
❍ Select Yes and press NEXT
❍ Now the program will encrypt the container file. move the mouse randomly
❍ Continue with random movement until the green line is complete
❍ Then press Format to create the container
❍ Thus the encrypted container was created
❍ Click Next
❍ The program ended the creation of the encrypted folder named afaq for use in encrypting the important files inside it as shown in the following picture
❍ Now go back to the interface of the program by going to the VeraCrypt folder
❍ Firstly delete all the attachments in the folder and leave only the main program file (depending on the kernel of your device)
❍ Open the program
❍ First select one of the disks (the container will appear after we open it with the same disk name as you specified)
❍ Select, for example, disk A:
❍ Then click Select File and select the encrypted container file that we just created
❍ Then press Mount
❍ Enter the password you registered when creating the container
❍ then press Ok
❍ Wait until the encrypted folder opens
❍ Thus, the folder of the encrypted container was opened
❍ Now go to my computer and you will see a new partition
❍This is how the encrypted container will look when we want to use it
❍ Now move your important files to disk A: (encrypted container)
❍ After the files moving is complete, we will close the container again so that no one can see your files if your home has been raided by enemies
(we will not open the container unless we have a job or want to use the files inside it)
❍ Go back to the program interface and press Dismount All and the disc will disappear
❍ The container will be closed
❍ Go to the discs to make sure the container disc disappears
------------------------------------------------------------------------
❍ Now we will fool the enemies and we change the name of the container and make its extension, for example in the format of Mp3, png or jpg
❍ Right-click and select Rename
❍ Put any name and make the file type Png as example
❍ The container folder will appear as an image icon
❍ We will download a small program that hides the programs installed on the device from the control panel
❍ To download hideprograms click here and then continue the installation steps
❍ Click Next
❍ Click Next
❍ Click Install
❍ Then click Finish
❍ This is the program interface
❍ Press Add / Remove Program List
❍ Then mark on VeraCrypt and click Hide checked
❍ Then go back to the control panel and make sure VeraCrypt disappears
❍ Go back to the veracrypt.exe program file in which we will open and close the container
❍ First change the folder name
❍ Then place it in the appropriate place in the computer
❍ We will change the name and icon of the program so that we deceive the enemies and prevent them from knowing the existence of the program in the computer
❍ To do this, first download Resource Hacker program from here
❍ Once the download is complete, open it and continue the steps
❍ Click Next
❍ Click install
❍ Click Finish
❍ To confirm the installation you will find the Resource Hacker program in the Start menu
💡 Important Note:
In order to change the basic icon of the YeraCrypt file, a .ico file is required
You can search for them in icon download sites such as iconarchive.com or flaticon.com
❍ Go to site and click on the image to downlload
❍ Select Download ICO as specified in the image
❍ Right-click on VeraCrypt to change the icon
❍ Choose Open using Resource Hacker
❍ This is the interface of the Resource Hacker program
❍ Select the Icon folder
❍ Then in the menu click on the Action option and choose Replace Icon
❍ Click Open file with new icon
❍ Select the image icon you want to place instead of the basic icon
❍ then press OPEN
❍ Press Replace
❍ Then select File option from the menu
❍ Press Save to save your changes
❍ Then restart the computer and you will find the icon has changed
❍ We then change the VeraCrypt name to any appropriate name with the icon you set
💡 Note:
Resource Hacker will make a copy of the program, delete it and leave only the version you have changed its icon
------------------------------------------------------------------------------------------------------
Veracrypt allows you to hide the folder of the container by setting a different password with the main container folder. Even if you are arrested and forced to give the password, you have the option to display the general password for the main container folder, not the extra container or hidden folder
The difference between the main container folder and the hidden container folder is the password difference. Each folder has its own password
❍ Select Create Volume
❍ Select Create an encrypted file container and then click Next
❍ Select Hidden VeraCrypt volume to create an additional hidden container within the main container folder
❍ Then click Next
❍ Select Normal mode
❍ Then press Next
❍ Press Select File and choose the location and name of the main container in which we will put the extra container to save files
❍ We will choose the container format of Mp3 or PNG for camouflage as in the picture
❍ Press Save
❍ After selecting the name and location of the container, click Next
❍ Click Next
❍ Select the size of the main container
❍ Then click Next
❍ Now we will choose encryption algorithm
❍ Select AES-Twofish-Serpent, this option to encrypt files with 3 algorithms, if the attacker can decrypt one algorithm will not be able to decrypt the other algorithms
❍ Then click Next
❍ Enter a strong password and confirm it in the second box and press Next
💡 Note:
You can also add a file or image or code if you have lost the container password (optional) where the file serves as a key to open the folder of the hidden container
❍ To add a file or image mark Use key files option and press Key file
❍ Select the file or image or PGP key and press OK
❍ Click Next
❍ Now the program will encrypt the container file. move the mouse randomly
❍ Then press Format and wait until you finish creating the main container
❍ Thus the main container was created which is (Z)
❍ Click on Open Outer Volume and add files to it
💡 Note
You must add as many files as possible in the main container folder before creating the hidden container folder, because adding files to the public container folder after creating the hidden container folder may cause the hidden container folder to be corrupted.
❍ We will place these two files inside
❍ Then close the window
❍ Now the hidden container will be created (extra)
❍ Click Next
❍ Press Yes
❍ Select Yes then press Next
❍ Select AES-Twofish-Serpent again
❍ Then click Next
❍ Determine the size of the hidden container (less than the size of the main container)
❍ Click Next
❍ Move the mouse as in the previous steps
❍ Then press Format and wait until you finish creating the hidden container
❍ Press OK
❍ The creation of hidden container (extra) is completed
❍ Close the window
❍ Open VeraCrypt
❍ choose Select File
❍ Select the container you have created
❍ Now you have two containers, a main container and an additional hidden container, you can open either of the two containers by entering their password
💡 Note
The utility of the additional container is that if you are forced to give the password to the main container during interrogation, they will not be able to tell that there is another hidden container
❍ We will open the main container after entering its password and press Ok
❍ This will open the main container (Z) in which we placed the files when they were created
❍ But If we enter the hidden container password, it will appear blank because we have not added the files yet
❍ After the files moving is complete, we will close the container again so that no one can see your files if your home has been raided by enemies
💡 Note
we will not open the container unless we have a job or want to use the files inside it
❍ Go back to the program interface and press Dismount All and the disc will disappear
-----------------------------------------------------------------------------------------------
The utility of encrypting external USB memory and system disks is not only hidden, but encrypted so that you can use the same steps to encrypt your disks when choosing Standrad VeraCrypt volume and not hidden VeraCrypt volume and will not be able to retrieve any of the software .. You can also split the external memory and make it two disks, Hidden and disc visible as in the following steps
❍ Select Create Volume
❍ Select Encrypt a non-system partition / drive and click Next
❍ Select Hidden VeraCrypt volume to create an additional hidden disk inside the primary disk or memory
❍ Then click Next
❍ Select the disc you want to encrypt and hide and press OK
❍ Click Next
❍ Press Yes
❍ Press the indicated position to select the encryption algorithm
❍ Select AES-Twofish-Serpent, this option to encrypt files with 3 algorithms, if the attacker can decrypt one algorithm will not be able to decrypt the other algorithms
❍ Then click Next
❍ Enter a strong password and confirm it in the second box and press Next
💡 Note:
You can also add a file or image or code if you have lost the container password (optional) where the file serves as a key to open the folder of the hidden container
❍ To add a file or image mark Use key files option and press Key file
❍ Select the file or image or PGP key and press OK
❍ Now the program will encrypt the disc or memory. Move the mouse randomly until the line is completed
❍ Then press Format
❍ Press Yes
❍ Thus the disk or memory has been encrypted
❍ Click on Open Outer Volume and add files to it
💡 Note
You must add as many files as possible in the main container folder before creating the hidden container folder, because adding files to the public container folder after creating the hidden container folder may cause the hidden container folder to be corrupted.
❍ Then click Next
❍ Now the disc will be created (extra & hidden) inside the main disk
❍ Click Next
❍ Select AES-Twofish-Serpent again
❍ Then click Next
❍ Specify the size of the additional disc hidden (size less than the disc)
❍ Click Next
❍ determine the size of the additional disc hidden (less than the main disc size)
❍ Click Next
❍ Enter a strong password and confirm it in the second box and press Next
❍ Now the program will encrypt the hidden disk (extra) inside the primary disk. Move the mouse randomly until the tape is completed
❍ The program will encrypt the hidden disk (extra) inside the primary disk. Move the mouse randomly until the tape is completed
💡 Note:
move all your files from disk or USB stick before Encryption because encryption will delete all disc content
❍ Then press Format and wait until you have finished creating the extra disk
❍ Press OK
❍ Close the window
❍ Open VeraCrypt
❍ Select auto-mount devices
❍ Now if you want to open the main disk or memory enter the password you entered when encrypting the disk
❍ If you want to open the additional hidden disk, enter the container password
❍ Thus the disk was opened
❍ To close the disc Press on "dismount all"
💡Explain:
* To restore the disks to the first mode without encryption, you must format them using Mini Tool Partition wizard program
* If you want to use the encrypted USB on another computer, you must install Veracrypt in that computer because you can not run the encrypted USB on any other computer except Veracrypt on the computer
❊❊❊❊❊❊