658731
33
Zoom out
Zoom in
Previous page
1/162
Next page
34
your CD/DVD drive, and restart your computer.
Note: This feature cannot be used to restore the header of a hidden volume within which a
hidden operating system resides (see the section Hidden Operating System). To restore
such a volume header, click Select Device, select the partition behind the decoy system
partition, click OK, select Tools -> Restore Volume Header and then follow the instructions.
WARNING: By restoring key data using a VeraCrypt Rescue Disk, you also restore the
password that was valid when the VeraCrypt Rescue Disk was created. Therefore,
whenever you change the password, you should destroy your VeraCrypt Rescue Disk and
create a new one (select System -> Create Rescue Disk). Otherwise, if an attacker knows
your old password (for example, captured by a keystroke logger) and if he then finds your
old VeraCrypt Rescue Disk, he could use it to restore the key data (the master key
encrypted with the old password) and thus decrypt your system partition/drive.
If Windows is damaged and cannot start, the VeraCrypt Rescue Disk allows you to
permanently decrypt the partition/drive before Windows starts. In the Rescue Disk screen,
select Repair Options > Permanently decrypt system partition/drive. Enter the correct
password and wait until decryption is complete. Then you can e.g. boot your MS Windows
setup CD/DVD to repair your Windows installation. Note that this feature cannot be used to
decrypt a hidden volume within which a hidden operating system resides (see the section
Hidden Operating System).
Note: Alternatively, if Windows is damaged (cannot start) and you need to repair it (or
access files on it), you can avoid decrypting the system partition/drive by following these
steps: If you have multiple operating systems installed on your computer, boot the one that
does not require pre-boot authentication. If you do not have multiple operating systems
installed on your computer, you can boot a WinPE or BartPE CD/DVD or you can connect
your system drive as a secondary or external drive to another computer and then boot the
operating system installed on the computer. After you boot a system, run VeraCrypt, click
Select Device, select the affected system partition, click OK , select System > Mount
Without Pre-Boot Authentication, enter your pre-boot-authentication password and click
OK. The partition will be mounted as a regular VeraCrypt volume (data will be on-the-fly
decrypted/encrypted in RAM on access, as usual).
Your VeraCrypt Rescue Disk contains a backup of the original content of the first drive
track (made before the VeraCrypt Boot Loader was written to it) and allows you to restore it
if necessary. The first track typically contains a system loader or boot manager. In the
Rescue Disk screen, select Repair Options > Restore original system loader.
Note that even if you lose your VeraCrypt Rescue Disk and an attacker finds it, he or she will not
be able to decrypt the system partition or drive without the correct password.
To boot a VeraCrypt Rescue Disk, insert it into your CD/DVD drive and restart your computer. If the
VeraCrypt Rescue Disk screen does not appear (or if you do not see the ‘Repair Options’ item in the
‘Keyboard Controls’ section of the screen), it is possible that your BIOS is configured to attempt to
boot from hard drives before CD/DVD drives. If that is the case, restart your computer, press F2 or
Delete (as soon as you see a BIOS start-up screen), and wait until a BIOS configuration screen
appears. If no BIOS configuration screen appears, restart (reset) the computer again and start
pressing F2 or Delete repeatedly as soon as you restart (reset) the computer. When a BIOS
configuration screen appears, configure your BIOS to boot from the CD/DVD drive first (for
33


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for VeraCrypt 1.16 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of VeraCrypt 1.16 in the language / languages: English as an attachment in your email.

The manual is 2,98 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info