658731
58
Zoom out
Zoom in
Previous page
1/162
Next page
59
when the backup is created, the same keyfile(s) will be necessary to mount the volume
again after the volume header is restored. For more information, see the section Encryption
Scheme in the chapter
Technical Details.
After you create a volume header backup, you might need to create a new one only when
you
change the volume password and/or keyfiles. Otherwise, the volume header remains
unmodified so the volume header backup remains up-to-date.
Note: Apart from salt (which is a sequence of random numbers), external header backup files do not
contain any unencrypted information and they cannot be decrypted without knowing the correct
password and/or supplying the correct keyfile(s). For more information, see the chapter Technical
Details.
When you create an external header backup, both the standard volume header and the area
where
a hidden volume header can be stored is backed up, even if there is no hidden
volume within the
volume (to preserve plausible deniability of hidden volumes). If there is no
hidden volume within the volume, the area reserved for the hidden volume header in the
backup file will be filled with random data (to preserve plausible deniability).
When restoring a volume header, you need to choose the type of volume whose header
you wish
to restore (a standard or hidden volume). Only one volume header can be
restored at a time. To
restore both headers, you need to use the function twice (Tools ->
Restore Volume Header). You
will need to enter the correct password (and/or to supply the
correct keyfiles) that was/were valid
when the volume header backup was created. The
password (and/or keyfiles) will also
automatically determine the type of the volume header
to restore, i.e. standard or hidden (note that
VeraCrypt determines the type through the
process of trial and error).
Note: If the user fails to supply the correct password (and/or keyfiles) twice in a row when
trying to
mount a volume, VeraCrypt will automatically try to mount the volume using the
embedded backup
header (in addition to trying to mount it using the primary header) each
subsequent time that the
user attempts to mount the volume (until he or she clicks Cancel).
If VeraCrypt fails to decrypt the
primary header but it successfully decrypts the embedded
backup header at the same time, the
volume is mounted and the user is warned that the
volume header is damaged (and informed as to
how to repair it).
Settings -> Performance and Driver Options
Invokes the Performance dialog window, where you can change enable or disable AES
Hardware acceleration and thread based parallelization. You can also change the following
driver option:
Enable extended disk control codes support
If enabled, VeraCrypt driver will support returning extended technical information about
mounted volumes through IOCTL_STORAGE_QUERY_PROPERTY control code. This
control code is always supported by physical drives and it can be required by some
applications to get technical information about a drive (e.g. the Windows fsutil program
uses this control code to get the physical sector size of a drive.).
Enabling this option brings VeraCrypt volumes behavior much closer to that of physical
disks and if it is disabled, applications can easily distinguish between physical disks and
VeraCrypt volumes since sending this control code to a VeraCrypt volume will result in an
error.
Disable this option if you experience stability issues (like volume access issues or system
BSOD) which can be caused by poorly written software and drivers.
58


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for VeraCrypt 1.16 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of VeraCrypt 1.16 in the language / languages: English as an attachment in your email.

The manual is 2,98 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info