![]() ![]() By default, the list contains only volume path, virtualĭevice, and mount point. See also option -token-lib.ĭisplay a list of mounted volumes. See also command -list-token-keyfiles.Įxport a keyfile from a security token. See below for description of MOUNTED_VOLUME.ĭelete keyfiles from security tokens. new-keyfiles, -new-password, -p, -random-source.ĭismount a mounted volume. PKCS-5 PRF HMAC hashĪlgorithm can be changed with option -hash. Most options are requestedįrom the user if not specified on command line. If at any step the hidden volume protection is triggered, start again from 1).Ĭreate a new keyfile containing pseudo-random data.Ĭhange a password and/or keyfile(s) of a volume. When using the text user interface, the following procedure must beġ) Create an outer volume with no filesystem.Ģ) Create a hidden volume within the outer volume.ģ) Mount the outer volume using hidden volume protection.Ĥ) Create a filesystem on the virtual device of the outer volume.ĥ) Mount the new filesystem and fill it with data. Inexperienced users should use the graphical user interface to create a hidden Options may affect security of the volume (see option -p for more information). ![]() random-source, -quick, -size, -volume-type. See also options -encryption, -k, -filesystem, -hash, -p, Most options are requested from the user if not specified All required options are requested from theĬreate a new volume. Truecrypt VOLUME_PATH Īuto mount device-hosted or favorite volumes.īackup volume headers to a file. volume-properties Display volume properties random-source= Use file as source of random data protection-password= Password for protected hidden volume protection-keyfiles= Keyfiles for protected hidden volume non-interactive Do not interact with user m, -mount-options= TrueCrypt volume mount options list-token-keyfiles List security token keyfiles import-token-keyfiles Import keyfiles to security token h, -help Display detailed command line help f, -force Force mount/dismount/overwrite export-token-keyfile Export keyfile from security token explore Open explorer window for mounted volume display-password Display password while typing delete-token-keyfiles Delete security token keyfiles auto-mount= Auto mount device-hosted/favorite volumes Truecrypt HELP $ truecrypt -help Usage: truecrypt To uninstall TrueCrypt, please run ‘truecrypt-uninstall.sh'. Then mount the drive again using the steps above. $ sudo cryptsetup remove /dev/mapper/truecrypt1 ĭevice-mapper: remove ioctl on truecrypt1 failed: Device or resource busyĭevice /dev/mapper/truecrypt1 is still in use.ĭo this (where ‘drive' is the mount folder and ‘truecrypt1' is the truecrypt link in the ‘/dev/mapper' directory): $ sudo umount /media/drive When trying to (re-)mount a truecrypt drive due to the error. Press ‘y' to kill the process and do the same for the next prompt, then: $ truecrypt -d 2. The output will show runing processes, example: /dev/sdXN: 8933 9628c How To Open A TrueCrypt Container Using cryptsetupĭo this to kill the busy processes and unmount the drive (substitute sdXN with the correct drive info: $ sudo fuser -kim /dev/sdXN ![]() If that doesn't work, see ERRORS & SOLUTIONS at the link below: If you have your terminal open in the location of your volume, change out with $ cd. Then it is very likely that it is simply your terminal that is keeping the device busy. (In some cases useful info about processes that use the device is found by lsof(8) or fuser(1)) If you get the error:Įrror: umount: /media/truecrypt1: device is busy. Or to unmount all truecrypt volumes: $ truecrypt -d ERRORS & SOLUTIONS 1. You can unmount a specific device by $ truecrypt -d /path/to/mountpoint Take 777 and subtract the umask number to get the permissions Unmounting The code above sets permissions to 0775 (777 – 002 = 775). $ truecrypt -fs-options=users,uid=$(id -u),gid=$(id -g),umask=002 -mount /dev/sdc1 /media/thefolder The path to the solution is the bottom answer (with 0 votes): To mount the drive so that you have read and write permissions, mount the drive with the code below: I was able to mount the drive and access it via WinSCP but not anything else. Then enter the password and other info if necessary. Mounting a volume $ truecrypt -mount /path/to/device /path/to/mountpointĮxample: $ truecrypt -mount /dev/sdc1 /media/thefolder ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |