Merge remote-tracking branch 'upstream/master' into zh-HK-update
53
README.md
@ -18,8 +18,6 @@ Contents
|
||||
========
|
||||
|
||||
I. Windows
|
||||
Requirements for Building VeraCrypt for Windows.
|
||||
Instructions for Building VeraCrypt for Windows.
|
||||
Instructions for Signing and Packaging VeraCrypt for Windows.
|
||||
|
||||
II. Linux and Mac OS X
|
||||
@ -40,19 +38,7 @@ VI. Further Information
|
||||
I. Windows
|
||||
==========
|
||||
|
||||
Requirements for Building VeraCrypt for Windows:
|
||||
------------------------------------------------
|
||||
|
||||
- Microsoft Visual C++ 2010 SP1 (Professional Edition or compatible)
|
||||
- Microsoft Visual C++ 2019
|
||||
- Microsoft Visual C++ 1.52 (available from MSDN Subscriber Downloads)
|
||||
- Microsoft Windows SDK for Windows 7.1 (configured for Visual C++ 2010)
|
||||
- Microsoft Windows SDK for Windows 8.1 (needed for SHA-256 code signing)
|
||||
- Microsoft Windows Driver Kit 7.1.0 (build 7600.16385.1)
|
||||
- NASM assembler 2.08 or compatible
|
||||
- YASM 1.3.0 or newer.
|
||||
- gzip compressor
|
||||
- upx packer (available at https://upx.github.io/)
|
||||
A detailed guide on how to compile VeraCrypt on Windows can be found at: https://www.veracrypt.fr/en/CompilingGuidelineWin.html
|
||||
|
||||
IMPORTANT:
|
||||
|
||||
@ -74,41 +60,6 @@ the compiler, or if you install a different or no service pack for Visual
|
||||
Studio, or different hotfixes for it, or if you use different versions of
|
||||
the required SDKs).
|
||||
|
||||
|
||||
Instructions for Building VeraCrypt for Windows:
|
||||
------------------------------------------------
|
||||
|
||||
1) Create an environment variable 'MSVC16_ROOT' pointing to the folder 'MSVC15'
|
||||
extracted from the Visual C++ 1.52 self-extracting package.
|
||||
|
||||
Note: The 16-bit installer MSVC15\SETUP.EXE cannot be run on 64-bit Windows,
|
||||
but it is actually not necessary to run it. You only need to extract the
|
||||
folder 'MSVC15', which contains the 32-bit binaries required to build the
|
||||
VeraCrypt Boot Loader.
|
||||
|
||||
2) If you have installed the Windows Driver Development Kit in another
|
||||
directory than '%SYSTEMDRIVE%\WinDDK', create an environment variable
|
||||
'WINDDK_ROOT' pointing to the DDK installation directory.
|
||||
|
||||
3) Open the solution file 'VeraCrypt.sln' in Microsoft Visual Studio 2010.
|
||||
|
||||
4) Select 'All' as the active solution configuration and WIN32 as the active
|
||||
platform.
|
||||
|
||||
5) Build the solution.
|
||||
|
||||
6) Select x64 as the active platform and build the solution again.
|
||||
|
||||
7) Open the solution file 'VeraCrypt_vs2019.sln' in Microsoft Visual Studio 2019.
|
||||
|
||||
8) Select 'All' as the active solution configuration and ARM64 as the active
|
||||
platform.
|
||||
|
||||
9) Build the solution.
|
||||
|
||||
6) If successful, there should be newly built VeraCrypt binaries in the
|
||||
'Release\Setup Files' folder.
|
||||
|
||||
Instructions for Signing and Packaging VeraCrypt for Windows:
|
||||
-------------------------------------------------------------
|
||||
|
||||
@ -136,6 +87,8 @@ For build instructions, please refer to the file src\Boot\EFI\Readme.txt.
|
||||
II. Linux and Mac OS X
|
||||
======================
|
||||
|
||||
A detailed guide on how to build a dev environment and on how to compile VeraCrypt on Linux can be found at: https://www.veracrypt.fr/en/CompilingGuidelineLinux.html
|
||||
|
||||
Requirements for Building VeraCrypt for Linux and Mac OS X:
|
||||
-----------------------------------------------------------
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="ar" name="العربية" en-name="Arabic" version="0.2.0" translators="Ahmad Gharbeia, Khaled Hosny, Ali Khojah" />
|
||||
<font lang="ar" class="normal" size="11" face="default" />
|
||||
<font lang="ar" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="be" name="Беларуская" en-name="Belarusian" version="0.1.0" translators="Aleg Azarousky" />
|
||||
<font lang="be" class="normal" size="11" face="default" />
|
||||
<font lang="be" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="bg" name="Български" en-name="Bulgarian" version="0.1.0" translators="Lachezar Gorchev" />
|
||||
<font lang="bg" class="normal" size="11" face="default" />
|
||||
<font lang="bg" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="ca" name="Català" en-name="Catalan" version="0.1.0" translators="CESICAT, Centre de Seguretat de la Informació de Catalunya" />
|
||||
<font lang="ca" class="normal" size="11" face="default" />
|
||||
<font lang="ca" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version="1.25.9">
|
||||
<localization prog-version="1.26">
|
||||
<language langid="co" name="Corsu" en-name="Corsican" version="1.0.0" translators="Patriccollu di Santa Maria è Sichè"/>
|
||||
<font lang="co" class="normal" size="11" face="default"/>
|
||||
<font lang="co" class="bold" size="13" face="Arial"/>
|
||||
@ -842,7 +842,7 @@
|
||||
<entry lang="co" key="EXTRACTION_FINISHED_TITLE_DON" >Schedarii estraiti currettamente</entry>
|
||||
<entry lang="co" key="EXTRACTION_FINISHED_INFO" >Tutti i schedarii sò stati estraiti currettamente in u locu di destinazione.</entry>
|
||||
<entry lang="co" key="AUTO_FOLDER_CREATION" >S’è u cartulare specificatu ùn esiste micca, quellu serà creatu autumaticamente.</entry>
|
||||
<entry lang="co" key="SETUP_UPGRADE_DESTINATION" >I schedarii di u prugramma VeraCrypt seranu messi à ghjornu in u locu induve VeraCrypt hè installatu. S’ella hè bisognu à selezziunà un altru locu, ci volè, prima, à disinstallà VeraCrypt.</entry>
|
||||
<entry lang="co" key="SETUP_UPGRADE_DESTINATION" >I schedarii di u prugramma VeraCrypt seranu messi à livellu in u locu induve VeraCrypt hè installatu. S’ella hè bisognu à selezziunà un altru locu, ci volè, prima, à disinstallà VeraCrypt.</entry>
|
||||
<entry lang="co" key="AFTER_UPGRADE_RELEASE_NOTES" >Vulete leghje l’annutazioni nant’à a versione attuale (l’ultima versione stabule) di VeraCrypt ?</entry>
|
||||
<entry lang="co" key="AFTER_INSTALL_TUTORIAL" >S’è ùn avete mai impiegatu VeraCrypt, vi ricumandemu di leghje u capitulu « Beginner's Tutorial » in a guida di l’utilizatore VeraCrypt. Vulete fighjà a furmazione autonoma ?</entry>
|
||||
<entry lang="co" key="SELECT_AN_ACTION" >Selezziunate un azzione à fà :</entry>
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="co" key="VOLUME_HOST_IN_USE" >AVERTIMENTI : U schedariu o l’apparechju ospite {0} hè dighjà impiegatu !\n\nIgnurà què pò cagiunà fenomeni imprevisti cum’è l’istabilità di u sistema. Tutte l’appiecazioni chì puderianu impiegà u schedariu o l’apparechju ospite devenu esse chjose prima di muntà u vulume.\n\nCuntinuà a muntatura ?</entry>
|
||||
<entry lang="co" key="CANT_INSTALL_WITH_EXE_OVER_MSI" >VeraCrypt hè statu installatu anteriurmente impieghendu un pacchettu MSI è dunque, ùn pò micca esse mudificatu cù un stalladore classicu.\n\nImpiegate u pacchettu MSI per mudificà a vostra installazione VeraCrypt.</entry>
|
||||
<entry lang="co" key="IDC_USE_ALL_FREE_SPACE" >Impiegà tuttu u spaziu dispunibule</entry>
|
||||
<entry lang="co" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt ùn pò micca esse messu à livellu perchè a partizione o u lettore di u sistema hè statu cifratu impieghendu una cudificazione chì ùn hè più accettata.\nDicifrate u vostru sistema prima di mette VeraCrypt à livellu è cifratelu torna.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="cs" name="Čeština" en-name="Czech" version="1.2.0" translators="Vítek Moser, Lagardere" />
|
||||
<font lang="cs" class="normal" size="11" face="default" />
|
||||
<font lang="cs" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="cs" key="VOLUME_HOST_IN_USE">UPOZORNĚNÍ: Hostitelský soubor/zařízení {0} je již používán!\n\nIgnorování této skutečnosti může způsobit nežádoucí výsledky včetně nestability systému. Všechny aplikace, které by mohly používat hostitelský soubor/zařízení, by měly být před připojením svazku ukončeny.\n\nPokračovat v připojení?</entry>
|
||||
<entry lang="cs" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt byl nainstalován pomocí balíčku MSI, a proto jej nelze aktualizovat pomocí standardního instalátoru.\n\nPro aktualizaci instalace VeraCrypt, použijte balíček MSI.</entry>
|
||||
<entry lang="cs" key="IDC_USE_ALL_FREE_SPACE">Využít veškeré dostupné volné místo</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="da" name="Dansk" en-name="Danish" version="0.1.0" translators="Lasse Bond" />
|
||||
<font lang="da" class="normal" size="11" face="default" />
|
||||
<font lang="da" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,14 +1,12 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<!-- Sprachen -->
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="de" name="Deutsch" en-name="German" version="1.1.8" translators="Harry Haller, Alexander Schorg, Simon Frankenberger, David Arndt, H. Sauer, Dulla, Ettore Atalan, Matthias Kolja Miehl, Felix Reichmann" />
|
||||
<!-- Schriftarten -->
|
||||
<font lang="de" class="normal" size="11" face="default" />
|
||||
<font lang="de" class="bold" size="13" face="Arial" />
|
||||
<font lang="de" class="fixed" size="12" face="Lucida Console" />
|
||||
<font lang="de" class="title" size="21" face="Times New Roman" />
|
||||
<!-- Steuerelemente -->
|
||||
|
||||
<entry lang="de" key="IDCANCEL">Abbrechen</entry>
|
||||
<entry lang="de" key="IDC_ALL_USERS">Für &alle Benutzer installieren</entry>
|
||||
<entry lang="de" key="IDC_BROWSE">Su&chen ...</entry>
|
||||
@ -61,7 +59,7 @@
|
||||
<entry lang="de" key="IDC_OPEN_OUTER_VOLUME">Äußeres Volume öffnen</entry>
|
||||
<entry lang="de" key="IDC_PAUSE">&Pause</entry>
|
||||
<entry lang="de" key="IDC_PIM_ENABLE">P&IM verwenden</entry>
|
||||
<entry lang="de" key="IDC_NEW_PIM_ENABLE">PIM verwenden</entry>
|
||||
<entry lang="de" key="IDC_NEW_PIM_ENABLE">PIM modifizieren</entry>
|
||||
<entry lang="de" key="IDC_QUICKFORMAT">Schnell-Formatierung</entry>
|
||||
<entry lang="de" key="IDC_SHOW_PASSWORD">Passwort an&zeigen</entry>
|
||||
<entry lang="de" key="IDC_SHOW_PASSWORD_SINGLE">&Passwort anzeigen</entry>
|
||||
@ -73,7 +71,7 @@
|
||||
<entry lang="de" key="IDC_SYS_DEVICE">Systempartition bzw. Systemlaufwerk verschlüsseln</entry>
|
||||
<entry lang="de" key="IDC_SYS_PARTITION">Die Windows-Systempartition verschlüsseln</entry>
|
||||
<entry lang="de" key="IDC_WHOLE_SYS_DRIVE">Gesamtes Laufwerk verschlüsseln</entry>
|
||||
<entry lang="de" key="IDD_VOL_CREATION_WIZARD_DLG">Assistent zum Erstellen eines VeraCrypt-Volumes</entry>
|
||||
<entry lang="de" key="IDD_VOL_CREATION_WIZARD_DLG">VeraCrypt Assistent</entry>
|
||||
<entry lang="de" key="IDT_CLUSTER">Cluster </entry>
|
||||
<entry lang="de" key="IDT_COLLECTING_RANDOM_DATA_NOTE">WICHTIG: Bewegen Sie den Mauszeiger in diesem Fenster mindestens 30 Sekunden zufällig hin und her. Je länger Sie die Maus bewegen, desto besser ist die Verschlüsselung. Klicken Sie dann auf „Weiter“, um fortzufahren.</entry>
|
||||
<entry lang="de" key="IDT_CONFIRM">&Bestätigung:</entry>
|
||||
@ -99,7 +97,7 @@
|
||||
<entry lang="de" key="IDT_SINGLE_BOOT">Diese Option wählen, wenn sich nur ein Betriebssystem auf dem Computer befindet (auch bei mehreren Benutzern).</entry>
|
||||
<entry lang="de" key="IDT_SPEED">Geschw.</entry>
|
||||
<entry lang="de" key="IDT_STATUS">Status</entry>
|
||||
<entry lang="de" key="IDT_SYSENC_KEYS_GEN_INFO">Die Schlüssel, der Salt-Wert und andere Daten wurden erfolgreich erstellt. Wenn Sie neue Schlüssel erstellen möchten, klicken Sie auf „Zurück“ und dann auf „Weiter“. Ansonsten klicken Sie auf „Weiter“.</entry>
|
||||
<entry lang="de" key="IDT_SYSENC_KEYS_GEN_INFO">Die Schlüssel, der Salt-Wert und andere Daten wurden erfolgreich erstellt. Wenn Sie neue Schlüssel erstellen möchten, klicken Sie auf „Zurück“ und dann auf „Weiter“. Andernfalls klicken Sie auf „Weiter“.</entry>
|
||||
<entry lang="de" key="IDT_SYS_DEVICE">Partition/Laufwerk verschlüsseln, auf dem Windows installiert ist. Jeder, der Zugang zum System erlangen möchte, muss das korrekte Passwort bei jedem Start von Windows eingeben. Eine Alternative dazu ist das Erstellen eines versteckten Systems.</entry>
|
||||
<entry lang="de" key="IDT_SYS_PARTITION">Die Partition verschlüsseln, auf der das derzeit laufende Windows installiert ist.</entry>
|
||||
<entry lang="de" key="IDT_VOLUME_LABEL">Volume-Bezeichnung in Windows:</entry>
|
||||
@ -491,7 +489,7 @@
|
||||
<entry lang="de" key="DEVICE_TRANSFORM_MODE_PAGE_INPLACE_HELP">Die gesamte ausgewählte Partition und alle darauf gespeicherten Daten werden „in-place“ verschlüsselt. Wenn die Partition leer ist, dann sollten Sie die andere Option wählen (das Volume wird dann viel schneller erstellt).</entry>
|
||||
<entry lang="de" key="NOTE_BEGINNING">Hinweis: </entry>
|
||||
<entry lang="de" key="RESUME">&Weiter</entry>
|
||||
<entry lang="de" key="DEFER">&Später</entry>
|
||||
<entry lang="de" key="DEFER">&Abbrechen</entry>
|
||||
<entry lang="de" key="START">&Start</entry>
|
||||
<entry lang="de" key="CONTINUE">&Fortsetzen</entry>
|
||||
<entry lang="de" key="FORMAT">&Formatieren</entry>
|
||||
@ -1157,8 +1155,8 @@
|
||||
<entry lang="de" key="WINDOWS_BOOT_LOADER_HINTS">Wenn das aktuell ausgeführte Betriebssystem auf der Startpartition installiert ist, dann müssen Sie, nachdem Sie es verschlüsselt haben, immer das richtige Passwort eingeben, auch wenn Sie ein anderes unverschlüsseltes Windows-System starten möchten (da diese sich einen einzigen verschlüsselten Windows-Bootloader/Bootmanager teilen).\n\nWenn im Gegensatz dazu das derzeit laufende Betriebssystem nicht auf der Startpartition installiert ist (oder wenn der Windows-Bootloader/Bootmanager nicht von allen anderen Systemen verwendet wird), dann müssen Sie nicht das korrekte Passwort zum Starten der anderen unverschlüsselten Systeme eingeben, nachdem Sie dieses System verschlüsselt haben -- Sie müssen nur die Esc-Taste drücken, um das unverschlüsselte System zu starten (wenn es mehrere unverschlüsselte Systeme gibt, dann müssen Sie im VeraCrypt-Bootmanager wählen, welches der Systeme gestartet werden soll).\n(Hinweis: Normalerweise ist das erste installierte Windows-System auf der Startpartition installiert.)</entry>
|
||||
<entry lang="de" key="SYSENC_PRE_DRIVE_ANALYSIS_TITLE">Verschlüsselung des geschützten Bereichs des Hosts</entry>
|
||||
<entry lang="de" key="SYSENC_PRE_DRIVE_ANALYSIS_HELP">Am Ende vieler Laufwerke gibt es einen Bereich, der normalerweise vom Betriebssystem versteckt wird (solche Bereiche werden als host-geschützte Bereiche bezeichnet). Allerdings können manche Programme von/auf solche(n) Bereiche(n) lesen und schreiben.\n\nWARNUNG: Einige Computerhersteller verwenden möglicherweise solche Bereiche, um Werkzeuge und Daten für RAID, Systemwiederherstellung, Systeminstallation, Diagnose oder andere Zwecke zu speichern. Wenn solche Tools oder Daten vor dem Starten zugänglich sein müssen, dann sollte der versteckte Bereich nicht verschlüsselt werden (wählen Sie oben „Nein“).\n\nMöchten Sie, dass VeraCrypt einen solchen Bereich (falls vorhanden) am Ende des Systemlaufwerks ermittelt und verschlüsselt?</entry>
|
||||
<entry lang="de" key="SYSENC_TYPE_PAGE_TITLE">Art der Systemverschlüsselung</entry>
|
||||
<entry lang="de" key="SYSENC_NORMAL_TYPE_HELP">Nur die Systempartition oder das gesamte Systemlaufwerk verschlüsseln.</entry>
|
||||
<entry lang="de" key="SYSENC_TYPE_PAGE_TITLE">Verschlüssel Windows Laufwerk (%c:)</entry>
|
||||
<entry lang="de" key="SYSENC_NORMAL_TYPE_HELP">Wählen Sie diese Option, wenn Sie lediglich die Systempartition oder das gesamte Systemlaufwerk verschlüsseln möchten.</entry>
|
||||
<entry lang="de" key="SYSENC_HIDDEN_TYPE_HELP">Es kann vorkommen, dass Sie gezwungen werden, das Betriebssystem zu entschlüsseln. Es gibt viele Situationen (z. B. Erpressung), in denen Sie sich nicht weigern können. Bei Auswahl dieser Option erstellen Sie ein verstecktes Betriebssystem, dessen Existenz unmöglich zu beweisen sein sollte (wenn gewisse Richtlinien eingehalten werden). Daher müssen Sie das versteckte Betriebssystem nicht entschlüsseln oder das Passwort dafür herausgeben.</entry>
|
||||
<entry lang="de" key="HIDDEN_OS_PREINFO">Es kann vorkommen, dass Sie gezwungen werden, das Betriebssystem zu entschlüsseln. Es gibt viele Situationen (z. B. Erpressung), in denen Sie sich nicht weigern können, das Passwort herauszugeben.\n\nMit diesem Assistenten können Sie ein verstecktes Betriebssystem erstellen, dessen Existenz unmöglich zu beweisen ist (wenn bestimmte Richtlinien eingehalten werden). Daher müssen Sie das versteckte Betriebssystem nicht entschlüsseln oder das Passwort dafür herausgeben.</entry>
|
||||
<entry lang="de" key="SYSENC_HIDDEN_OS_REQ_CHECK_PAGE_TITLE">Verstecktes Betriebssystem</entry>
|
||||
@ -1186,9 +1184,9 @@
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_INFO2_PORTION_2">Vorgehensweise, wenn Windows nicht startet\n------------------------------------------------\n\nHinweis: Diese Anweisungen gelten nur, wenn Sie den Verschlüsselungsprozess noch nicht begonnen haben.\n\n- Wenn Windows nicht startet, nachdem Sie das korrekte Passwort eingegeben haben (oder wenn Sie wiederholt das korrekte Passwort eingeben, aber VeraCrypt sagt, dass es falsch ist), bleiben Sie ruhig. Starten Sie den Computer neu (Strom ausschalten und wieder anschalten) und drücken Sie nach dem Erscheinen des VeraCrypt-Ladebildschirms die Esc-Taste (und wählen Sie eines zum Starten aus, falls Sie mehrere Systeme haben). Windows sollte dann starten (wenn es nicht verschlüsselt ist) und VeraCrypt wird automatisch fragen, ob Sie die Pre-Boot-Authentifikation deinstallieren möchten. Bitte beachten Sie, dass die genannten Schritte NICHT funktionieren, wenn die Systempartition/das Systemlaufwerk verschlüsselt ist. Es ist unmöglich, ein verschlüsseltes Windows zu starten oder auf verschlüsselte Daten zuzugreifen, ohne das korrekte Passwort einzugeben, auch wenn die vorherigen Schritte befolgt werden.\n\n</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_INFO2_PORTION_3">- Wenn die vorherigen Schritte nicht helfen oder der VeraCrypt-Ladebildschirm vor dem Start von Windows nicht erscheint, legen Sie den VeraCrypt-Rettungsdatenträger in Ihr CD/DVD-Laufwerk ein und starten Sie Ihren Computer neu. Wenn der VeraCrypt-Rettungsdatenträger-Bildschirm nicht erscheint (oder wenn „Repair Options“ nicht im Abschnitt „Keyboard Controls“ des VeraCrypt-Rettungsdatenträger-Bildschirms verfügbar ist), ist Ihr BIOS wahrscheinlich so konfiguriert, dass es zuerst von Festplatte und dann von CD startet. In diesem Fall müssen Sie den Computer neu starten und die F2-Taste oder Entf-Taste drücken (sobald Sie einen BIOS-Startbildschirm sehen), bis der BIOS-Einstellungsbildschirm erscheint. Stellen Sie Ihr BIOS so ein, dass es zuerst von CD/DVD bootet (für genauere Informationen lesen Sie bitte in der Bedienungsanleitung Ihres BIOS/Motherboards nach oder kontaktieren Sie den Support Ihres Computerherstellers). Danach starten Sie Ihren Computer neu. Der VeraCrypt-Rettungsdatenträger-Bildschirm sollte jetzt erscheinen. Hier wählen Sie nun „Repair Options“, indem Sie die F8-Taste drücken. Aus dem Menü „Repair Options“ wählen Sie „Restore original system loader“. Entfernen Sie jetzt die Rettungs-CD aus dem CD/DVD-Laufwerk und starten Sie den Computer neu. Windows sollte jetzt normal starten (wenn es nicht verschlüsselt ist).\n\n</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_INFO2_PORTION_4">Bitte beachten Sie, dass die genannten Schritte NICHT funktionieren, wenn die Systempartition/das Systemlaufwerk verschlüsselt ist. Es ist unmöglich, ein verschlüsseltes Windows zu starten oder auf verschlüsselte Daten zuzugreifen, ohne das korrekte Passwort einzugeben, auch wenn die vorherigen Schritte befolgt wurden.\n\n\nBitte beachten Sie, dass es einem Angreifer unmöglich sein wird, die Systempartition ohne das korrekte Passwort zu entschlüsseln, selbst wenn er den VeraCrypt-Rettungsdatenträger findet.</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_RESULT_TITLE">Vortest abgeschlossen</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_RESULT_INFO">Der Vortest wurde erfolgreich abgeschlossen.\n\nWARNUNG: Wenn die Stromversorgung plötzlich unterbrochen wird, während vorhandene Daten „in-place“ verschlüsselt werden, oder wenn das Betriebssystem wegen eines Software- oder Hardwarefehlers abstürzt, während VeraCrypt vorhandene Daten „in-place“ verschlüsselt, dann werden Daten beschädigt oder gehen verloren. Stellen Sie daher bitte sicher, dass Sie Sicherungskopien von den Dateien haben, die Sie verschlüsseln möchten, bevor Sie mit dem Verschlüsseln beginnen. Wenn dies nicht der Fall ist, dann sichern Sie Ihre Dateien jetzt. Sie können auf „Später“ klicken, um die Dateien zu sichern, VeraCrypt jederzeit wieder starten und „System“ > „Unterbrochenen Prozess fortsetzen“ wählen, um die Verschlüsselung zu starten).\n\nWenn Sie fertig sind, klicken Sie auf „Verschlüsseln“, um zu beginnen.</entry>
|
||||
<entry lang="de" key="SYSENC_ENCRYPTION_PAGE_INFO">Sie können jederzeit „Pause“ oder „Später“ klicken, um den Ver- oder Entschlüsselungsprozess anzuhalten, diesen Assistenten verlassen, den Computer neu starten oder herunterfahren und den Prozess dann vom pausierten Punkt wieder aufnehmen. Um ein Verlangsamen des Computers zu verhindern, wenn das System oder ein Programm auf das Systemlaufwerk zugreifen, wartet VeraCrypt automatisch, bis die Daten geschrieben oder gelesen wurden (siehe Status oben), und fährt dann automatisch fort.</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_RESULT_TITLE">Vortest erfolgreich abgeschlossen</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_RESULT_INFO">Wenn die Verschlüsselung unterbrochen wird, können Sie sie wieder aufnehmen, indem Sie VeraCrypt neu starten und 'System' > 'Unterbrochenen Prozess fortsetzen' wählen. Bitte stellen Sie sicher, dass Ihr Gerät während des Verschlüsselungsprozesses aufgeladen ist.</entry>
|
||||
<entry lang="de" key="SYSENC_ENCRYPTION_PAGE_INFO">Vergewissern Sie sich, dass Ihr Gerät aufgeladen ist.\nWenn die Verschlüsselung unterbrochen wurde, können Sie sie wieder aufnehmen, indem Sie VeraCrypt neu starten und 'System' > 'Unterbrochenen Prozess fortsetzen' wählen.</entry>
|
||||
<entry lang="de" key="NONSYS_INPLACE_ENC_ENCRYPTION_PAGE_INFO">\nSie können jederzeit „Pause“ oder „Später“ klicken, um den Verschlüsselungsprozess zu unterbrechen, diesen Assistenten verlassen, den Computer neu starten oder herunterfahren und dann den Prozess wieder fortsetzen. Beachten Sie, dass das Volume nicht eingehängt werden kann, bis es vollständig verschlüsselt wurde.</entry>
|
||||
<entry lang="de" key="NONSYS_INPLACE_DEC_DECRYPTION_PAGE_INFO">\nSie können jederzeit „Pause“ oder „Später“ klicken, um den Entschlüsselungsprozess zu unterbrechen, diesen Assistenten verlassen, den Computer neu starten oder herunterfahren und dann den Prozess wieder fortsetzen. Es wird an dem Punkt fortgesetzt, an dem Sie gestoppt haben. Bitte beachten Sie, dass das Volume nicht eingehängt werden kann, bis es vollständig entschlüsselt wurde.</entry>
|
||||
<entry lang="de" key="SYSENC_HIDDEN_OS_INITIAL_INFO_TITLE">Verstecktes System gestartet</entry>
|
||||
@ -1403,7 +1401,7 @@
|
||||
<entry lang="de" key="TIME">Zeit</entry>
|
||||
<entry lang="de" key="ITERATIONS">Iterationen</entry>
|
||||
<entry lang="de" key="PRE-BOOT">Pre-Boot</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_EFI_INFO">Bevor Sie die Partition verschlüsseln können, müssen Sie einen VeraCrypt-Rettungsdatenträger (VRD) erstellen, der zu folgenden Zwecken dient:\n\n- Wenn der VeraCrypt-Bootloader, Hauptschlüssel oder andere kritische Daten beschädigt werden, ermöglicht der VRD Ihnen, sie wiederherzustellen (beachten Sie jedoch, dass Sie immer noch das richtige Passwort eingeben müssen).\n\n- Wenn Windows beschädigt wird und nicht gestartet werden kann, ermöglicht der VRD Ihnen, die Partition dauerhaft zu entschlüsseln, bevor Windows gestartet wird.\n\n- Der VRD wird eine Sicherung des derzeitigen EFI-Bootloaders enthalten und ermöglicht es Ihnen, ihn bei Bedarf wiederherzustellen.\n\nDas VeraCrypt-Rettungsdatenträger-ZIP-Abbild wird in der unten angegebenen Adresse erstellt.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_EFI_INFO">\n\nWenn Windows beschädigt wird und nicht mehr startet, können Sie mit dem VeraCrypt Rettungsdatenträger die Partition dauerhaft entschlüsseln. Bitte beachten Sie, dass Sie trotzdem das korrekte Passwort eingeben müssen.\n\n\nWARNUNG: Wenn Sie in der Vergangenheit bereits einen Rettungsdatenträger erstellt haben können Sie ihn nicht für diese Verschlüsselung verwenden! Jedes mal, wenn Sie Ihr Laufwerk verschlüsseln müssen Sie einen neuen Rettungsdatenträger erstellen und sicher aufbewahren. Dies gilt auch, wenn Sie das gleiche Passwort verwenden.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_EFI_EXTRACT_INFO">Das Rettungsdatenträger-ZIP-Abbild wurde erstellt und in dieser Datei gespeichert:\n%s\n\nJetzt müssen Sie es auf einen mit FAT-/FAT32-formatierten USB-Stick entpacken.\n\n%lsNachdem Sie den Rettungsdatenträger erstellt haben, klicken Sie auf „Weiter“, um zu bestätigen, dass er korrekt erstellt wurde.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_EFI_EXTRACT_INFO_NO_CHECK">Das Rettungsdatenträger-ZIP-Abbild wurde erstellt und in dieser Datei gespeichert\n%s\n\nJetzt sollten Sie es entweder auf einen mit FAT-/FAT32-formatierten USB-Stick entpacken oder an einen sicheren Ort für die spätere Verwendung verschieben.\n\n%ls„Weiter“ klicken, um fortzufahren.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_EFI_EXTRACT_INFO_NOTE">WICHTIG: Beachten Sie, dass die ZIP-Datei direkt in das Stammverzeichnis des USB-Sticks entpackt werden muss. Zum Beispiel, wenn der Laufwerksbuchstabe des USB-Sticks E: ist, sollte das Entpacken der ZIP-Datei einen Ordner E:\\EFI auf dem USB-Stick erstellen.\n\n</entry>
|
||||
@ -1570,6 +1568,54 @@
|
||||
<entry lang="de" key="VOLUME_HOST_IN_USE">WARNUNG: Die Datei/das Laufwerk {0} ist bereits in Verwendung!\n\nWenn Sie diese Warnung ignorieren, können nicht vorhersehbare Probleme einschließlich Systemabstürze auftreten. Alle Programme, die die Datei/das Laufwerk verwenden (z. B. Virenscanner oder Backup-Software), sollten geschlossen werden, bevor das Volume eingehängt wird.\n\nTrotzdem fortfahren?</entry>
|
||||
<entry lang="de" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt wurde zuvor mit einem MSI-Paket installiert und kann daher nicht mit dem Standard-Installationsprogramm aktualisiert werden.\n\nBitte verwenden Sie das MSI-Paket, um Ihre VeraCrypt-Installation zu aktualisieren.</entry>
|
||||
<entry lang="de" key="IDC_USE_ALL_FREE_SPACE">Gesamten verfügbaren freien Speicherplatz nutzen</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt kann nicht aktualisiert werden, weil die Systempartition/das Laufwerk mit einem Algorithmus verschlüsselt wurde, der nicht mehr unterstützt wird.\nBitte entschlüsseln Sie Ihr System vor dem Upgrade von VeraCrypt und verschlüsseln Sie es dann erneut.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_BACK_BUTTON">Der Rettungsdatenträger wurde bereits mit den gewählten Optionen erstellt. Um Inkompatibilitäten zu vermeiden, müssen Sie auf "Abbrechen" klicken und den Systemverschlüsselungsprozess neu starten, wenn Sie eine Konfiguration ändern möchten.</entry>
|
||||
<entry lang="de" key="AES_BOX_HELP">Laut dem National Institute of Standards and Technology (NIST) ist AES sicher</entry>
|
||||
<entry lang="de" key="BACKUP_RESCUE_DISK_TITLE">Sicherung des Rettungsdatenträgers</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_CHECKLIST_A">Bewahren Sie Ihr Passwort an einem sicheren Ort auf. Ohne Ihr Passwort können Sie Ihre Daten nicht wiederherstellen.\nDeshalb gilt VeraCrypt als sicher.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_CHECKLIST_B">Stellen Sie sicher, dass die Rettungsdatei auf einem externen Medium gespeichert ist. Dies kann ein Flash-Laufwerk, eine externe Festplatte oder sogar ein Cloud-Speicher sein.\nDie Rettungsdatei befindet sich hier:</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_CHECKLIST_C">Bevor Sie mit der Verschlüsselung Ihres Systems beginnen, ist es immer eine gute Idee, Ihre persönlichen Daten auf einem externen Laufwerk zu sichern, für den unwahrscheinlichen Fall, dass der Verschlüsselungsprozess fehlschlägt.</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_INFO_2">Das VeraCrypt Rettungs-ZIP-Image wird erstellt, indem Sie auf die Schaltfläche Next (Weiter) an dem unten angegebenen Ort klicken.</entry>
|
||||
<entry lang="de" key="REMEMBER_PASSWORD"> Ich erinnere mich an mein Passwort</entry>
|
||||
<entry lang="de" key="STORE_RESCUE_DISK"> Ich habe meine Rettungsdatei gespeichert</entry>
|
||||
<entry lang="de" key="BACKUP_DATA"> Ich habe darüber nachgedacht, ein Backup meiner persönlichen Daten zu machen.</entry>
|
||||
<entry lang="de" key="CHECKLIST_TITLE">Checkliste - Bevor Sie auf 'Weiter' klicken</entry>
|
||||
<entry lang="de" key="SYS_ENCRYPTION_PRETEST_INFO">Es müssen nun einige Tests durchgeführt werden, um zu überprüfen, ob alles korrekt funktioniert.\n\nFür diese Tests muss Ihr Computer neu gestartet werden. Dann müssen Sie Ihr Passwort in den VeraCrypt Boot Loader Bildschirm eingeben, der vor dem Start von Windows erscheint. Nach dem Start von Windows wird VeraCrypt automatisch gestartet und Sie werden über das Ergebnis dieses Vortests informiert.\n\n\nDas folgende Gerät wird geändert: Laufwerk %c:</entry>
|
||||
<entry lang="de" key="SYSENC_DECRYPTION_PAGE_INFO">Vergewissern Sie sich, dass Ihr Gerät aufgeladen ist.\nWenn die Verschlüsselung unterbrochen wurde, können Sie sie wieder aufnehmen, indem Sie VeraCrypt neu starten und 'System' > 'Unterbrochenen Prozess fortsetzen' wählen.</entry>
|
||||
<entry lang="de" key="ADVANCED_FEATURES">Erweiterte Funktionen</entry>
|
||||
<entry lang="de" key="VERY_WEAK_PASSWORD">sehr schwach</entry>
|
||||
<entry lang="de" key="WEAK_PASSWORD">schwach</entry>
|
||||
<entry lang="de" key="MEDIUM_PASSWORD">medium</entry>
|
||||
<entry lang="de" key="STRONG_PASSWORD">stark</entry>
|
||||
<entry lang="de" key="VERY_STRONG_PASSWORD">sehr stark</entry>
|
||||
<entry lang="de" key="IDT_PASSWORD_STRENGTH">Passwordstärke:</entry>
|
||||
<entry lang="de" key="PASSWORD_HELP_SYSENC">Sie sollten darüber nachdenken das Passwort an einem sicheren Ort zu notieren. </entry>
|
||||
<entry lang="de" key="AES_HELP_NEW">AES ist nach Ansicht des National Institute of Standards and Technology (NIST) und der Datenschutz- und Sicherheitsforschungsgemeinschaft sicher.</entry>
|
||||
<entry lang="de" key="SHA512_HELP">SHA-512 ist nach Angaben des National Institute of Standards and Technology (NIST) und der Datenschutz- und Sicherheitsforschungsgemeinschaft sicher.</entry>
|
||||
<entry lang="de" key="CHOOSE_PASSWORD_TITLE">Passwort wählen</entry>
|
||||
<entry lang="de" key="TRANSLATED_PWD_NOT_WRITTEN">Warnung: Beim Schreiben des übersetzten Passworts ist ein Fehler aufgetreten! Bitte versuchen Sie es erneut. Wenn dieser Fehler erneut auftritt, ändern Sie das Tastaturlayout manuell in das US-Tastaturlayout.</entry>
|
||||
<entry lang="de" key="ERROR_TRANSLATE_PWD">Warnung: Beim Übersetzen des Passworts ist ein Fehler aufgetreten!\nBitte geben Sie das Passwort erneut ein und versuchen Sie es. Wenn dieser Fehler erneut auftritt, schalten Sie das Tastaturlayout manuell auf das US-Tastaturlayout um.</entry>
|
||||
<entry lang="de" key="ERROR_KEYB_LAYOUT_NOT_LOADED">Ihr System unterstützt nicht das Standard-US-Keyboard-Layout. Bitte stellen Sie sicher, dass das Layout verfügbar ist. Für weitere Hilfe besuchen Sie bitte: https://support.microsoft.com/en-us/windows/manage-the-input-and-display-language-settings-in-windows-10-12a10cb4-8626-9b77-0ccb-5013e0c7c7a2 </entry>
|
||||
<entry lang="de" key="ERROR_PASTE_ACTION">Das Einfügen von Text ist deaktiviert. Bitte geben Sie Ihr Passwort ein.</entry>
|
||||
<entry lang="de" key="WARNING_PASSWORD_NOT_IDENTICAL">Passwörter sind nicht identisch! Bitte geben Sie in beide Felder identische Passwörter ein!</entry>
|
||||
<entry lang="de" key="SYSENC_INFO">Dieser Assistent hilft Ihnen, Ihr Laufwerk (%c:) zu verschlüsseln</entry>
|
||||
<entry lang="de" key="SYSENC_INFO_2">Ein Windows-Kennwort kann von böswilligen Personen, die physischen Zugang zu Ihrem Gerät haben, leicht umgangen werden. Laufwerksverschlüsselung hilft, Ihre Daten vor dem Zugriff böswilligen Akteuren zu schützen. VeraCrypt Laufwerksverschlüsselung hält sie fern, indem es Ihre Daten mit einem zusätzlichen Passwort schützt. </entry>
|
||||
<entry lang="de" key="ADV_FEATURES_INTRO_TOOLTIP">Aktivieren Sie hier das versteckte Betriebssystem.</entry>
|
||||
<entry lang="de" key="ADV_FEATURES_NOTE">Die meisten Experten sind sich einig, dass die folgenden vorgewählten Optionen sicher sind. Ändern Sie sie nur, wenn Sie wissen, was Sie tun. </entry>
|
||||
<entry lang="de" key="PIM_INFO">Mit dem persönlichen Iterationsmultiplikator (PIM) können Sie die Anzahl der Passwort-Hash-Wiederholungen festlegen. Dies bietet mehr Flexibilität bei der Anpassung der gewünschten Sicherheitsstufe und steuert gleichzeitig die Geschwindigkeit des Einhänge-/Bootvorgangs.</entry>
|
||||
<entry lang="de" key="WIPE_INFO">Überschreibt Ihre Daten vor der Verschlüsselung. Dies verhindert eine mögliche Datenwiederherstellung. Das Löschen ist unter normalen Umständen nicht erforderlich.</entry>
|
||||
<entry lang="de" key="PRETEST_INFO">Vor der Verschlüsselung prüft VeraCrypt, ob alles richtig funktioniert. \n\nVeraCrypt führt einige Tests durch, startet Ihren Computer neu und Sie müssen Ihr Passwort eingeben, bevor Windows startet.</entry>
|
||||
<entry lang="de" key="PRETEST_CANCEL">Wenn Sie jetzt auf Abbrechen klicken, werden keine Änderungen an Ihrem System vorgenommen.</entry>
|
||||
<entry lang="de" key="ERROR_GETTING_PATH">Beim Abrufen des Pfads zur ausführbaren Datei ist ein Fehler aufgetreten.</entry>
|
||||
<entry lang="de" key="ERROR_GETTING_PWD">Beim Abrufen des Passworts ist ein Fehler aufgetreten. Bitte versuchen Sie es erneut.</entry>
|
||||
<entry lang="de" key="ERROR_GETTING_KEYB_STATE">Beim Abrufen des Tastaturstatus ist ein Fehler aufgetreten.</entry>
|
||||
<entry lang="de" key="ERR_NO_TRANSLATION">Für die Taste, die Sie gedrückt haben, gibt es keine Übersetzung!</entry>
|
||||
<entry lang="de" key="DEAD_KEY_SUPPORT">Tote Tasten reproduzieren in diesem Fall keine toten Zeichen, da Ihr Passwort in das US-Tastaturlayout übersetzt werden muss, damit Sie Ihr Passwort in der Pre-Boot-Umgebung eingeben können.</entry>
|
||||
<entry lang="de" key="PRETEST_CHECKBOX"> Ich habe dafür gesorgt, dass meinem Gerät während des Verschlüsselungsvorgangs nicht der Strom ausgeht.</entry>
|
||||
<entry lang="de" key="OPEN_PATH_CHECKLIST_PAGE">Pfad öffnen</entry>
|
||||
<entry lang="de" key="RESCUE_DISK_PATH">Pfad des Rettungsdatenträgers</entry>
|
||||
<entry lang="de" key="PRETEST_BACK_BUTTON">Wenn Sie den Verschlüsselungsassistenten abbrechen möchten, klicken Sie bitte auf Abbrechen. In diesem Fall werden keine Änderungen an Ihrem Computer vorgenommen.</entry>
|
||||
<entry lang="de" key="WIPE_WARNING">Der Löschvorgang kann sehr lange dauern (bis zu Stunden). Das Löschen wird nicht empfohlen, wenn Sie ein SSD-Laufwerk haben.</entry>
|
||||
</localization>
|
||||
<!-- XML-Schema -->
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="el" name="Ελληνικά" en-name="Greek" version="0.1.0" translators="Βασίλης Κοσμίδης" />
|
||||
<font lang="el" class="normal" size="11" face="default" />
|
||||
<font lang="el" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="es" name="Español" en-name="Spanish" version="1.0.0" translators="Juan Antonio Auñón Ochando" />
|
||||
<font lang="es" class="normal" size="11" face="default" />
|
||||
<font lang="es" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="et" name="Eesti" en-name="Estonian" version="0.1.0" translators="Maiko Mõtsar" />
|
||||
<font lang="et" class="normal" size="11" face="vaikimisi" />
|
||||
<font lang="et" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="eu" name="Euskara" en-name="Basque" version="1.0.0" translators="Ander Genua" />
|
||||
<font lang="eu" class="normal" size="11" face="default" />
|
||||
<font lang="eu" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="fa" name="فارسي" en-name="Persian" version="0.1.0" translators="Ali Bitazar, Rodabeh Sarmadi" />
|
||||
<font lang="fa" class="normal" size="11" face="default" />
|
||||
<font lang="fa" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="fi" name="Suomi" en-name="Finnish" version="0.3.0" translators="Matti Ruhanen" />
|
||||
<font lang="fi" class="normal" size="11" face="default" />
|
||||
<font lang="fi" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="fr" name="Français" en-name="French" version="0.3.0" translators="Stéphane S., Olivier M., Thierry T" />
|
||||
<font lang="fr" class="normal" size="11" face="default" />
|
||||
<font lang="fr" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="fr" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt a déjà été installé à l'aide d'un package MSI et de ce fait il ne peut pas être mis à jour à l'aide du programme d'installation standard.\n\nVeuillez utiliser le package MSI pour mettre à jour votre installation VeraCrypt.</entry>
|
||||
<entry lang="fr" key="IDC_USE_ALL_FREE_SPACE">Utiliser la totalité de l'espace libre sur le disque</entry>
|
||||
<entry lang="fr" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt ne peut pas être mis à niveau car votre partition/disque système a été chiffré à l'aide d'un algorithme qui n'est plus pris en charge.\nVeuillez déchiffrer votre système avant de mettre à niveau VeraCrypt, puis chiffrez-le à nouveau. </entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<localization prog-version="1.25.9">
|
||||
<localization prog-version="1.26">
|
||||
<language langid="he" name="עברית" en-name="Hebrew" version="0.1.0" translators="thewh1teagle" />
|
||||
<font lang="he" class="normal" size="11" face="default" />
|
||||
<font lang="he" class="bold" size="13" face="Arial" />
|
||||
@ -1568,6 +1568,7 @@
|
||||
<entry lang="he" key="VOLUME_HOST_IN_USE">אזהרה: הקובץ / ההתקן המארח {0} כבר נמצא בשימוש! \n \n התעלמות מכך עלולה לגרום לתוצאות לא רצויות כולל חוסר יציבות במערכת.יש לסגור את כל היישומים שעשויים להשתמש בקובץ המארח / בהתקן לפני התקנת אמצעי האחסון. \n \n האם להמשיך בטעינה?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="hu" name="Magyar" en-name="Hungarian" version="1.0.0" translators="Nyul Balazs > Szaki, Zityi's Translator Te@m" />
|
||||
<font lang="hu" class="normal" size="11" face="default" />
|
||||
<font lang="hu" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="hu" key="VOLUME_HOST_IN_USE">FIGYELEM: A(z) {0} gazdafájl/eszköz már használatban van!\n\nEnnek figyelmen kívül hagyása nemkívánatos eredményekhez vezethet, beleértve a rendszer instabilitását is.\nA kötet csatolása előtt minden olyan alkalmazást le kell állítani, amely a gazdafájlt/eszközt használja.\nFolytatja a csatolást?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="id" name="Bahasa Indonesia" en-name="Indonesian" version="1.0.0" translators="Tajuddin N. F.; Transifex contributors" />
|
||||
<font lang="id" class="normal" size="11" face="default" />
|
||||
<font lang="id" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="id" key="VOLUME_HOST_IN_USE">PERINGATAN: File / perangkat host {0} sudah digunakan! \n\nIgnoring ini dapat menyebabkan hasil yang tidak diinginkan termasuk ketidakstabilan sistem. Semua aplikasi yang mungkin menggunakan file / perangkat host harus ditutup sebelum memasang volume.</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="it" name="Italiano" en-name="Italian" version="1.0.1" translators="Maurizio Ballo, Consiglio Gaetano" />
|
||||
<font lang="it" class="normal" size="11" face="default" />
|
||||
<font lang="it" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="it" key="VOLUME_HOST_IN_USE">ATTENZIONE: il file/dispositivo host {0} è già in uso!\n\nIgnorarlo può causare risultati indesiderati inclusa l'instabilità del sistema.\nTutte le applicazioni che potrebbero usare il file/dispositivo host devono essere chiuse prima di montare il volume.\n\nVuoi continuare il montaggio?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="ja" name="日本語" en-name="Japanese" version="1.1.0" translators="OGOSHI Masayuki, Transifex contributors" />
|
||||
<font lang="ja" class="normal" size="12" face="MS UI Gothic" />
|
||||
<font lang="ja" class="bold" size="16" face="MS UI Gothic" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="ka" name="ქართული" en-name="Georgian" version="0.1.0" translators="Kakha Lomiashvili" />
|
||||
<font lang="ka" class="normal" size="12" face="Arial" />
|
||||
<font lang="ka" class="bold" size="12" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="ko" name="한국어" en-name="Korean" version="0.1.1" translators="Kieaer, Herbert Shin" />
|
||||
<font lang="ko" class="normal" size="11" face="돋움" />
|
||||
<font lang="ko" class="bold" size="13" face="맑은 고딕" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="ko" key="VOLUME_HOST_IN_USE">경고: 호스트 파일 및 장치 {0}이 이미 사용 중입니다!\n\n이 것을 무시하면 시스템 불안정을 포함한 원치 않은 결과를 불러일으킬 수 있습니다. 호스트 파일 혹은 장치를 사용하는 모든 애플리케이션은 볼륨을 마운트하기 전에 종료되어야 합니다.\n\n계속 마운트하시겠습니까?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="lv" name="Latviešu" en-name="Latvian" version="0.1.0" translators="Edmunds Melkers" />
|
||||
<font lang="lv" class="normal" size="11" face="default" />
|
||||
<font lang="lv" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="my" name="မြန်မာ" en-name="Burmese" version="2.0.0" translators="Zaw Myo Htet; Transifex contributors" />
|
||||
<font lang="my" class="normal" size="11" face="Myanmar3" />
|
||||
<font lang="my" class="bold" size="13" face="Myanmar3" />
|
||||
@ -1569,6 +1569,7 @@
|
||||
<entry lang="my" key="VOLUME_HOST_IN_USE">သတိပေးချက် - Host ဖိုင်/device {0} ကို အသုံးပြုထားပြီးဖြစ်သည်။\n\n ဤအချက်ကို လျစ်လျူရှုခြင်းအားဖြင့် ကွန်ပျူတာစနစ် မတည်ငြိမ်မှု စသော မလိုလားအပ်သည့် ရလဒ်များ ဖြစ်ပေါ်စေနိုင်သည်။ Volume ကို အစမပျိုးခင် host ဖိုင်/device ကို သုံးစွဲနေသည့် အက်ပလီကေးရှင်း အားလုံးကို ပိတ်ထားရမည်။\n\n ဆက်လက် အစပျိုးမလား။</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" attributeFormDefault="unqualified" elementFormDefault="qualified">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="nl" name="Nederlands" en-name="Dutch" version="0.0.0" translators="Jan van der Wal, Peter Tak, Thomas De Rocker"/>
|
||||
|
||||
<font lang="nl" class="normal" size="11" face="default"/>
|
||||
@ -1577,6 +1577,7 @@ Merk op dat VeraCrypt in dit geval niet de exacte maximaal toegestane grootte vo
|
||||
<entry lang="nl" key="VOLUME_HOST_IN_USE">WAARSCHUWING: hostbestand/apparaat {0} is al in gebruik!\n\nHet negeren hiervan kan ongewenste resultaten veroorzaken, waaronder systeeminstabiliteit. Alle toepassingen die het hostbestand/apparaat gebruiken moeten worden gesloten voordat het volume wordt gekoppeld.\n\nDoorgaan met koppelen?</entry>
|
||||
<entry lang="nl" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt werd eerder geïnstalleerd met een MSI-pakket en kan dus niet worden bijgewerkt met het standaardinstallatieprogramma. Gebruik het MSI-pakket om uw VeraCrypt-installatie bij te werken.</entry>
|
||||
<entry lang="nl" key="IDC_USE_ALL_FREE_SPACE">Alle beschikbare vrije ruimte gebruiken</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" attributeFormDefault="unqualified" elementFormDefault="qualified">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="nn" name="Norsk Nynorsk" en-name="Norwegian (Nynorsk)" version="0.1.0" translators="Kjell Rune Helland" />
|
||||
<font lang="nn" class="normal" size="11" face="default" />
|
||||
<font lang="nn" class="bold" size="13" face="Arial " />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="pl" name="Polski" en-name="Polish" version="1.0.0" translators="Mirek Druchowicz, Janusz Zamecki, Sobiesław Antolak, Begina Felicysym" />
|
||||
<font lang="pl" class="normal" size="11" face="default" />
|
||||
<font lang="pl" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="pl" key="VOLUME_HOST_IN_USE">OSTRZEŻENIE: Plik/urządzenie {0} jest już używane!\n\nZignorowanie tego może spowodować niepożądane skutki, w tym niestabilność systemu. Wszystkie aplikacje, które mogą korzystać z pliku/urządzenia, powinny zostać zamknięte przed podłączeniem wolumenu.\n\nKontynuować podłączanie?</entry>
|
||||
<entry lang="pl" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt zainstalowano wcześniej przy użyciu pakietu MSI, więc nie można dokonać aktualizacji za pomocą standardowego instalatora.\n\nUżyj pakietu MSI, aby zaktualizować swoją instalację VeraCrypt.</entry>
|
||||
<entry lang="pl" key="IDC_USE_ALL_FREE_SPACE">Wykorzystaj całą dostępną wolną przestrzeń</entry>
|
||||
<entry lang="pl" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">Nie można zaktualizować VeraCrypt, ponieważ partycję/dysk systemowy zaszyfrowano przy użyciu algorytmu, który nie jest już obsługiwany.\nProszę odszyfrować system przed aktualizacją VeraCrypt, a następnie zaszyfrować go ponownie.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="pt-br" name="Português-Brasil" en-name="Portuguese (Brazil)" version="0.2.0" translators="Thiago C. L. Mendes, Lecidio S. Alencar , Lucas C. Ferreira, Transifex contributors" />
|
||||
<font lang="pt-br" class="normal" size="11" face="padrão" />
|
||||
<font lang="pt-br" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="ro" name="Română" en-name="Romanian" version="1.0.0" translators="Barna Cosmin Marian" />
|
||||
<font lang="ro" class="normal" size="11" face="default" />
|
||||
<font lang="ro" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="sk" name="Slovenčina" en-name="Slovak" version="0.1.0" translators="Kamil David" />
|
||||
<font lang="sk" class="normal" size="11" face="default" />
|
||||
<font lang="sk" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="sl" name="Slovenščina" en-name="Slovenian" version="0.1.0" translators="Erik David Salam" />
|
||||
<font lang="sl" class="normal" size="11" face="default" />
|
||||
<font lang="sl" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="sv" name="Svenska" en-name="Swedish" version="1.0.0" translators="Peter Runesson" />
|
||||
<font lang="sv" class="normal" size="11" face="default" />
|
||||
<font lang="sv" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="th" name="ภาษาไทย" en-name="Thai" version="0.0.0" translators=""/>
|
||||
<font lang="th" class="normal" size="11" face="default" />
|
||||
<font lang="th" class="bold" size="13" face="Arial" />
|
||||
@ -1568,6 +1568,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="tr" name="Türkçe" en-name="Turkish" version="1.25.7" translators="FabSec; By Fabriel, Ali İskender Turan, Zeynel Abidin Öztürk, Mehmet Keçeci" />
|
||||
<font lang="tr" class="normal" size="11" face="default" />
|
||||
<font lang="tr" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="tr" key="VOLUME_HOST_IN_USE">UYARI: {0} ana bilgisayar dosyası/cihazı zaten kullanımda!\n\nBunu dikkate almamak, sistem kararsızlığı dahil olmak üzere istenmeyen sonuçlara neden olabilir. Ana bilgisayar dosyasını/cihazı kullanıyor olabilecek tüm uygulamalar, birimi monte etmeden önce kapatılmalıdır.\n\nMontaj devam edilsin mi?</entry>
|
||||
<entry lang="tr" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt daha önce bir MSI paketi kullanılarak kurulmuştu ve bu nedenle standart yükleyici kullanılarak güncellenemez.\n\nVeraCrypt kurulumunuzu güncellemek için lütfen MSI paketini kullanın..</entry>
|
||||
<entry lang="tr" key="IDC_USE_ALL_FREE_SPACE">Mevcut tüm boş alanı kullan</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="uk" name="Українська" en-name="Ukrainian" version="1.0.0" translators="Kravchuk Olexandr, Babchuk Volodymyr" />
|
||||
<font lang="uk" class="normal" size="11" face="default" />
|
||||
<font lang="uk" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="uz" name="Ўзбекча" en-name="Uzbek (Cyrillic)" version="0.1.0" translators="Abdurauf Azizov, Dmitry Yerokhin" />
|
||||
<font lang="uz" class="normal" size="11" face="default" />
|
||||
<font lang="uz" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="vi" name="Tiếng Việt" en-name="Vietnamese" version="0.1.0" translators="Nguyễn Kim Huy" />
|
||||
<font lang="vi" class="normal" size="11" face="default" />
|
||||
<font lang="vi" class="bold" size="13" face="Arial" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="zh-cn" name="简体中文" en-name="Chinese (Simplified)" version="1.0.1" translators="Barney Li, Zhangjintao, Nkh0472" />
|
||||
<font lang="zh-cn" class="normal" size="11" face="Tahoma" />
|
||||
<font lang="zh-cn" class="bold" size="14" face="Tahoma" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="zh-cn" key="VOLUME_HOST_IN_USE">警告:宿主文件/设备 {0} 已在使用中!\n\n忽略此提示可能会导致意外结果,包括系统不稳定。在装载卷之前,应关闭可能正在使用宿主文件/设备的所有应用程序。\n\n是否继续装载?</entry>
|
||||
<entry lang="zh-cn" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt 此前通过MSI包进行了安装,因此其无法再通过独立安装包进行更新。\n\n请通过MSI包更新您的 VeraCrypt 程序。</entry>
|
||||
<entry lang="zh-cn" key="IDC_USE_ALL_FREE_SPACE">使用所有空闲空间。</entry>
|
||||
<entry lang="zh-cn" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt无法升级,因为系统分区/驱动器使用了将不再支持的算法进行加密。\n请在升级VeraCrypt之前解密系统,然后再次加密。</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="zh-hk" name="繁體中文(香港)" en-name="Chinese (Hong Kong)" version="0.1.0" translators="PUN Chi Ho, Yeung Tim Ming" />
|
||||
<font lang="zh-hk" class="normal" size="12" face="Microsoft JhengHei UI" />
|
||||
<font lang="zh-hk" class="bold" size="13" face="Microsoft JhengHei UI Bold" />
|
||||
@ -1425,7 +1425,7 @@
|
||||
<entry lang="zh-hk" key="PASSWORD_MAXLENGTH_REACHED">密碼長度已經達到上限的 %d 字元。\n無法接受更多的字元。</entry>
|
||||
<entry lang="zh-hk" key="IDC_SELECT_LANGUAGE_LABEL">選擇安裝時使用的語言:</entry>
|
||||
<entry lang="zh-hk" key="VOLUME_TOO_LARGE_FOR_HOST">錯誤:容器檔案的大小大於磁碟的可用空間。</entry>
|
||||
<entry lang="zh-hk" key="IDC_ALLOW_WINDOWS_DEFRAG">容許 Windows 磁碟重組工具重組非系統分割區/磁碟機</entry>
|
||||
<entry lang="zh-hk" key="IDC_ALLOW_WINDOWS_DEFRAG">容許 Windows 磁碟重組工具重組非系統分割區/磁碟機</entry>
|
||||
<entry lang="zh-hk" key="CONFIRM_ALLOW_WINDOWS_DEFRAG">警告: 磁碟重組非系統分割區/磁碟機可能會洩漏關於其內容的 Metadata 或令其可能內含的隱蔽加密區出現問題。\n\n還要繼續嗎?</entry>
|
||||
<entry lang="zh-hk" key="VIRTUAL_DEVICE">虛擬裝置</entry>
|
||||
<entry lang="zh-hk" key="MOUNTED_VOLUME_NOT_ASSOCIATED">所選取的已掛載磁碟區在 Windows 與其磁碟機代號並沒有進行關聯,故無法使用 Windows 檔案瀏覽器開啟。</entry>
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="zh-hk" key="VOLUME_HOST_IN_USE">警告: 在本機上的檔案/裝置 {0} 已在使用中!\n\n如果忽略的話會引致不良的後果,包括系統不穩定。請務必關閉所有可能正在使用在本機上的檔案/裝置的應用程式。\n\n要繼續掛載嗎?</entry>
|
||||
<entry lang="zh-hk" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt 之前是使用 MSI 封包進行安裝因此無法使用標準安裝程式進行更新。\n\n請使用 MSI 封包來更新您的 VeraCrypt 安裝。</entry>
|
||||
<entry lang="zh-hk" key="IDC_USE_ALL_FREE_SPACE">使用所有可用的空間</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -1,6 +1,6 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<VeraCrypt>
|
||||
<localization prog-version= "1.25.9">
|
||||
<localization prog-version= "1.26">
|
||||
<language langid="zh-tw" name="繁體中文" en-name="Chinese (Taiwan)" version="0.1.0" translators="Barney Li, Simon Ma, ChangMing Hsu" />
|
||||
<font lang="zh-tw" class="normal" size="12" face="MingLiU" />
|
||||
<font lang="zh-tw" class="bold" size="15" face="MingLiU" />
|
||||
@ -1567,6 +1567,7 @@
|
||||
<entry lang="en" key="VOLUME_HOST_IN_USE">WARNING: The host file/device {0} is already in use!\n\nIgnoring this can cause undesired results including system instability. All applications that might be using the host file/device should be closed before mounting the volume.\n\nContinue mounting?</entry>
|
||||
<entry lang="en" key="CANT_INSTALL_WITH_EXE_OVER_MSI">VeraCrypt was previously installed using an MSI package and so it can't be updated using the standard installer.\n\nPlease use the MSI package to update your VeraCrypt installation.</entry>
|
||||
<entry lang="en" key="IDC_USE_ALL_FREE_SPACE">Use all available free space</entry>
|
||||
<entry lang="en" key="SYS_ENCRYPTION_UPGRADE_UNSUPPORTED_ALGORITHM">VeraCrypt cannot be upgraded because the system partition/drive was encrypted using an algorithm that is not supported anymore.\nPlease decrypt your system before upgrading VeraCrypt and then encrypt it again.</entry>
|
||||
</localization>
|
||||
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
|
||||
<xs:element name="VeraCrypt">
|
||||
|
@ -175,8 +175,8 @@
|
||||
</OBJECT>
|
||||
<UL>
|
||||
<LI> <OBJECT type="text/sitemap">
|
||||
<param name="Name" value="RIPEMD-160">
|
||||
<param name="Local" value="RIPEMD-160.html">
|
||||
<param name="Name" value="BLAKE2s-256">
|
||||
<param name="Local" value="BLAKE2s-256.html">
|
||||
</OBJECT>
|
||||
<LI> <OBJECT type="text/sitemap">
|
||||
<param name="Name" value="SHA-256">
|
||||
|
@ -44,6 +44,7 @@ Beginner's Tutorial_Image_022.jpg
|
||||
Beginner's Tutorial_Image_023.gif
|
||||
Beginner's Tutorial_Image_024.gif
|
||||
Beginner's Tutorial_Image_034.png
|
||||
BLAKE2s-256.html
|
||||
Camellia.html
|
||||
Cascades.html
|
||||
Changing Passwords and Keyfiles.html
|
||||
@ -141,7 +142,6 @@ References.html
|
||||
Release Notes.html
|
||||
Removable Medium Volume.html
|
||||
Removing Encryption.html
|
||||
RIPEMD-160.html
|
||||
Security Model.html
|
||||
Security Requirements and Precautions.html
|
||||
Security Requirements for Hidden Volumes.html
|
||||
|
@ -31,15 +31,21 @@
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Hash%20Algorithms.html">Hash Algorithms</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="RIPEMD-160.html">RIPEMD-160</a>
|
||||
<a href="BLAKE2s-256.html">BLAKE2s-256</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<h1>RIPEMD-160</h1>
|
||||
<h1>BLAKE2s-256</h1>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
RIPEMD-160, published in 1996, is a hash algorithm designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel in an open academic community. The size of the output of RIPEMD-160 is 160 bits. RIPEMD-160 is a strengthened version of the RIPEMD hash algorithm
|
||||
that was developed in the framework of the European Union's project RIPE (<em style="text-align:left">RACE Integrity Primitives Evaluation</em>), 1988-1992. RIPEMD-160 was adopted by the International Organization for Standardization (ISO) and the IEC in the
|
||||
ISO/IEC 10118-3:2004 international standard [21].</div>
|
||||
<p>
|
||||
BLAKE2 is a cryptographic hash function based on BLAKE, created by Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein. It was announced on December 21, 2012. The design goal was to replace the widely used, but broken, MD5 and SHA-1 algorithms in applications requiring high performance in software. BLAKE2 provides better security than SHA-2 and similar to that of SHA-3 (e.g. immunity to length extension, indifferentiability from a random oracle, etc...).<br/>
|
||||
BLAKE2 removes addition of constants to message words from BLAKE round function, changes two rotation constants, simplifies padding, adds parameter block that is XOR'ed with initialization vectors, and reduces the number of rounds from 16 to 12 for BLAKE2b (successor of BLAKE-512), and from 14 to 10 for BLAKE2s (successor of BLAKE-256).<br/>
|
||||
BLAKE2b and BLAKE2s are specified in RFC 7693.
|
||||
</p>
|
||||
<p>
|
||||
VeraCrypt uses only BLAKE2s with its maximum output size of 32-bytes (256 bits).
|
||||
</p>
|
||||
</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<a href="SHA-256.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></div>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
@ -49,7 +49,7 @@ <h1>Command Line Usage</h1>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><em>/hash</em></td>
|
||||
<td>It must be followed by a parameter indicating the PRF hash algorithm to use when mounting the volume. Possible values for /hash parameter are: sha256, sha-256, sha512, sha-512, whirlpool, ripemd160 and ripemd-160. When /hash is omitted, VeraCrypt will try
|
||||
<td>It must be followed by a parameter indicating the PRF hash algorithm to use when mounting the volume. Possible values for /hash parameter are: sha256, sha-256, sha512, sha-512, whirlpool, blake2s and blake2s-256. When /hash is omitted, VeraCrypt will try
|
||||
all possible PRF algorithms thus lengthening the mount operation time.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
@ -306,9 +306,9 @@ <h4>VeraCrypt Format.exe (VeraCrypt Volume Creation Wizard):</h4>
|
||||
</tbody>
|
||||
</table>
|
||||
<h4>Syntax</h4>
|
||||
<p>VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |ripemd160|ripemd-160}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts|noattach}]
|
||||
<p>VeraCrypt.exe [/tc] [/hash {sha256|sha-256|sha512|sha-512|whirlpool |blake2s|blake2s-256}][/a [devices|favorites]] [/b] [/c [y|n|f]] [/d [drive letter]] [/e] [/f] [/h [y|n]] [/k keyfile or search path] [tryemptypass [y|n]] [/l drive letter] [/m {bk|rm|recovery|ro|sm|ts|noattach}]
|
||||
[/p password] [/pim pimvalue] [/q [background|preferences]] [/s] [/tokenlib path] [/v volume] [/w]</p>
|
||||
<p>"VeraCrypt Format.exe" [/n] [/create] [/size number[{K|M|G|T}]] [/p password] [/encryption {AES | Serpent | Twofish | Camellia | Kuznyechik | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent) | Camellia(Kuznyechik) | Kuznyechik(Twofish) | Camellia(Serpent) | Kuznyechik(AES) | Kuznyechik(Serpent(Camellia))}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|ripemd160|ripemd-160}]
|
||||
<p>"VeraCrypt Format.exe" [/n] [/create] [/size number[{K|M|G|T}]] [/p password] [/encryption {AES | Serpent | Twofish | Camellia | Kuznyechik | AES(Twofish) | AES(Twofish(Serpent)) | Serpent(AES) | Serpent(Twofish(AES)) | Twofish(Serpent) | Camellia(Kuznyechik) | Kuznyechik(Twofish) | Camellia(Serpent) | Kuznyechik(AES) | Kuznyechik(Serpent(Camellia))}] [/hash {sha256|sha-256|sha512|sha-512|whirlpool|blake2s|blake2s-256}]
|
||||
[/filesystem {None|FAT|NTFS|ExFAT|ReFS}] [/dynamic] [/force] [/silent] [/noisocheck] [FastCreateFile] [/quick]</p>
|
||||
<p>Note that the order in which options are specified does not matter.</p>
|
||||
<h4>Examples</h4>
|
||||
|
329
doc/html/CompilingGuidelineLinux.html
Normal file
@ -0,0 +1,329 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
|
||||
<style>
|
||||
.textbox {
|
||||
vertical-align: top;
|
||||
height: auto !important;
|
||||
font-family: Helvetica,sans-serif;
|
||||
font-size: 20px;
|
||||
font-weight: bold;
|
||||
margin: 10px;
|
||||
padding: 10px;
|
||||
background-color: white;
|
||||
width: auto;
|
||||
border-radius: 10px;
|
||||
}
|
||||
|
||||
.texttohide {
|
||||
display:none;
|
||||
font-family: Helvetica,sans-serif;
|
||||
font-size: 14px;
|
||||
font-weight: normal;
|
||||
}
|
||||
|
||||
.show {
|
||||
display: none;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.hide:target + .show {
|
||||
display: inline;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.hide:target {
|
||||
display: none;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.hide:target ~ .texttohide {
|
||||
display:inline;
|
||||
text-decoration: none;
|
||||
|
||||
}
|
||||
|
||||
@media print {
|
||||
.hide, .show {
|
||||
display: none;
|
||||
}
|
||||
}
|
||||
|
||||
</style>
|
||||
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
|
||||
<meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
|
||||
<meta name="keywords" content="encryption, security"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Home</a></li>
|
||||
<li><a href="/code/">Source Code</a></li>
|
||||
<li><a href="Downloads.html">Downloads</a></li>
|
||||
<li><a class="active" href="Documentation.html">Documentation</a></li>
|
||||
<li><a href="Donation.html">Donate</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Documentation</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="CompilingGuidelineLinux.html">Compiling Gudineline for Linux</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
This guide describes how to set up a Linux System that can compile the VeraCrypt. Further it is described how VeraCrypt is going to be compiled. <br>
|
||||
The procedure for a Ubuntu 22.04 LTS system is described here as an example, but the procedure for other Linux systems is analogous.
|
||||
</div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<br>
|
||||
<br>
|
||||
The following components are required for compiling VeraCrypt:
|
||||
<ol>
|
||||
<li>GNU Make</li>
|
||||
<li>GNU C++ Compiler 4.0</li>
|
||||
<li>YASM 1.3.0</li>
|
||||
<li>pkg-config</li>
|
||||
<li>wxWidgets 3.2 shared library and header files installed or wxWidgets 3.0 library source code </li>
|
||||
<li>FUSE library and header files</li>
|
||||
</ol>
|
||||
</div>
|
||||
|
||||
<div class="wikidoc">
|
||||
If you do not want to perform the single steps below, you can run these commands to build an environment and to compile VeraCrpyt: <br>
|
||||
Download as script: <a href="LinuxPrepAndBuild.sh" target="_blank">Script</a> <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install -y build-essential yasm pkg-config libgtk-3-dev <br>
|
||||
wget https://github.com/wxWidgets/wxWidgets/releases/download/v3.2.0/wxWidgets-3.2.0.tar.bz2 <br>
|
||||
tar -xf wxWidgets-3.2.0.tar.bz2 <br>
|
||||
cd wxWidgets-3.2.0 <br>
|
||||
mkdir gtk-build <br>
|
||||
cd gtk-build <br>
|
||||
../configure <br>
|
||||
make <br>
|
||||
sudo make install <br>
|
||||
sudo ldconfig <br>
|
||||
cd ../.. <br>
|
||||
rm -r wxWidgets-3.2.0 <br>
|
||||
rm wxWidgets-3.2.0.tar.bz2 <br>
|
||||
sudo apt install -y libfuse-dev git <br>
|
||||
git clone https://github.com/veracrypt/VeraCrypt.git
|
||||
cd ~/VeraCrypt/src <br>
|
||||
make
|
||||
</code>
|
||||
</div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<div class="textbox" id="InstallationOfGNUMake">
|
||||
<a href="#hide1" class="hide" id="hide1">Installation of GNU Make</a>
|
||||
<a href="#show1" class="show" id="show1">Installation of GNU Make</a>
|
||||
<div class="texttohide">
|
||||
<p>
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install build-essential
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="InstallationOfGNUCompiler">
|
||||
<a href="#hide2" class="hide" id="hide2">Installation of GNU C++ Compiler 4.0</a>
|
||||
<a href="#show2" class="show" id="show2">Installation of GNU C++ Compiler 4.0</a>
|
||||
<div class="texttohide">
|
||||
<p> If the build-essential were already installed in the step before, this step can be skipped.
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install build-essential
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="InstallationOfYASM">
|
||||
<a href="#hide3" class="hide" id="hide3">Installation of YASM</a>
|
||||
<a href="#show3" class="show" id="show3">Installation of YASM</a>
|
||||
<div class="texttohide">
|
||||
<p>
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install yasm
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="InstallationOfPKGConfig">
|
||||
<a href="#hide4" class="hide" id="hide4">Installation of pkg-config</a>
|
||||
<a href="#show4" class="show" id="show4">Installation of pkg-config</a>
|
||||
<div class="texttohide">
|
||||
<p>
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install pkg-config
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="InstallationOfwxWidgets">
|
||||
<a href="#hide5" class="hide" id="hide5">Installation of wxWidgets 3.2</a>
|
||||
<a href="#show5" class="show" id="show5">Installation of wxWidgets 3.2</a>
|
||||
<div class="texttohide">
|
||||
<p>
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt install libgtk-3-dev <br>
|
||||
wget https://github.com/wxWidgets/wxWidgets/releases/download/v3.2.0/wxWidgets-3.2.0.tar.bz2 <br>
|
||||
tar -xf wxWidgets-3.2.0.tar.bz2 <br>
|
||||
cd wxWidgets-3.2.0 <br>
|
||||
mkdir gtk-build <br>
|
||||
cd gtk-build <br>
|
||||
../configure <br>
|
||||
make <br>
|
||||
sudo make install <br>
|
||||
sudo ldconfig <br>
|
||||
cd ../.. <br>
|
||||
rm -r wxWidgets-3.2.0 <br>
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="InstallationOfFuse">
|
||||
<a href="#hide6" class="hide" id="hide6">Installation of libfuse</a>
|
||||
<a href="#show6" class="show" id="show6">Installation of libfuse</a>
|
||||
<div class="texttohide">
|
||||
<p>
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install libfuse-dev
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="DownloadVeraCrypt">
|
||||
<a href="#hide7" class="hide" id="hide7">Download VeraCrypt</a>
|
||||
<a href="#show7" class="show" id="show7">Download VeraCrypt</a>
|
||||
<div class="texttohide">
|
||||
<p>
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
sudo apt update <br>
|
||||
sudo apt install git <br>
|
||||
git clone https://github.com/veracrypt/VeraCrypt.git
|
||||
</code>
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="textbox" id="CompileVeraCrypt">
|
||||
<a href="#hide8" class="hide" id="hide8">Compile VeraCrypt</a>
|
||||
<a href="#show8" class="show" id="show8">Compile VeraCrypt</a>
|
||||
<div class="texttohide">
|
||||
<p> Remarks: <br>
|
||||
<ul>
|
||||
<li>
|
||||
If you have not installed wxWidgets like described here, you may have to modify the make statement to reference to the right file: <br>
|
||||
<code>make WXSTATIC=1</code>
|
||||
</li>
|
||||
<li>
|
||||
By default, a universal executable supporting both graphical and text user interface (through the switch --text) is built. <br>
|
||||
On Linux, a console-only executable, which requires no GUI library, can be built using the 'NOGUI' parameter: <br>
|
||||
<code>
|
||||
make NOGUI=1 WXSTATIC=1 WX_ROOT=/usr/src/wxWidgets wxbuild <br>
|
||||
make NOGUI=1 WXSTATIC=1
|
||||
</code>
|
||||
</li>
|
||||
</ul>
|
||||
Steps:
|
||||
<ol>
|
||||
<li>
|
||||
Open a terminal
|
||||
</li>
|
||||
<li>
|
||||
Execute the following commands: <br>
|
||||
<code>
|
||||
cd ~/VeraCrypt/src <br>
|
||||
make
|
||||
</code>
|
||||
</li>
|
||||
<li>
|
||||
If successful, the VeraCrypt executable should be located in the directory 'Main'.
|
||||
</li>
|
||||
</ol>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</body></html>
|
1231
doc/html/CompilingGuidelineWin.html
Normal file
BIN
doc/html/CompilingGuidelineWin/AddNewSystemVar.jpg
Normal file
After Width: | Height: | Size: 69 KiB |
BIN
doc/html/CompilingGuidelineWin/CertVerifyFails.jpg
Normal file
After Width: | Height: | Size: 15 KiB |
BIN
doc/html/CompilingGuidelineWin/CertificateCannotBeVerified.jpg
Normal file
After Width: | Height: | Size: 85 KiB |
BIN
doc/html/CompilingGuidelineWin/DistributionPackageDamaged.jpg
Normal file
After Width: | Height: | Size: 10 KiB |
BIN
doc/html/CompilingGuidelineWin/DownloadVS2010.jpg
Normal file
After Width: | Height: | Size: 164 KiB |
BIN
doc/html/CompilingGuidelineWin/DownloadVS2019.jpg
Normal file
After Width: | Height: | Size: 226 KiB |
BIN
doc/html/CompilingGuidelineWin/DownloadVSBuildTools.jpg
Normal file
After Width: | Height: | Size: 183 KiB |
BIN
doc/html/CompilingGuidelineWin/NasmCommandLine.jpg
Normal file
After Width: | Height: | Size: 27 KiB |
BIN
doc/html/CompilingGuidelineWin/RegeditPermissions-1.jpg
Normal file
After Width: | Height: | Size: 41 KiB |
BIN
doc/html/CompilingGuidelineWin/RegeditPermissions-2.jpg
Normal file
After Width: | Height: | Size: 81 KiB |
BIN
doc/html/CompilingGuidelineWin/RegeditPermissions-3.jpg
Normal file
After Width: | Height: | Size: 47 KiB |
BIN
doc/html/CompilingGuidelineWin/RegeditPermissions-4.jpg
Normal file
After Width: | Height: | Size: 20 KiB |
BIN
doc/html/CompilingGuidelineWin/SelectAdvancedSystemSettings.jpg
Normal file
After Width: | Height: | Size: 139 KiB |
BIN
doc/html/CompilingGuidelineWin/SelectEnvironmentVariables.jpg
Normal file
After Width: | Height: | Size: 40 KiB |
BIN
doc/html/CompilingGuidelineWin/SelectPathVariable.jpg
Normal file
After Width: | Height: | Size: 70 KiB |
BIN
doc/html/CompilingGuidelineWin/SelectThisPC.jpg
Normal file
After Width: | Height: | Size: 49 KiB |
BIN
doc/html/CompilingGuidelineWin/VS2010BuildSolution.jpg
Normal file
After Width: | Height: | Size: 58 KiB |
BIN
doc/html/CompilingGuidelineWin/VS2010Win32Config.jpg
Normal file
After Width: | Height: | Size: 164 KiB |
BIN
doc/html/CompilingGuidelineWin/VS2010X64Config.jpg
Normal file
After Width: | Height: | Size: 146 KiB |
BIN
doc/html/CompilingGuidelineWin/VS2019ARM64Config.jpg
Normal file
After Width: | Height: | Size: 57 KiB |
BIN
doc/html/CompilingGuidelineWin/VS2019BuildSolution.jpg
Normal file
After Width: | Height: | Size: 48 KiB |
BIN
doc/html/CompilingGuidelineWin/YasmCommandLine.jpg
Normal file
After Width: | Height: | Size: 32 KiB |
BIN
doc/html/CompilingGuidelineWin/gzipCommandLine.jpg
Normal file
After Width: | Height: | Size: 28 KiB |
BIN
doc/html/CompilingGuidelineWin/upxCommandLine.jpg
Normal file
After Width: | Height: | Size: 52 KiB |
@ -1,5 +1,52 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
|
||||
<style>
|
||||
.textbox {
|
||||
vertical-align: top;
|
||||
height: auto !important;
|
||||
font-weight: bold;
|
||||
padding: 5px;
|
||||
width: auto;
|
||||
border-radius: 10px;
|
||||
}
|
||||
|
||||
.texttohide {
|
||||
display:none;
|
||||
font-family: Helvetica,sans-serif;
|
||||
font-size: 14px;
|
||||
font-weight: normal;
|
||||
}
|
||||
|
||||
.show {
|
||||
display: none;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.hide:target + .show {
|
||||
display: inline;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.hide:target {
|
||||
display: none;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
||||
.hide:target ~ .texttohide {
|
||||
display:inline;
|
||||
text-decoration: none;
|
||||
|
||||
}
|
||||
|
||||
@media print {
|
||||
.hide, .show {
|
||||
display: none;
|
||||
}
|
||||
}
|
||||
|
||||
</style>
|
||||
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
@ -29,119 +76,335 @@
|
||||
<h1>Table of Contents</h1>
|
||||
<p><em style="text-align:left">This documentation is not guaranteed to be error-free and is provided "as is" without warranty of any kind. For more information, see
|
||||
<a href="Disclaimers.html">Disclaimers</a>.</em></p>
|
||||
<ul>
|
||||
<li><a title="Preface" href="Preface.html"><strong>Preface</strong></a>
|
||||
</li><li><strong><a href="Introduction.html">Introduction</a></strong>
|
||||
</li><li><strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong>
|
||||
</li><li><strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong>
|
||||
<ul>
|
||||
<li><a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a>
|
||||
</li><li><a href="Favorite%20Volumes.html">Favorite Volumes</a>
|
||||
</li><li><a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="System%20Encryption.html">System Encryption</a></strong>
|
||||
<ul>
|
||||
<li><a href="Hidden%20Operating%20System.html">Hidden Operating System</a>
|
||||
</li><li><a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a>
|
||||
</li><li><a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br>
|
||||
<ul>
|
||||
<li><a href="Hidden%20Volume.html">Hidden Volume</a>
|
||||
<ul>
|
||||
<li><a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a>
|
||||
</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a>
|
||||
</li></ul>
|
||||
</li><li><a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong>
|
||||
<ul>
|
||||
<li><a href="Program%20Menu.html">Program Menu</a>
|
||||
</li><li><a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="Parallelization.html">Parallelization</a></strong>
|
||||
</li><li><strong><a href="Pipelining.html">Pipelining</a></strong>
|
||||
</li><li><strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong>
|
||||
</li><li><strong><a href="Hot%20Keys.html">Hot keys</a></strong>
|
||||
</li><li><strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong>
|
||||
</li><li><strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens & Smart Cards</a></strong>
|
||||
</li><li><strong><a href="Portable%20Mode.html">Portable Mode</a></strong>
|
||||
</li><li><strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong>
|
||||
</li><li><strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes & Partitions</a></strong>
|
||||
</li><li><strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong>
|
||||
</li><li><strong><a href="Language%20Packs.html">Language Packs</a></strong>
|
||||
</li><li><strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong>
|
||||
<ul>
|
||||
<li><a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a>
|
||||
</li><li><a href="Kuznyechik.html">Kuznyechik</a>
|
||||
</li><li><a href="Serpent.html">Serpent</a> </li><li><a href="Twofish.html">Twofish</a> </li><li><a href="Cascades.html">Cascades of ciphers</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong>
|
||||
<ul>
|
||||
<li><a href="RIPEMD-160.html">RIPEMD-160</a>
|
||||
</li><li><a href="SHA-256.html">SHA-256</a> </li><li><a href="SHA-512.html">SHA-512</a> </li><li><a href="Whirlpool.html">Whirlpool</a>
|
||||
</li><li><a href="Streebog.html">Streebog</a></li></ul>
|
||||
</li><li><strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong>
|
||||
</li><li><strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong>
|
||||
</li><li><strong><a href="Security%20Model.html">Security Model</a></strong>
|
||||
</li><li><strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br>
|
||||
</a></strong>
|
||||
<ul>
|
||||
<li><a href="Data%20Leaks.html">Data Leaks</a>
|
||||
<ul>
|
||||
<li><a href="Paging%20File.html">Paging File</a>
|
||||
</li><li><a href="Memory%20Dump%20Files.html">Memory Dump Files</a>
|
||||
</li><li><a href="Hibernation%20File.html">Hibernation File</a>
|
||||
</li></ul>
|
||||
</li><li><a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a>
|
||||
</li><li><a href="Physical%20Security.html">Physical Security</a>
|
||||
</li><li><a href="Malware.html">Malware</a> </li><li><a href="Multi-User%20Environment.html">Multi-User Environment</a>
|
||||
</li><li><a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a>
|
||||
</li><li><a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a>
|
||||
</li><li><a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a>
|
||||
</li><li><a href="Trim%20Operation.html">Trim Operation</a>
|
||||
</li><li><a href="Wear-Leveling.html">Wear-Leveling</a>
|
||||
</li><li><a href="Reallocated%20Sectors.html">Reallocated Sectors</a>
|
||||
</li><li><a href="Defragmenting.html">Defragmenting</a>
|
||||
</li><li><a href="Journaling%20File%20Systems.html">Journaling File Systems</a>
|
||||
</li><li><a href="Volume%20Clones.html">Volume Clones</a>
|
||||
</li><li><a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong>
|
||||
</li><li><strong><a href="Miscellaneous.html">Miscellaneous</a></strong>
|
||||
<ul>
|
||||
<li><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a>
|
||||
</li><li><a href="Sharing%20over%20Network.html">Sharing Over Network</a>
|
||||
</li><li><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a>
|
||||
</li><li><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a>
|
||||
</li><li><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files & Application Data</a>
|
||||
</li><li><a href="Removing%20Encryption.html">How To Remove Encryption</a>
|
||||
</li><li><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a>
|
||||
</li><li><a href="Digital%20Signatures.html">Digital Signatures</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="Troubleshooting.html">Troubleshooting</a></strong>
|
||||
</li><li><strong><a href="Incompatibilities.html">Incompatibilities</a></strong>
|
||||
</li><li><strong><a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a></strong>
|
||||
</li><li><strong><a href="FAQ.html">Frequently Asked Questions</a></strong>
|
||||
</li><li><strong><a href="Technical%20Details.html">Technical Details</a></strong>
|
||||
<ul>
|
||||
<li><a href="Notation.html">Notation</a>
|
||||
</li><li><a href="Encryption%20Scheme.html">Encryption Scheme</a>
|
||||
</li><li><a href="Modes%20of%20Operation.html">Modes of Operation</a>
|
||||
</li><li><a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a>
|
||||
</li><li><a href="Random%20Number%20Generator.html">Random Number Generator</a>
|
||||
</li><li><a href="Keyfiles.html">Keyfiles</a>
|
||||
</li><li><a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a>
|
||||
</li><li><a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a>
|
||||
</li><li><a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a>
|
||||
</li><li><a href="Source%20Code.html">Source Code</a>
|
||||
</li></ul>
|
||||
</li><li><strong><a href="Contact.html">Contact</a></strong>
|
||||
</li><li><strong><a href="Legal%20Information.html">Legal Information</a></strong>
|
||||
</li><li><strong><a href="Release%20Notes.html">Version History</a></strong>
|
||||
</li><li><strong><a href="Acknowledgements.html">Acknowledgements</a></strong>
|
||||
</li><li><strong><a href="References.html">References</a></strong>
|
||||
</li></ul>
|
||||
|
||||
|
||||
<a title="Preface" href="Preface.html"><strong>Preface</strong></a> <br>
|
||||
<a href="Introduction.html"><strong>Introduction</strong></a>
|
||||
|
||||
<div class="wikidoc">
|
||||
<div class="textbox" id="EndUserGuides">
|
||||
<a href="#hide1" class="hide" id="hide1">▶ End-User Guidelines and Information</a>
|
||||
<a href="#show1" class="show" id="show1">▼ End-User Guidelines and Information</a>
|
||||
<div class="texttohide">
|
||||
<ul>
|
||||
<li>
|
||||
<strong><a href="Beginner%27s%20Tutorial.html">Beginner's Tutorial</a></strong>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Main%20Program%20Window.html">Main Program Window</a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Program%20Menu.html">Program Menu</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Mounting%20VeraCrypt%20Volumes.html">Mounting Volumes</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Portable%20Mode.html">Portable Mode</a></strong>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Language%20Packs.html">Language Packs</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Supported%20Operating%20Systems.html">Supported Operating Systems</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="How%20to%20Back%20Up%20Securely.html">How To Back Up Securely</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Using%20VeraCrypt%20Without%20Administrator%20Privileges.html">Using VeraCrypt Without Administrator Privileges</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Sharing%20over%20Network.html">Sharing Over Network</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="VeraCrypt%20Background%20Task.html">VeraCrypt Background Task</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Removable%20Medium%20Volume.html">Volume Mounted as Removable Medium</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Removing%20Encryption.html">How To Remove Encryption</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Uninstalling%20VeraCrypt.html">Uninstalling VeraCrypt</a></strong>
|
||||
</li>
|
||||
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<div class="textbox" id="SoftwareDevGuidelines">
|
||||
<a href="#hide2" class="hide" id="hide2">▶ Software Development Guidelines</a>
|
||||
<a href="#show2" class="show" id="show2">▼ Software Development Guidelines</a>
|
||||
<div class="texttohide">
|
||||
<ul>
|
||||
<li>
|
||||
<strong><a href="CompilingGuidelineWin.html">Windows Compiling Guideline</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="CompilingGuidelineLinux.html">Linux Compiling Guideline</a></strong>
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<div class="textbox" id="TechnicalDetails">
|
||||
<a href="#hide3" class="hide" id="hide3">▶ Technical Details</a>
|
||||
<a href="#show3" class="show" id="show3">▼ Technical Details</a>
|
||||
<div class="texttohide">
|
||||
<ul>
|
||||
<li>
|
||||
<strong><a href="VeraCrypt%20Volume.html">VeraCrypt Volume</a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Creating%20New%20Volumes.html">Creating a New VeraCrypt Volume</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Favorite%20Volumes.html">Favorite Volumes</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="System%20Favorite%20Volumes.html">System Favorite Volumes</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="System%20Encryption.html">System Encryption</a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Hidden%20Operating%20System.html">Hidden Operating System</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Supported%20Systems%20for%20System%20Encryption.html">Operating Systems Supported for System Encryption</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="VeraCrypt%20Rescue%20Disk.html">VeraCrypt Rescue Disk</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Plausible%20Deniability.html">Plausible Deniability</a></strong><br>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Hidden%20Volume.html">Hidden Volume</a>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Protection%20of%20Hidden%20Volumes.html">Protection of Hidden Volumes Against Damage</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Security%20Requirements%20for%20Hidden%20Volumes.html">Security Requirements and Precautions Pertaining to Hidden Volumes</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="VeraCrypt%20Hidden%20Operating%20System.html">Hidden Operating System</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Encryption%20Algorithms.html">Encryption Algorithms</a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="AES.html">AES</a> </li><li><a href="Camellia.html">Camellia</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Kuznyechik.html">Kuznyechik</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Serpent.html">Serpent</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Twofish.html">Twofish</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Cascades.html">Cascades of ciphers</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Hash%20Algorithms.html">Hash Algorithms</a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="BLAKE2s-256.html">BLAKE2s-256</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="SHA-256.html">SHA-256</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="SHA-512.html">SHA-512</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Whirlpool.html">Whirlpool</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Streebog.html">Streebog</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
|
||||
<li>
|
||||
<strong><a href="Security%20Requirements%20and%20Precautions.html">Security Requirements And Precautions<br> </a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Data%20Leaks.html">Data Leaks</a>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Paging%20File.html">Paging File</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Memory%20Dump%20Files.html">Memory Dump Files</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Hibernation%20File.html">Hibernation File</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Unencrypted%20Data%20in%20RAM.html">Unencrypted Data in RAM</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Physical%20Security.html">Physical Security</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Malware.html">Malware</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Multi-User%20Environment.html">Multi-User Environment</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Authenticity%20and%20Integrity.html">Authenticity and Integrity</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Choosing%20Passwords%20and%20Keyfiles.html">Choosing Passwords and Keyfiles</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Changing%20Passwords%20and%20Keyfiles.html">Changing Passwords and Keyfiles</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Trim%20Operation.html">Trim Operation</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Wear-Leveling.html">Wear-Leveling</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Reallocated%20Sectors.html">Reallocated Sectors</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Defragmenting.html">Defragmenting</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Journaling%20File%20Systems.html">Journaling File Systems</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Volume%20Clones.html">Volume Clones</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Additional%20Security%20Requirements%20and%20Precautions.html">Additional Security Requirements and Precautions</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Parallelization.html">Parallelization</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Pipelining.html">Pipelining</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Hardware%20Acceleration.html">Hardware acceleration</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Hot%20Keys.html">Hot keys</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Keyfiles%20in%20VeraCrypt.html">Keyfiles</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Security%20Tokens%20%26%20Smart%20Cards.html">Security Tokens & Smart Cards</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="TrueCrypt%20Support.html">TrueCrypt Support</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Converting%20TrueCrypt%20volumes%20and%20partitions.html">Converting TrueCrypt Volumes & Partitions</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Default%20Mount%20Parameters.html">Default Mount Parameters</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Command%20Line%20Usage.html">Command Line Usage</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Security%20Model.html">Security Model</a></strong>
|
||||
</li>
|
||||
|
||||
<li>
|
||||
<strong><a href="Technical%20Details.html">Technical Details</a></strong>
|
||||
<ul>
|
||||
<li>
|
||||
<a href="Notation.html">Notation</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Encryption%20Scheme.html">Encryption Scheme</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Modes%20of%20Operation.html">Modes of Operation</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Header%20Key%20Derivation.html">Header Key Derivation, Salt, and Iteration Count</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Random%20Number%20Generator.html">Random Number Generator</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Keyfiles.html">Keyfiles</a>
|
||||
</li>
|
||||
<li>
|
||||
<a title="PIM" href="Personal%20Iterations%20Multiplier%20(PIM).html">PIM</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="VeraCrypt%20Volume%20Format%20Specification.html">VeraCrypt Volume Format Specification</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Standard%20Compliance.html">Compliance with Standards and Specifications</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="Source%20Code.html">Source Code</a>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="VeraCrypt%20System%20Files.html">VeraCrypt System Files & Application Data</a></strong>
|
||||
</li>
|
||||
<li>
|
||||
<strong><a href="Digital%20Signatures.html">Digital Signatures</a></strong>
|
||||
</li>
|
||||
|
||||
</ul>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<strong><a href="Troubleshooting.html">Troubleshooting</a></strong> <br>
|
||||
<strong><a href="Incompatibilities.html">Incompatibilities</a></strong> <br>
|
||||
<strong><a href="Issues%20and%20Limitations.html">Known Issues and Limitations</a></strong> <br>
|
||||
<strong><a href="FAQ.html">Frequently Asked Questions</a></strong> <br>
|
||||
<strong><a href="Contact.html">Contact</a></strong> <br>
|
||||
<strong><a href="Legal%20Information.html">Legal Information</a></strong> <br>
|
||||
<strong><a href="Release%20Notes.html">Version History</a></strong> <br>
|
||||
<strong><a href="Acknowledgements.html">Acknowledgements</a></strong> <br>
|
||||
<strong><a href="References.html">References</a></strong> <br>
|
||||
|
||||
</body></html>
|
||||
|
@ -54,7 +54,7 @@ <h1>Encryption Scheme</h1>
|
||||
<li>PRF used by the header key derivation function (as specified in PKCS #5 v2.0; see the section
|
||||
<a href="Header%20Key%20Derivation.html">
|
||||
<em>Header Key Derivation, Salt, and Iteration Count</em></a>), which can be one of the following:
|
||||
<p>HMAC-SHA-512, HMAC-SHA-256, HMAC-RIPEMD-160, HMAC-Whirlpool. If a PRF is explicitly specified by the user, it will be used directly without trying the other possibilities.</p>
|
||||
<p>HMAC-SHA-512, HMAC-SHA-256, HMAC-BLAKE2S-256, HMAC-Whirlpool. If a PRF is explicitly specified by the user, it will be used directly without trying the other possibilities.</p>
|
||||
<p>A password entered by the user (to which one or more keyfiles may have been applied – see the section
|
||||
<a href="Keyfiles%20in%20VeraCrypt.html">
|
||||
<em>Keyfiles</em></a>), a PIM value (if specified) and the salt read in (1) are passed to the header key derivation function, which produces a sequence of values (see the section
|
||||
|
@ -65,8 +65,7 @@ <h1>Frequently Asked Questions</h1>
|
||||
It also solves many vulnerabilities and security issues found in TrueCrypt.<br>
|
||||
As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use
|
||||
<span style="text-decoration:underline">327661</span>. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses
|
||||
<span style="text-decoration:underline">655331 </span>for RIPEMD160 and <span style="text-decoration:underline">
|
||||
500000 </span>iterations for SHA-2 and Whirlpool.<br>
|
||||
<span style="text-decoration:underline">500000 </span>iterations.<br>
|
||||
This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted
|
||||
data.</div>
|
||||
</div>
|
||||
@ -524,14 +523,6 @@ <h1>Frequently Asked Questions</h1>
|
||||
use the password typed in the 'Current Password' field.)</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<br style="text-align:left">
|
||||
<strong style="text-align:left">When I use HMAC-RIPEMD-160, is the size of the header encryption key only 160 bits?</strong></div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
No, VeraCrypt never uses an output of a hash function (nor of a HMAC algorithm) directly as an encryption key. See the section
|
||||
<a href="Header%20Key%20Derivation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none.html">
|
||||
Header Key Derivation, Salt, and Iteration Count</a> in the <a href="https://www.veracrypt.fr/en/Documentation.html" target="_blank" style="text-align:left; color:#0080c0; text-decoration:none">
|
||||
documentation</a> for more information.</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<br style="text-align:left">
|
||||
<strong style="text-align:left">How do I burn a VeraCrypt container larger than 2 GB onto a DVD?</strong><br style="text-align:left">
|
||||
<br style="text-align:left">
|
||||
The DVD burning software you use should allow you to select the format of the DVD. If it does, select the UDF format (ISO format does not support files larger than 2 GB).</div>
|
||||
|
@ -44,7 +44,7 @@ <h1>Hash Algorithms</h1>
|
||||
VeraCrypt currently supports the following hash algorithms:</div>
|
||||
<ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
|
||||
<a href="RIPEMD-160.html"><strong style="text-align:left.html">RIPEMD-160</strong></a>
|
||||
<a href="BLAKE2s-256.html"><strong style="text-align:left.html">BLAKE2s-256</strong></a>
|
||||
</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
|
||||
<a href="SHA-256.html"><strong style="text-align:left.html">SHA-256</strong></a>
|
||||
</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
|
||||
@ -54,5 +54,5 @@ <h1>Hash Algorithms</h1>
|
||||
</li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px">
|
||||
<strong style="text-align:left"><a href="Streebog.html">Streebog</a></strong>
|
||||
</li></ul>
|
||||
<p><a href="RIPEMD-160.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p>
|
||||
<p><a href="BLAKE2s-256.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
||||
|
@ -52,26 +52,29 @@ <h1>Header Key Derivation, Salt, and Iteration Count</h1>
|
||||
512-bit salt is used, which means there are 2<sup style="text-align:left; font-size:85%">512</sup> keys for each password. This significantly decreases vulnerability to 'off-line' dictionary/'rainbow table' attacks (pre-computing all the keys for a dictionary
|
||||
of passwords is very difficult when a salt is used) [7]. The salt consists of random values generated by the
|
||||
<a href="Random%20Number%20Generator.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
|
||||
VeraCrypt random number generator</a> during the volume creation process. The header key derivation function is based on HMAC-SHA-512, HMAC-SHA-256, HMAC-RIPEMD-160, or HMAC-Whirlpool (see [8, 9, 20, 22]) – the user selects which. The length of the derived
|
||||
key does not depend on the size of the output of the underlying hash function. For example, a header key for the AES-256 cipher is always 256 bits long even if HMAC-RIPEMD-160 is used (in XTS mode, an additional 256-bit secondary header key is used; hence,
|
||||
VeraCrypt random number generator</a> during the volume creation process. The header key derivation function is based on HMAC-SHA-512, HMAC-SHA-256, HMAC-BLAKE2S-256, HMAC-Whirlpool or HMAC-Streebog (see [8, 9, 20, 22]) – the user selects which. The length of the derived
|
||||
key does not depend on the size of the output of the underlying hash function. For example, a header key for the AES-256 cipher is always 256 bits long even if HMAC-SHA-512 is used (in XTS mode, an additional 256-bit secondary header key is used; hence,
|
||||
two 256-bit keys are used for AES-256 in total). For more information, refer to [7]. A large number of iterations of the key derivation function have to be performed to derive a header key, which increases the time necessary to perform an exhaustive search
|
||||
for passwords (i.e., brute force attack) [7].</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<p>Prior to version 1.12, VeraCrypt always used a fixed number of iterations depending on the volume type and the derivation algorithm used:</p>
|
||||
<ul>
|
||||
<li>For system partition encryption (boot encryption), <strong>200000</strong> iterations are used for the HMAC-SHA-256 derivation function and
|
||||
<strong>327661</strong> iterations are used for HMAC-RIPEMD-160. </li><li>For standard containers and other partitions, <strong>655331</strong> iterations are used for HMAC-RIPEMD-160 and
|
||||
<strong>500000</strong> iterations are used for HMAC-SHA-512, HMAC-SHA-256 and HMAC-Whirlpool.
|
||||
</li></ul>
|
||||
<p>Starting from version 1.12, the <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
|
||||
<p>Prior to version 1.12, VeraCrypt always used a fixed number of iterations That depended only on the volume type and the derivation algorithm used.
|
||||
Starting from version 1.12, the <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
|
||||
PIM </a>field (<a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">Personal Iterations Multiplier</a>) enables users to have more control over the number of iterations used by the key derivation function.</p>
|
||||
<p>
|
||||
<p>When a <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
|
||||
PIM </a>value is not specified or if it is equal to zero, VeraCrypt uses the default values expressed above.</p>
|
||||
PIM </a>value is not specified or if it is equal to zero, VeraCrypt uses the default values expressed below:<br/>
|
||||
<ul>
|
||||
<li>For system partition encryption (boot encryption) that uses SHA-256, BLAKE2s-256 or Streebog, <strong>200000</strong> iterations are used.</li>
|
||||
<li>For system encryption that uses SHA-512 or Whirlpool, <strong>500000</strong> iterations are used.</li>
|
||||
<li>For non-system encryption and file containers, all derivation algorithms will use <strong>500000</strong> iterations.
|
||||
</li></ul>
|
||||
</p>
|
||||
<p>When a <a href="Personal%20Iterations%20Multiplier%20%28PIM%29.html">
|
||||
PIM </a>value is given by the user, the number of iterations of the key derivation function is calculated as follows:</p>
|
||||
<ul>
|
||||
<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong>
|
||||
</li><li>For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = <strong>15000 + (PIM x 1000)</strong>
|
||||
</li><li>For system encryption that uses SHA-512 or Whirlpool: Iterations = <strong>15000 + (PIM x 1000)</strong>
|
||||
</li><li>For non-system encryption and file containers: Iterations = <strong>15000 + (PIM x 1000)</strong>
|
||||
</li></ul>
|
||||
</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
|
20
doc/html/LinuxPrepAndBuild.sh
Normal file
@ -0,0 +1,20 @@
|
||||
#!/bin/bash
|
||||
|
||||
sudo apt update
|
||||
sudo apt install -y build-essential yasm pkg-config libgtk-3-dev
|
||||
wget https://github.com/wxWidgets/wxWidgets/releases/download/v3.2.0/wxWidgets-3.2.0.tar.bz2
|
||||
tar -xf wxWidgets-3.2.0.tar.bz2
|
||||
cd wxWidgets-3.2.0
|
||||
mkdir gtk-build
|
||||
cd gtk-build
|
||||
../configure
|
||||
make
|
||||
sudo make install
|
||||
sudo ldconfig
|
||||
cd ../..
|
||||
rm -r wxWidgets-3.2.0
|
||||
rm wxWidgets-3.2.0.tar.bz2
|
||||
sudo apt install -y libfuse-dev git
|
||||
git clone https://github.com/veracrypt/VeraCrypt.git
|
||||
cd ~/VeraCrypt/src
|
||||
make
|
@ -44,7 +44,9 @@ <h1>PIM</h1>
|
||||
Header Key Derivation</a>).</p>
|
||||
<p>When a PIM value is specified, the number of iterations is calculated as follows:</p>
|
||||
<ul>
|
||||
<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong> </li><li>For system encryption that uses SHA-512 or Whirlpool, non-system encryption and file containers: Iterations = <strong>15000 + (PIM x 1000)</strong>
|
||||
<li>For system encryption that doesn't use SHA-512 or Whirlpool: Iterations = <strong>PIM x 2048</strong>
|
||||
</li><li>For system encryption that uses SHA-512 or Whirlpool: Iterations = <strong>15000 + (PIM x 1000)</strong>
|
||||
</li><li>For non-system encryption and file containers: Iterations = <strong>15000 + (PIM x 1000)</strong>
|
||||
</li></ul>
|
||||
<p>Prior to version 1.12, the security of a VeraCrypt volume was only based on the password strength because VeraCrypt was using a fixed number of iterations.<br>
|
||||
With the introduction of PIM, VeraCrypt has a 2-dimensional security space for volumes based on the couple (Password, PIM). This provides more flexibility for adjusting the desired security level while also controlling the performance of the mount/boot operation.</p>
|
||||
|
@ -73,7 +73,7 @@ <h4>PKCS-5 PRF</h4>
|
||||
<em>Security Requirements and Precautions</em></a>).</p>
|
||||
</div>
|
||||
<h3>Volumes -> Set Header Key Derivation Algorithm</h3>
|
||||
<p>This function allows you to re-encrypt a volume header with a header key derived using a different PRF function (for example, instead of HMAC-RIPEMD-160 you could use HMAC-Whirlpool). Note that the volume header contains the master encryption key with which
|
||||
<p>This function allows you to re-encrypt a volume header with a header key derived using a different PRF function (for example, instead of HMAC-BLAKE2S-256 you could use HMAC-Whirlpool). Note that the volume header contains the master encryption key with which
|
||||
the volume is encrypted. Therefore, the data stored on the volume will <em>not</em> be lost after you use this function. For more information, see the section
|
||||
<a href="Header%20Key%20Derivation.html">
|
||||
<em>Header Key Derivation, Salt, and Iteration Count</em></a>.<br>
|
||||
|
@ -51,9 +51,9 @@ <h2>Pool Mixing Function</h2>
|
||||
written to the pool, this function is applied to the entire pool.</p>
|
||||
<p>Description of the pool mixing function:</p>
|
||||
<ol>
|
||||
<li>Let <em>R</em> be the randomness pool. </li><li>Let <em>H</em> be the hash function selected by the user (SHA-512, RIPEMD-160, or Whirlpool).
|
||||
<li>Let <em>R</em> be the randomness pool. </li><li>Let <em>H</em> be the hash function selected by the user (SHA-512, BLAKE2S-256, or Whirlpool).
|
||||
</li><li><em>l</em> = byte size of the output of the hash function <em>H</em> (i.e., if
|
||||
<em>H</em> is RIPEMD-160, then <em>l</em> = 20; if <em>H</em> is SHA-512, <em>l</em> = 64)
|
||||
<em>H</em> is BLAKE2S-256, then <em>l</em> = 20; if <em>H</em> is SHA-512, <em>l</em> = 64)
|
||||
</li><li><em>z</em> = byte size of the randomness pool <em>R </em>(320 bytes) </li><li><em>q</em> = <em>z</em> / <em>l</em> – 1 (e.g., if <em>H</em> is Whirlpool, then
|
||||
<em>q</em> = 4) </li><li>Ris divided intol-byte blocksB0...Bq.
|
||||
<p>For 0 ≤ i ≤ q (i.e., for each block B) the following steps are performed:</p>
|
||||
|
@ -39,6 +39,28 @@ <h1>Release Notes</h1>
|
||||
<strong>Note to users who created volumes with 1.17 version of VeraCrypt or earlier: </strong><br/>
|
||||
<span style="color:#ff0000;">To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.</span></li>
|
||||
</p>
|
||||
<p><strong style="text-align:left">1.26</strong> (March 21<sup>st</sup>, 2022):</p>
|
||||
<ul>
|
||||
<li><strong>All OSes:</strong>
|
||||
<ul>
|
||||
<li>Add support for BLAKE2s as new PRF algorithm for both system encryption and standard volumes.</li>
|
||||
<li>Complete removal of RIPEMD16 and GOST89 algorithms. Legacy volumes using any of them cannot be mounted by VeraCrypt anymore.</li>
|
||||
<li>Add Corsican language support. Update translations (French, German, Russian). </li>
|
||||
</ul>
|
||||
</li>
|
||||
<li><strong>Windows:</strong>
|
||||
<ul>
|
||||
<li>EFI Bootloader:
|
||||
<ul>
|
||||
<li>Fix bug in PasswordTimeout value handling that caused it to be limited to 255 seconds.</li>
|
||||
<li>Rescue Disk: enhance "Boot Original Windows Loader" by using embedded backup of original Windows loader if it is missing from disk</li>
|
||||
<li>Addition of Blake2s and removal of RIPEMD160 & GOST89</li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
<p><strong style="text-align:left">1.25.9</strong> (February 19<sup>th</sup>, 2022):</p>
|
||||
<ul>
|
||||
<li><strong>All OSes:</strong>
|
||||
|
58
doc/html/ru/AES.html
Normal file
@ -0,0 +1,58 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Encryption%20Algorithms.html">Алгоритмы шифрования</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="AES.html">AES</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<h1>Алгоритм шифрования AES</h1>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
Advanced Encryption Standard (AES) – это одобренный FIPS (Федеральные стандарты обработки информации) криптографический
|
||||
алгоритм (также известен как Rijndael, авторы: Joan Daemen и Vincent Rijmen, опубликован в 1998 году), разрешённый
|
||||
к применению федеральными ведомствами и учреждениями США для криптостойкой защиты секретной информации [3].
|
||||
VeraCrypt использует AES с 14 раундами и 256-битовым ключом (т.е. стандарт AES-256, опубликованный в 2001 году), работающий
|
||||
<a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
|
||||
в режиме XTS</a> (см. раздел <a href="Modes%20of%20Operation.html" style="text-align:left; color:#0080c0; text-decoration:none.html">
|
||||
Режимы работы</a>).</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
В июне 2003 года, после того как Агентство национальной безопасности США (NSA, US National Security Agency)
|
||||
провело исследование и анализ AES, американский комитет CNSS (Committee on National Security Systems) объявил
|
||||
в [1], что реализация и надёжность AES-256 (и AES-192) достаточны для защиты секретной информации вплоть до
|
||||
уровня Top Secret («Совершенно секретно»). Это относится ко всем правительственным ведомствам и
|
||||
учреждениям США, намеревающимся приобрести или использовать продукты, включающие Advanced Encryption Standard (AES),
|
||||
для обеспечения требований информационной безопасности, относящейся к защите национальных систем безопасности
|
||||
и/или информации, связанной с госбезопасностью [1].
|
||||
</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<a href="Camellia.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Следующий раздел >></a></div>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
58
doc/html/ru/Acknowledgements.html
Normal file
@ -0,0 +1,58 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Acknowledgements.html">Благодарности</a>
|
||||
</p></div>
|
||||
<div class="wikidoc">
|
||||
<div>
|
||||
<h1>Благодарности</h1>
|
||||
<p>Выражаем благодарность следующим людям:</p>
|
||||
<p>Разработчикам программы TrueCrypt, проделавшим потрясающую работу в течение 10 лет. Без их напряжённого труда VeraCrypt сегодня не существовало бы.</p>
|
||||
<p><i>Paul Le Roux</i> за предоставление его исходного кода E4M; TrueCrypt 1.0 ведёт своё происхождение от E4M, а некоторые части исходного кода E4M и поныне входят в исходный код текущей версии TrueCrypt.</p>
|
||||
<p><i>Brian Gladman</i>, автору превосходных подпрограмм AES, Twofish и SHA-512.</p>
|
||||
<p><i>Peter Gutmann</i> за его документ о случайных числах и за создание библиотеки cryptlib, послужившей источником части исходного кода генератора случайных чисел.</p>
|
||||
<p><i>Wei Dai</i>, автору подпрограмм Serpent и RIPEMD-160.</p>
|
||||
<p><i>Tom St Denis</i>, автору LibTomCrypt, включающей компактные подпрограммы SHA-256.</p>
|
||||
<p><i>Mark Adler</i> и <i>Jean-loup Gailly</i>, написавшим библиотеку zlib.</p>
|
||||
<p>Разработчикам алгоритмов шифрования, хеширования и режима работы:</p>
|
||||
<p><i>Horst Feistel, Don Coppersmith, Walt Tuchmann, Lars Knudsen, Ross Anderson, Eli Biham, Bruce Schneier, David Wagner, John Kelsey, Niels Ferguson, Doug Whiting, Chris Hall, Joan Daemen, Vincent Rijmen, Carlisle Adams, Stafford Tavares, Phillip Rogaway, Hans
|
||||
Dobbertin, Antoon Bosselaers, Bart Preneel, Paulo S. L. M. Barreto.</i></p>
|
||||
<p><i>Andreas Becker</i> за создание логотипа и значков VeraCrypt.</p>
|
||||
<p><i>Xavier de Carné de Carnavalet</i>, предложившему оптимизацию скорости для PBKDF2, которая вдвое сократила время монтирования/загрузки.</p>
|
||||
<p><i>kerukuro</i> за библиотеку cppcrypto (http://cppcrypto.sourceforge.net/), откуда взята реализация шифра «Кузнечик».</p>
|
||||
<p><br>
|
||||
<i>Dieter Baron</i> и <i>Thomas Klausner</i>, написавшим библиотеку libzip.</p>
|
||||
<p><br>
|
||||
<i>Jack Lloyd</i>, написавшему оптимизированную для SIMD реализацию Serpent.</p>
|
||||
<p>Всем остальным, благодаря кому стал возможен этот проект, кто нас морально поддерживал, а также тем, кто присылал нам сообщения об ошибках и предложения по улучшению программы.</p>
|
||||
<p>Большое вам спасибо!</p>
|
||||
</div>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
@ -0,0 +1,52 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Security%20Requirements%20and%20Precautions.html">Требования безопасности и меры предосторожности</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Additional%20Security%20Requirements%20and%20Precautions.html">Дополнительные требования безопасности и меры предосторожности</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<div>
|
||||
<h1>Дополнительные требования безопасности и меры предосторожности</h1>
|
||||
<p>Помимо всего, что описано в главе <a href="Security%20Requirements%20and%20Precautions.html"><em>Требования безопасности и меры предосторожности</em></a>,
|
||||
вы обязаны помнить и соблюдать требования безопасности, меры предосторожности и ограничения, изложенные в следующих главах и разделах:</p>
|
||||
<ul>
|
||||
<li><a href="How%20to%20Back%20Up%20Securely.html"><em><strong>О безопасном резервном копировании</strong></em></a>
|
||||
</li><li><a href="Issues%20and%20Ограничения.html"><em><strong>Ограничения</strong></em></a>
|
||||
</li><li><a href="Security%20Model.html"><em><strong>Модель безопасности</strong></em></a>
|
||||
</li><li><a href="Security%20Requirements%20for%20Hidden%20Volumes.html"><em><strong>Требования безопасности и меры предосторожности, касающиеся скрытых томов</strong></em></a>
|
||||
</li><li><a href="Plausible%20Deniability.html"><em><strong>Правдоподобное отрицание наличия шифрования</strong></em></a>
|
||||
</li></ul>
|
||||
<p>См. также: <a href="Digital%20Signatures.html">
|
||||
<em>Цифровые подписи</em></a></p>
|
||||
</div>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
54
doc/html/ru/Authenticity and Integrity.html
Normal file
@ -0,0 +1,54 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Security%20Requirements%20and%20Precautions.html">Требования безопасности и меры предосторожности</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Authenticity%20and%20Integrity.html">Подлинность и целостность данных</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<div>
|
||||
<h1>Подлинность и целостность данных</h1>
|
||||
<p>VeraCrypt применяет шифрование для сохранения <em>конфиденциальности</em> шифруемых данных. VeraCrypt
|
||||
не сохраняет и не проверяет целостность или подлинность данных, подвергающихся шифрованию и дешифрованию.
|
||||
Следовательно, если вы позволите неприятелю изменить зашифрованные с помощью VeraCrypt данные, он сможет
|
||||
установить у любого 16-байтового блока данных случайное или предыдущее значение, которое ему удалось
|
||||
получить в прошлом. Обратите внимание, что неприятель не может выбрать значение, которое вы получите,
|
||||
когда VeraCrypt расшифровывает изменённый блок – значение будет случайным, если только противник не восстановит
|
||||
старую версию зашифрованного блока, которую ему удалось получить в прошлом. Ответственность за проверку
|
||||
целостности и подлинности данных, зашифрованных или расшифрованных VeraCrypt, лежит только на вас (например,
|
||||
это можно сделать с помощью соответствующего стороннего ПО).<br>
|
||||
<br>
|
||||
См. также: <a href="Physical%20Security.html">
|
||||
<em>Физическая безопасность</em></a>, <a href="Security%20Model.html">
|
||||
<em>Модель безопасности</em></a></p>
|
||||
</div>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
44
doc/html/ru/Authors.html
Normal file
@ -0,0 +1,44 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="VeraCrypt%20Volume.html">Том VeraCrypt</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<h2>Авторы</h2>
|
||||
<p>Mounir IDRASSI (<a href="https://www.idrix.fr" target="_blank">IDRIX</a>, <a href="https://fr.linkedin.com/in/idrassi" target="_blank">
|
||||
https://fr.linkedin.com/in/idrassi</a>) – создатель и главный разработчик VeraCrypt. Руководит всеми аспектами
|
||||
разработки и развёртывания на всех поддерживаемых платформах (Windows, Linux и macOS).</p>
|
||||
<p>Алекс Колотников (<a href="https://ru.linkedin.com/in/alex-kolotnikov-6625568b" target="_blank">https://ru.linkedin.com/in/alex-kolotnikov-6625568b</a>) – автор
|
||||
EFI-загрузчика VeraCrypt. Отвечает за все аспекты поддержки EFI, а его обширный опыт помогает внедрять новые
|
||||
интересные функции в системное Windows-шифрование VeraCrypt.</p>
|
||||
<p> </p>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
BIN
doc/html/ru/BCH_Logo_48x30.png
Normal file
After Width: | Height: | Size: 2.0 KiB |
BIN
doc/html/ru/BC_Logo_30x30.png
Normal file
After Width: | Height: | Size: 4.0 KiB |
57
doc/html/ru/BLAKE2s-256.html
Normal file
@ -0,0 +1,57 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Hash%20Algorithms.html">Алгоритмы хеширования</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="BLAKE2s-256.html">BLAKE2s-256</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<h1>Хеш-алгоритм BLAKE2s-256</h1>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<p>
|
||||
BLAKE2 это криптографическая хеш-функция, основанная на BLAKE. Авторы: Jean-Philippe Aumasson, Samuel Neves,
|
||||
Zooko Wilcox-O'Hearn и Christian Winnerlein. Представлена 21 декабря 2012 года. Цель разработки состояла в том,
|
||||
чтобы заменить широко используемые, но взломанные алгоритмы MD5 и SHA-1 в приложениях, требующих высокой производительности.
|
||||
Хеш-функция BLAKE2 обеспечивает лучшую безопасность, чем SHA-2, и аналогична по безопасности SHA-3 (например, ей
|
||||
свойственны невосприимчивость к увеличению длины, индифферентность от случайного оракула и т. д.)<br/>
|
||||
В BLAKE2 убрано добавление констант к словам сообщения из раундовой функции BLAKE, изменены две константы вращения,
|
||||
упрощено заполнение, добавлен блок параметров, который подвергается операции XOR с векторами инициализации, и
|
||||
уменьшено количество раундов с 16 до 12 для BLAKE2b (преемник BLAKE-512) и с 14 до 10 для BLAKE2s (преемник BLAKE-256).<br/>
|
||||
BLAKE2b и BLAKE2s определены в документе RFC 7693.
|
||||
</p>
|
||||
<p>
|
||||
VeraCrypt использует только BLAKE2s с максимальным размером вывода 32 байта (256 бит).
|
||||
</p>
|
||||
</div>
|
||||
<div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
|
||||
<a href="SHA-256.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Следующий раздел >></a></div>
|
||||
</div><div class="ClearBoth"></div></body></html>
|
244
doc/html/ru/Beginner's Tutorial.html
Normal file
@ -0,0 +1,244 @@
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|
||||
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="ru" lang="ru">
|
||||
<head>
|
||||
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
|
||||
<title>VeraCrypt - Бесплатное надёжное шифрование дисков с открытым исходным кодом</title>
|
||||
<meta name="description" content="VeraCrypt это бесплатное программное обеспечение для шифрования дисков с открытым исходным кодом для Windows, Mac OS X (macOS) и Linux. В случае, если злоумышленник вынуждает вас раскрыть пароль, VeraCrypt обеспечивает правдоподобное отрицание наличия шифрования. В отличие от пофайлового шифрования, VeraCrypt шифрует данные в реальном времени (на лету), автоматически, прозрачно, требует очень мало памяти и не использует временные незашифрованные файлы."/>
|
||||
<meta name="keywords" content="encryption, security, шифрование, безопасность"/>
|
||||
<link href="styles.css" rel="stylesheet" type="text/css" />
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<div>
|
||||
<a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
|
||||
</div>
|
||||
|
||||
<div id="menu">
|
||||
<ul>
|
||||
<li><a href="Home.html">Начало</a></li>
|
||||
<li><a href="/code/">Исходный код</a></li>
|
||||
<li><a href="Downloads.html">Загрузить</a></li>
|
||||
<li><a class="active" href="Documentation.html">Документация</a></li>
|
||||
<li><a href="Donation.html">Поддержать разработку</a></li>
|
||||
<li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Форум</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<p>
|
||||
<a href="Documentation.html">Документация</a>
|
||||
<img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
|
||||
<a href="Beginner's%20Tutorial.html">Руководство для начинающих пользователей</a>
|
||||
</p></div>
|
||||
|
||||
<div class="wikidoc">
|
||||
<h1>Руководство для начинающих пользователей</h1>
|
||||
<h2>Как создать и использовать контейнер VeraCrypt</h2>
|
||||
<p>В этой главе содержатся пошаговые инструкции о том, как создавать, монтировать и использовать том VeraCrypt.
|
||||
Настоятельно рекомендуем вам ознакомиться и с другими разделами данного руководства, так как они содержат важную информацию.</p>
|
||||
<h4>ШАГ 1:</h4>
|
||||
<p>Если вы этого ещё не сделали, загрузите и установите программу VeraCrypt. Затем запустите её, дважды щёлкнув
|
||||
по файлу VeraCrypt.exe или по ярлыку VeraCrypt в меню <i>Пуск</i> в Windows.</p>
|
||||
<h4>ШАГ 2:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_001.png" alt=""><br>
|
||||
<br>
|
||||
Должно появиться главное окно VeraCrypt. Нажмите кнопку <strong>Создать том</strong> (на иллюстрации она выделена красным).</p>
|
||||
<h4>ШАГ 3:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_002.png" alt=""><br>
|
||||
<br>
|
||||
Должно появиться окно мастера создания томов VeraCrypt.<br>
|
||||
<br>
|
||||
На этом этапе нам нужно выбрать место, где будет создан том VeraCrypt. Том может находиться в файле
|
||||
(также именуемом контейнером), в разделе или на диске. В этом примере мы выберем первый вариант и
|
||||
создадим том VeraCrypt внутри файла.
|
||||
<br>
|
||||
<br>
|
||||
Поскольку эта опция выбрана по умолчанию, просто нажимаем кнопку <strong>Далее</strong>.</p>
|
||||
<h4>ШАГ 4:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_003.png" alt=""><br>
|
||||
<br>
|
||||
Сейчас нам нужно выбрать, какой том VeraCrypt мы хотим создать – обычный или скрытый. В этом примере мы
|
||||
выберем первый вариант и создадим обычный том.<br>
|
||||
<br>
|
||||
Поскольку эта опция выбрана по умолчанию, просто нажимаем кнопку <strong>Далее</strong>.</p>
|
||||
<h4>ШАГ 5:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_004.png" alt=""><br>
|
||||
<br>
|
||||
На этом этапе требуется указать место создания тома (файла-контейнера) VeraCrypt. Обратите внимание: контейнер
|
||||
VeraCrypt ничем не отличается от любого другого обычного файла. Например, его можно перемещать или удалять
|
||||
как любой другой файл. Также ему потребуется имя файла, которое мы выберем на следующем этапе.<br>
|
||||
<br>
|
||||
Нажмите кнопку <strong>Выбрать файл</strong>.<br>
|
||||
<br>
|
||||
Появится стандартное диалоговое окно выбора файлов Windows (при этом окно мастера создания томов останется открытым в фоне).</p>
|
||||
<h4>ШАГ 6:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_005.png" alt=""><br>
|
||||
<br>
|
||||
В этом руководстве мы создадим наш том VeraCrypt в папке F<em>:\Data\ </em>
|
||||
и присвоим тому (файлу-контейнеру) имя <em>MyVolume.hc</em> (как показано на иллюстрации выше). Разумеется,
|
||||
вы можете выбрать любое другое имя и расположение файла (например, поместив его на USB-флешку). Обратите внимание,
|
||||
что файла <em>MyVolume.hc</em> пока не существует – VeraCrypt его создаст.</p>
|
||||
<p>ВАЖНО: Имейте в виду, что VeraCrypt <em>не будет</em> шифровать никакие имеющиеся файлы (при создании
|
||||
файла-контейнера VeraCrypt). Если на данном этапе выбрать какой-либо уже существующий файл, он будет
|
||||
перезаписан и заменён новым созданным томом (то есть перезаписанный файл будет <em>уничтожен</em>, а <em>не</em>
|
||||
зашифрован). Зашифровать имеющиеся файлы вы сможете позднее, переместив их в том VeraCrypt, который мы сейчас создаём.*</p>
|
||||
<p>Выберите в файловом окне желаемый путь (место, где вы хотите создать контейнер). В поле
|
||||
<strong>Имя файла</strong> введите имя, которое вы хотите дать файлу-контейнеру.<br>
|
||||
<br>
|
||||
Нажмите кнопку <strong>Сохранить</strong>.<br>
|
||||
<br>
|
||||
Окно выбора файлов должно исчезнуть.<br>
|
||||
<br>
|
||||
На следующих этапах мы вернёмся в окно мастера создания томов VeraCrypt.</p>
|
||||
<p>* Обратите внимание, что после того, как вы скопируете существующие незашифрованные файлы на том VeraCrypt,
|
||||
вы должны надёжно удалить (затереть) исходные незашифрованные файлы. Для надёжного стирания существуют
|
||||
специальные программы (многие из которых бесплатны).</p>
|
||||
<h4>ШАГ 7:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_007.png" alt=""><br>
|
||||
<br>
|
||||
В окне мастера создания томов нажмите <strong>Далее</strong>.</p>
|
||||
<h4>ШАГ 8:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_008.png" alt=""><br>
|
||||
<br>
|
||||
Здесь можно выбрать для тома алгоритмы шифрования и хеширования. Если вы не знаете, что лучше выбрать,
|
||||
просто оставьте предложенные значения и нажмите
|
||||
<strong>Далее</strong> (см. подробности в главах <a href="Алгоритмы шифрования.html">
|
||||
<em>Алгоритмы шифрования</em></a> и <a href="Hash%20Algorithms.html">
|
||||
<em>Алгоритмы хеширования</em></a>).</p>
|
||||
<h4>ШАГ 9:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_009.png" alt=""><br>
|
||||
<br>
|
||||
Здесь мы укажем, что хотим создать контейнер VeraCrypt размером 250 мегабайт. Разумеется, вы можете
|
||||
указать любой другой размер. После того, как вы введёте размер в поле ввода (оно выделено красным),
|
||||
нажмите кнопку <strong>Далее</strong>.</p>
|
||||
<h4>ШАГ 10:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_010.png" alt=""><br>
|
||||
<br>
|
||||
Мы подошли к одному из самых важных этапов: нам нужно выбрать для тома хороший пароль. Какой пароль
|
||||
следует считать хорошим, написано в этом окне мастера. Внимательно прочитайте данную информацию.<br>
|
||||
<br>
|
||||
После того, как вы определитесь с хорошим паролем, введите его в первое поле ввода. Затем введите тот же
|
||||
самый пароль в расположенное ниже второе поле ввода и нажмите кнопку <strong>Далее</strong>.</p>
|
||||
<p>Примечание: кнопка <strong>Далее</strong> будет недоступна до тех пор, пока в полях ввода не будут
|
||||
введены одинаковые пароли.</p>
|
||||
<h4>ШАГ 11:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_011.png" alt=""><br>
|
||||
<br>
|
||||
Произвольно перемещайте мышь в окне мастера создания томов в течение хотя бы 30 секунд. Чем дольше вы
|
||||
будете перемещать мышь, тем лучше – этим вы значительно повысите криптостойкость ключей шифрования
|
||||
(что увеличит их надёжность).<br>
|
||||
<br>
|
||||
Нажмите кнопку <strong>Разметить</strong>.<br>
|
||||
<br>
|
||||
Сейчас должно начаться создание тома. VeraCrypt создаст файл с именем <em>MyVolume.hc</em>
|
||||
в папке <em>F:\Data\</em> (как мы указали в шаге 6). Этот файл станет контейнером VeraCrypt (то есть он
|
||||
будет содержать зашифрованный том VeraCrypt). В зависимости от размера тома, создание тома может
|
||||
длиться довольно долго. По окончании появится следующее окно:<br>
|
||||
<br>
|
||||
<img src="Beginner's Tutorial_Image_012.png" alt=""><br>
|
||||
<br>
|
||||
Нажмите <strong>OK</strong>, чтобы закрыть это окно.</p>
|
||||
<h4>ШАГ 12:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_013.png" alt=""><br>
|
||||
<br>
|
||||
Итак, только что мы успешно создали том VeraCrypt (файл-контейнер). Нажмите кнопку
|
||||
<strong>Выход</strong> в окне мастера создания томов VeraCrypt.<br>
|
||||
<br>
|
||||
Окно мастера должно исчезнуть.<br>
|
||||
<br>
|
||||
На следующих этапах мы смонтируем том, который только что создали. Сейчас мы должны были вернуться
|
||||
в главное окно VeraCrypt (которое должно быть всё ещё открыто, в противном случае выполните заново шаг 1,
|
||||
чтобы запустить VeraCrypt, а затем перейдите к шагу 13).</p>
|
||||
<h4>ШАГ 13:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_014.png" alt=""><br>
|
||||
<br>
|
||||
Выберите в списке букву диска (на иллюстрации она помечена красным). Она станет буквой диска
|
||||
со смонтированным контейнером VeraCrypt.<br>
|
||||
<br>
|
||||
Примечание: в нашем примере мы выбрали букву диска M, но вы, разумеется, можете выбрать любую другую доступную букву.</p>
|
||||
<h4>ШАГ 14:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_015.png" alt=""><br>
|
||||
<br>
|
||||
Нажмите кнопку <strong>Выбрать файл</strong>.<br>
|
||||
<br>
|
||||
Появится обычное окно выбора файлов.</p>
|
||||
<h4>ШАГ 15:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_016.png" alt=""><br>
|
||||
<br>
|
||||
В окне выбора файлов найдите и укажите файл-контейнер (который мы создали на шагах 6-12). Нажмите кнопку
|
||||
<strong>Открыть</strong> (в окне выбора файлов).<br>
|
||||
<br>
|
||||
Окно выбора файлов должно исчезнуть.<br>
|
||||
<br>
|
||||
На следующих этапах мы вернёмся в главное окно VeraCrypt.</p>
|
||||
<h4>ШАГ 16:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_017.png" alt=""><br>
|
||||
<br>
|
||||
В главном окне VeraCrypt нажмите кнопку <strong>Смонтировать</strong>. Появится окно ввода пароля.</p>
|
||||
<h4>ШАГ 17:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_018.png" alt=""><br>
|
||||
<br>
|
||||
Укажите пароль (который мы задали на шаге 10) в поле ввода (на иллюстрации оно отмечено красным).</p>
|
||||
<h4>ШАГ 18:</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_019.png" alt=""><br>
|
||||
<br>
|
||||
Выберите алгоритм PRF, который был использован при создании тома (по умолчанию VeraCrypt использует
|
||||
PRF-алгоритм SHA-512). Если вы не помните, какой PRF использовался, просто оставьте здесь автоопределение,
|
||||
но монтирование в этом случае займёт большее время. После ввода пароля нажмите <strong>OK</strong>.<br>
|
||||
<br>
|
||||
Сейчас VeraCrypt попытается смонтировать наш том. Если пароль указан неправильно (например, вы ошиблись
|
||||
при вводе), VeraCrypt известит вас об этом, и потребуется повторить предыдущий этап (снова ввести пароль и
|
||||
нажать <strong>OK</strong>). Если пароль правильный, том будет смонтирован.</p>
|
||||
<h4>ШАГ 19 (ЗАКЛЮЧИТЕЛЬНЫЙ):</h4>
|
||||
<p><img src="Beginner's Tutorial_Image_020.png" alt=""><br>
|
||||
<br>
|
||||
Итак, мы только что успешно смонтировали контейнер как виртуальный диск M:.<br>
|
||||
<br>
|
||||
Этот виртуальный диск полностью зашифрован (в том числе зашифрованы имена файлов, таблицы распределения,
|
||||
свободное место и т.д.) и ведёт себя как настоящий диск. Вы можете сохранять (или копировать, перемещать
|
||||
и т.д.) файлы на этом виртуальном диске – они будут шифроваться на лету в момент записи.<br>
|
||||
<br>
|
||||
Если вы откроете файл, хранящийся в томе VeraCrypt, например, в медиапроигрывателе, этот файл будет
|
||||
автоматически расшифровываться в памяти (в ОЗУ) непосредственно в момент считывания, то есть на лету.</p>
|
||||
<p><i>ВАЖНО: Обратите внимание, что когда вы открываете файл, хранящийся в томе VeraCrypt (или когда
|
||||
сохраняете/копируете файл в томе VeraCrypt), повторно пароль не запрашивается. Правильный пароль нужно
|
||||
указать только один раз – при монтировании тома.</i></p>
|
||||
<p>Открыть смонтированный том можно, например, двойным щелчком по элементу, выделенному на иллюстрации синим цветом.</p>
|
||||
<p>Просматривать содержимое смонтированного тома можно точно так же, как содержимое любого другого диска.
|
||||
Например, открыть <em>Компьютер</em> (или <em>Мой компьютер</em>) и дважды щёлкнуть по соответствующей
|
||||
букве диска (в нашем случае это буква M).<br>
|
||||
<br>
|
||||
<img src="Beginner's Tutorial_Image_021.png" alt=""><br>
|
||||
<br>
|
||||
Вы можете копировать файлы (или папки) в/из том(а) VeraCrypt, как если бы вы копировали их в любой другой
|
||||
обычный диск (например, с помощью перетаскивания). Файлы, считываемые или копируемые из зашифрованного
|
||||
тома VeraCrypt, автоматически на лету расшифровываются в ОЗУ (в памяти). Аналогично, файлы, записываемые
|
||||
или копируемые в том VeraCrypt, автоматически зашифровываются на лету в ОЗУ (непосредственно перед их записью на диск).<br>
|
||||
<br>
|
||||
Обратите внимание, что VeraCrypt никогда не сохраняет на диске данные в незашифрованном виде – незашифрованные
|
||||
данные хранятся лишь временно в ОЗУ (памяти). Даже при смонтированном томе данные в этом томе остаются
|
||||
зашифрованными. При перезагрузке Windows или выключении компьютера том будет размонтирован, а все находящиеся
|
||||
в нём файлы станут недоступными (и зашифрованными). Даже в случае случайного перебоя электропитания (то есть
|
||||
при некорректном завершении работы системы) все хранящиеся в томе файлы будут недоступными (и зашифрованными).
|
||||
Чтобы снова получить к ним доступ, потребуется смонтировать том. Как это сделать, описано в шагах 13-18.</p>
|
||||
<p>Если вам нужно закрыть том, сделав его содержимое недоступным, можно либо перезагрузить операционную систему,
|
||||
либо размонтировать том. Для этого сделайте следующее:<br>
|
||||
<br>
|
||||
<img src="Beginner's Tutorial_Image_022.png" alt=""><br>
|
||||
<br>
|
||||
Выберите нужный том из списка смонтированных томов в главном окне VeraCrypt (на иллюстрации он отмечен красным)
|
||||
и нажмите кнопку <strong>Размонтировать</strong> (на иллюстрации она также отмечена красным). Чтобы снова
|
||||
получить доступ к хранящимся в томе файлам, потребуется смонтировать том. Как это сделать, описано в шагах 13-18.</p>
|
||||
<h2>Как создать и использовать раздел/устройство, зашифрованное VeraCrypt</h2>
|
||||
<p>Вместо создания файлов-контейнеров вы можете воспользоваться шифрованием физических разделов или дисков
|
||||
(то есть создавать тома VeraCrypt на основе устройств). Чтобы это сделать, повторите шаги 1-3, но на шаге 3
|
||||
выберите второй или третий параметр и следуйте инструкциям мастера.
|
||||
При создании тома VeraCrypt на основе устройства внутри <em>несистемного</em> раздела/диска, монтирование
|
||||
этого тома выполняется кнопкой <em>Автомонтирование</em> в главном окне VeraCrypt. Информацию о зашифрованных
|
||||
<em>системных</em> разделах/дисках см. в главе <a href="System%20Encryption.html">
|
||||
<em>Шифрование системы</em></a>.</p>
|
||||
<p>ВАЖНО: <em>Настоятельно рекомендуем ознакомиться с другими главами этого руководства – они содержат важную
|
||||
информацию, которая здесь опущена, чтобы проще было объяснить азы.</em></p>
|
||||
</div>
|
||||
</body></html>
|
BIN
doc/html/ru/Beginner's Tutorial_Image_001.png
Normal file
After Width: | Height: | Size: 8.6 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_002.png
Normal file
After Width: | Height: | Size: 63 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_003.png
Normal file
After Width: | Height: | Size: 61 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_004.png
Normal file
After Width: | Height: | Size: 61 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_005.png
Normal file
After Width: | Height: | Size: 11 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_007.png
Normal file
After Width: | Height: | Size: 61 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_008.png
Normal file
After Width: | Height: | Size: 59 KiB |
BIN
doc/html/ru/Beginner's Tutorial_Image_009.png
Normal file
After Width: | Height: | Size: 58 KiB |