![]() Admittedly, as an avid mouse user, generating random data in this way is a bit fun. The next screen is perhaps my favorite, select a filesystem (I changed the below from FAT to NTFS) and then move the mouse around to generate random data. Note, one does want to remember this password. TrueCrypt recommends a 20 to 64 character password on the next screen. Selecting the volume size on a full disk encryption is an exercise in futility, the entire drive will get encrypted so just click Next here. TrueCrypt select AES encryption for Westmere and Sandy Bridge parts Note that there is a link to the benchmark function used in ServeTheHome reviews here. To take advantage of the Sandy Bridge and Clarkdale desktop processor, Xeon E3, W3600, E5600, X5600, and L5600 series’ AES-NI acceleration, one can use AES encryption on the following page. TrueCrypt create encrypted volume and format it Note, the Encrypt partition in place option is only available in Windows Vista and later, so corporate users of Windows XP may not have this option. Now that the drive is selected, chose Create encrypted volume and format it. TrueCrypt select the correct external drive ![]() The process does require an erase of the drive where all data will be lost, so double or triple check this selection. Next, select the correct drive to encrypt. TrueCrypt Create standard TrueCrypt Volume Next one wants to create a “Standard TrueCrypt Volume”, as one will notice from the example of when a Hidden TrueCrypt volume is useful, TrueCrypt does scale for the needs of the paranoid. TrueCrypt Encrypt a non-system partition-drive There are clearly other options here, but the goal of this guide was to show how to encrypt an external non-system drive. Next, select “Encrypt a non-system partition/ drive”. Once this is done select “Create Volume”. ![]() For this example, I am using a spare 4GB OCZ Rally2 drive normally on BIOS flash duties. Power Supply: Supermicro 300w (included in the SC731i-300B)Ĭreating the TrueCrypt Volume on an External Driveįirst one needs to start TrueCrypt with the external drive attached.Additional NICs: Intel Gigabit CT PCIe x1 network adapter.Additional Drives: Corsair Performance 3 Series P3-128, OCZ Rally 2 4GB USB Drive.I am using a Sandy Bridge test bed here as the Cougar Point SATA 6.0gbps controller is perhaps the best 6.0gbps SATA controller on the market at the moment. However, TrueCrypt can be used on system disks and RAID arrays also which can easily exceed a few GB/s in aggregate transfer rates. For most external media, the 32nm parts can encrypt data at a rate many times the media rate which may make the speed seem excessive. One will notice that the 32nm Intel parts have AES-NI and absolutely fly when doing encoding. TrueCrypt is one of those awesome open source utilities that can help secure data. I have used the TrueCrypt benchmark in many reviews including the new Xeon E3-1280, Xeon E3-1220, E3-1230, dual E5606, and W3550 CPUs, as well as the Sandy Bridge i7-2600K and i5-2500K pieces over the past few weeks. Oftentimes this can be done as part of a manual off-site backup process for important data or simply when moving sensitive data off of a server, for example with employee records, company records, litigation files, and mergers and acquisitions related documents that need to be used on a notebook without network access. Many users end up using external removable media for their server’s important data.
0 Comments
Leave a Reply. |