Encryption virtual machine. Encrypt hard disk and virtual machine. How to choose a container name and disguise it

When you select a virtual machine from the list in the Manager window, you will see a summary of this settings. virtual computer.

By clicking the " Settings»On the toolbar at the top, you will see a detailed window in which you can configure many properties of the selected virtual machine. But be careful: despite the fact that after installing the guest operating system, you can change all the virtual machine settings, some changes can interfere with the correct operation of the guest operating system if it is done after installation.

Note: Button " Settings"Disabled when a virtual machine is in" running" or " saved"Condition. It is simply because in the settings dialog box you can change the basic characteristics of the virtual computer created for your guest operating system, and this operating system may not cope very well when, for example, half of its memory will leave her from under his feet. As a result, if the button " Settings"Disabled, first turn off the current virtual machine, and then you can perform the desired settings.

VirtualBox provides many parameters that can be changed for a virtual machine. More options are available with the VirtualBox command line interface.

General settings

In the window " Settings" In chapter " General»You can configure the most fundamental aspects of a virtual machine, such as memory and necessary hardware. There are four tabs: " Maintenance», « Additionally», « Description"And" Encryption».

Tab "Main"

On the tab " Maintenance" categories " General»You can find the following settings:

This is the name with which the virtual machine is displayed in the list of virtual machines in the main window. Under this name, VirtualBox also saves the virtual machine configuration files. By changing the name, VirtualBox also renames these files. As a result, you can only use those characters that are allowed in the file names of your host operating system.

Please note that within VirtualBox uses unique identifiers (UUID) to identify virtual machines. You can display them using VBoxManage.

Operating system / version

A typeguest operating system, which is installed (or will) in a virtual machine. This is the same parameter that was specified in the "New Virtual Machine" wizard, as described in the "" section.

While the default settings for the newly created virtual machine depend on the selected type of operating system, the further modification of the type does not affect the virtual machine settings; This is the value that the settings in this panel are purely information and decorative.

Tab "Advanced"

Folder for pictures

By default, VirtualBox saves snapshot data along with other VirtualBox configuration data. With this parameter, you can specify any other folder for each virtual machine.

Common clipboard

Here you can choose whether you should be used together with your host general access To the buffer of the guest operating system. If you choose " Bidirectional"The VirtualBox will always make sure that both clippers of the exchange contain the same data. If you choose " From the main to the guest officer" or " From the guest in the main OS"The VirtualBox will copy the exchange buffer data only in one direction.

To share the clipboard, install VirtualBox guest add-ons. Otherwise, this setting has no effect.

The overall clipboard is disabled by default. This parameter can be changed at any time using the menu item " Common clipboard" on the menu " Devices»Virtual machine.

Drag and Drop function (dragging)

This parameter allows you to enable drag and drop support: Select an object (for example, a file) from a host or a guest and directly copy or open it on a guest or host machine. Several drag and drop modes for each virtual machine allow you to limit access in any direction.

Guest add-ons must be installed for dragging onto the guest computer.

Note: By default, dragging is disabled. This parameter can be changed at any time using the menu item " Drag and Drop." on the menu " Devices»Virtual machine.

Tab "Description"

Here you can, if you want, enter any description of your virtual machine. This does not affect the functionality of the computer, but you can find this space useful to mark such things as the configuration of the virtual machine and softwarewhich was installed in her.

To insert a string break into the description text field, click Shift + Enter..

Tab "Encryption"

If you are tick, this virtual machine will be encrypted. You need to choose an algorithm that will be encrypted virtual machine discs, as well as enter, and then confirm the encryption password.

System settings

Group " System»Combines various parameters associated with the main equipment, which is represented by a virtual machine.

Note: Since Microsoft Windows activation mechanism is sensitive to changes in hardwareIf you change the equipment settings for the Guests of Windows, some of these changes may initiate a request for activation in Microsoft.

Tab "Motherboard"

On the tab " Motherboard»You can affect virtual equipment that is usually located on a real computer motherboard.

Main memory

This option sets the RAM volume, which is allocated and transmitted by a virtual machine when it starts. The specified amount of memory at the time of operation of the virtual machine will be closed from the physical computer and transmitted virtual. Consequently, at the time of the virtual machine, your main computer number random access memory decrease this magnitude. This is the same parameter that was specified in the "New Virtual Machine" wizard, as described above in the "" section.

Changing the memory should not cause problems in the guest car, of course, if you do not set too small value at which it will not be loaded.

Order order

This parameter determines the order in which the guest operating system will try to load from various virtual boot devices. Similarly setting up bios. Real PC, VirtualBox can inform the guest OS that it starts with a virtual diskette, a virtual CD / DVD drive, a virtual hard disk (each of them is determined by other VM settings), network or any of them.

If you choose " Net", The virtual machine will try to upload from the network through the PXE mechanism to be configured.

Chipset

Here you can choose which chipset will be presented by a virtual machine. Prior to VirtualBox 4.0 PIIX3 was the only available option. For modern guest operating systems, such as Mac OS X, this old chipset is no longer supported. As a result, VirtualBox 4.0 introduced the emulation of a more modern set of ICH9 chip, which supports PCI EXPRESS., Three PCI tires, PCI-to-PCI bridges and messages with interrupt signals (MSI). This allows modern operating systems to address more PCI devices and no longer requires IRQ exchange. Using the ICH9 chipset, you can also configure up to 36 network cards (up to 8 network adapters with PIIX3). Please note that support for ICH9 is experimental and is not recommended for guest operating systems that do not require it.

Cursor manipulator

By default, virtual index devices for the ancient guests are traditional pS / 2 mouse. If this parameter is set to uSB tablet, VirtualBox informs the virtual machine that the device uSB tablet present, and transmits the mouse events to the virtual machine using this device. Third setting - USB Multi-Touch Tabletwhich is suitable for the latest Windows guests.

The use of a virtual USB tablet has the advantage that motions are communicated in absolute coordinates (instead of relative position changes), which allows VirtualBox to broadcast the mouse events over the VM window in the tablet event without the need to "capture" the mouse in the guest system as described in the "" section. This makes the use of VM less tedious, even if guest add-ons are not installed.

Enable APIC I / O APIC

Extended programmable interrupt controllers (APICs) are the latest HP86 hardware function, which in recent years has replaced the programmable interrupt controllers of the old type (pos). With APIC I / O oS More than 16 interrupt requests (IRQ) and, therefore, avoid exchanging IRQ to increase reliability.

Note: Including I / O APIC required for 64-bit guest operating systems, especially Windows Vista; It is also necessary if you want to use more than one virtual processor on the virtual machine.

However, software support for APIC I / O was unreliable with some operating systems other than Windows. In addition, the use of an APC I / O APC slightly increases virtualization overhead and, therefore, slightly slows down the guest OS.

A warning: All Windows operating systems, starting with Windows 2000, establish different cores depending on whether APIC I / O is available. As in the case of ACPI, APIC I / O APEC should not be disconnected after installation of the Windows guest OS. The inclusion of it after installation will not have any effect.

Enable EFI

This allows you to use Extensible Firmware Interface (EFI), which replaces the outdated BIOS and can be useful for some advanced use options.

Clock in the UTC system

If the tick is standing, the clock of your host will appear on the time of the worldwide coordination scale (UTC), otherwise the local host time will be displayed. Unix-like systems usually adhere to UTC systems.

If the checkbox is set, VirtualBox will inform the guest system time in UTC format instead of a local (host) time. This affects the work of Virtual Watch Real Time (RTC) and can be useful for UNIX-like guest operating systems that usually expect hardware clocks will be installed on UTC.

In addition, you can disable the Advanced Configuration and Power Interface (ACPI), which VirtualBox represents the default guest operating system. ACPI is the current sectoral standard that allows operating systems to recognize the equipment, configure motherboards And other devices and manage them. Since all modern PCs contain this feature, and Windows and Linux supported it for many years, it is also enabled by default in VirtualBox. It can be turned off only in command line.

A warning: All Windows operating systems starting with Windows 2000, set different kernels, depending on whether ACPI is available, so ACPI cannot be disabled after installing the Windows guest OS. The inclusion of it after installation will not have any effect.

Tab "Processor"

On the tab " CPU»You can specify how many virtual processor cores should see guest operating systems. Starting from version 3.0, VirtualBox supports symmetrical multiprocessing (SMP) and can represent up to 32 virtual processor cores for each virtual machine.

However, you should not customize virtual machines for the use of more processor cores than you have physically (real nuclei, without hyperpotions).

On this tab you can also install " CPU loading limit" This parameter limits the time spent the host processor to emulate the virtual processor. The default value is 100% means that there are no restrictions. The 50% parameter implies that one virtual processor can use up to 50% of one central processor. Please note that the time limit of virtual processors can cause problems with guests.

In addition, the parameter " Enable PAE / NX"Determines whether the possibilities of the PAE and NX central processor will be on the virtual machine. PAE means "extension of the physical address". Usually, if it is turned on and maintained by the operating system, then even a 32-bit X86 processor can access more than 4 GB of RAM. This was made possible by adding another 4 bits to the memory address, so that with 36 bits you can use up to 64 GB. Some operating systems (for example, Ubuntu Server) Require the support of PAE from the CPU and cannot work without it in the virtual machine.

If you use a 32-bit Kali Linux image, turn on the PAE / Nx or the KALI image will not load, since the default version of the kernel used by Kali for i386 ("686-PAE") is compiled in this way that requires support for the "extension of the physical address" ( PAE) in CPU.

With virtual machines working on modern server operating systems, VirtualBox also supports the hot connection of the CPU.

Tab "Acceleration"

On this page you can determine if VirtualBox should use hardware virtualization extensions that your host processor can support. This applies to most processors built after 2006.

You can choose for each virtual machine individually, whether VirtualBox need to use software virtualization or equipment.

In most cases, the default settings will be excellent; VirtualBox will choose reasonable default values \u200b\u200bdepending on the operating system you selected when creating a virtual machine. However, in some situations you can change these pre-configured default values.

If your host processor supports invested pajing functions (AMD-V) or EPT (Intel VT-X), you can expect a significant increase in productivity by incorporating invested paging in addition to hardware virtualization.

Starting with version 5.0, VirtualBox provides paratage interfaces to improve the accuracy and performance of guest operating systems.

Display (display settings)

Screen Tab

Video memory size

This sets the memory size provided by a virtual video card available to the guest in MB. As in the main memory, the specified amount will be highlighted from the host residency memory. Based on the number of video memory can be available more high permissions and color depth.

GUI will show a warning if the volume of the video memory is too small to switch the virtual machine into full screen mode. The minimum value depends on the number of virtual monitors, the screen resolution and the depth of the host display, as well as from the activation of the 3D acceleration and accelerate 2D video. Rough estimation: (color depth / 8) x vertical pixels x horizontal pixels x number screens \u003d number bytes. As described above, additional memory may be required for any activated display acceleration setting.

Number of monitors

With this VirtualBox parameter can provide more than one virtual virtual machine monitor. If the guest operating system (for example, Windows) supports several connected monitors, VirtualBox can pretend that there are several virtual monitors. Up to 8 such virtual monitors is supported.

The output of multiple monitors will be displayed on the host in several VM windows that work side by side.

However B. full-screenand screen Integration Mode Available physical monitors connected to the host will be used. As a result, to work in full screen mode And the screen integration mode with multiple monitors you will need at least as many physical monitors as you have configured virtual monitors, or VirtualBox will report an error. You can configure the connection between the guest and host monitors using the viewing menu by pressing the combination "Host" + "Home"When you are in full screen or screen integration mode.

Turn on 3D acceleration

If guest add-ons are installed on the virtual machine, you can choose here if the guest must support the accelerated 3D graphics.

Enable 2D video acceleration

If guest add-ons are installed on a virtual machine with Microsoft Windows, you can choose here if the guest must support the accelerated 2D graph.

Tab "Remote Access"

Remote display

On the tab " Remote access"If VirtualBox Virtual Display Expansion (VRDE) is set, you can enable the VRDP server built into VirtualBox. This allows you to remotely connect to the console of the virtual machine using any standard tool Viewing RDP, such as mstsc.exe.which comes with Microsoft Windows. In Linux and Solaris systems, you can use the standard program. rdesktop.open source.

Tab "Capture Video"

On the tab " Capture video»You can enable video capture for this virtual machine. Please note that this feature can also be enabled / disabled while performing a virtual machine.

Media settings

On the real PC, the so-called "storage controllers" are connected physical disks to the rest of the computer. Similarly, VirtualBox provides virtual virtual machine controllers to a virtual machine. Under each controller displays virtual devices (hard drives, CD / DVD or floppy drives) connected to the controller.

Note: If you used the master " Create a virtual machine»To create a car, you will usually see something like the following:

Depending on the type of guest operating system, which you selected when creating a virtual machine, a typical layout of storage devices in the new virtual machine is as follows:

  • You will see the controller IDEto which a virtual CD / DVD drive is connected (to the port " secondary master»IDE controller).
  • You will also see the controller. SATA.which is a more modern type of storage controller to increase bandwidth Hard disk to which virtual hard drives are attached. Initially, you will usually have one such virtual disk, but maybe more than one, each of which is submitted by the disk image file (in this case, the VDI file).

If you have created your virtual machine with more old version VirtualBox, the default storage layout may differ. Then you can only have an IDE controller to which CD / DVD drive and hard drives are connected. It can also be applied if you have chosen an older type of operating system when creating a virtual machine. Since older operating systems do not support SATA without additional drivers, VirtualBox will ensure that such devices are not present initially.

VirtualBox also provides a flexible controller, which is special: You can not add to it devices other than floppy drives. Virtual floppy drives, such as virtual CD / DVD drives, can be connected either to drive disks (if any), or to the disk image, which in this case should be in the RAW format.

You can freely change these attachments. For example, if you want to copy some files from another created virtual disk, you can connect this disk as a second hard disk. You can also add a second virtual CD / DVD-drive or change where these items are attached. The following parameters are available:

  • To add other virtual hDD or CD / DVD or floppy disk drive, select the storage controller to which it must be added (IDE, SATA, SCSI, SAS, Floppy Disk Controller), and then click " add disc"Low on wood. Then you can choose " Add CD / DVD device" or " Add hard drive" (If you are clicked on the flexible disk controller, you can add a flexible disc drive.) Alternatively, click right-click Mouse storage controller and select the menu item there.

On the right side of the window you can set the following:

  1. You can then choose to which slot of the controller device is connected virtual disk. IDE controllers have four slots that are traditionally called " main master», « primary subordinate», « secondary master"And" secondary subordinate" On the contrary sATA controllers And SCSIs offer up to 30 slots to which virtual devices can be connected.
  2. You can choose which image file to use.
  • For virtual hard drives to the right, a button with a drop-down list appears, offering or select a virtual hard disk file using a standard file dialog, or create a new hard disk (image file) that will open the master " Create a new disk", Which was described in the" "section.
  • For virtual CD / DVDs, image files will usually be in standard ISO format. Most often you will choose this option when installing the operating system from the ISO file that you received from the Internet. For example, most Linux distributions are available in this way.

The following additional options are available for virtual CD / DVD drives:

  • If you select " Host drive"The physical host computer will be connected to the virtual machine so that the guest operating system can read and write to your physical device. This, for example, is useful if you want to install Windows from a real setting CD. In this case, select your host disc from the drop-down list.

If you want to write (burn) CDs or DVDs using the main disk, you also need to enable the option " Passthrough».

  • If you choose " Remove disk from a virtual disk", VirtualBox will present an empty CD / DVD to the guest in which the media was not inserted.
  • To delete attachment, Select it and click on the " delete»At the bottom (or right-click it and select the menu item).

Removable media (CD / DVD and floppy disks) are subject to change during guest operation. Since at this time the dialog box " Settings"Not available, you can also access these settings from the menu" Devices»In the window of your virtual machine.

Sound settings

Section " Audio" in the window " Settings»The virtual machine determines whether the virtual machine will see the connected sound card And if the sounds should be heard in the main system.

If the sound is enabled for the guest, you can select the Intel AC controller emulation, the Intel HD Audio controller or SoundBlaster 16 card. In any case, you can choose which VirtualBox audio driver will be used on the host.

On the Linux host, depending on the configuration of your host, you can also choose between OSS, ALSA or PulseAudio subsystem. In newer distributions Linux Preferably Pulseaudio subsystem.

Since the Solaris hosts in VirtualBox 5.0 support only the OSS - SOLARIS AUDIO audio system is no longer supported by Solaris hosts.

Settings Network

Section " Net" in the window " Settings»The virtual machine allows you to configure how VirtualBox represents virtual network cards for your virtual machine and how they work.

When you first create a virtual machine, the default VirtualBox includes one virtual network card and selects it for it " Broadcast network addresses "(NAT). Thus, the guest can connect to the outside world using the host network, and the outside world can be connected to services on the guest computer, which you made visible outside the virtual machine.

This default setting is good for, probably 95% of VirtualBox users. Nevertheless, VirtualBox is extremely flexible in how it can virtualize the network. It supports many virtual network cards on a virtual machine, the first four of which can be detailed in the "Manager" window. Additional network cards can be configured on the command line using VBoxManage.

Introduction to network modes

Each of eight network adapters can be configured separately to work in one of the following modes:

Not connected

In this mode, VirtualBox reports the guest that there is a network card, but there is no connection - as if the Ethernet cable is not inserted into the map. Thus, you can "pull out" the Ethernet virtual cable and disrupt the connection, which can be useful to inform the guest operating system on the inability to connect to the network and ensure reconfiguration.

Network Address Broadcast (NAT)

If you only want to view web pages, download files and view email inside the guest, then this default mode will be enough for you, and you can safely skip the remaining part of this section. Note that when using sharing windows files There are certain limitations.

Network Nat.

Nat Nat is a new NAT version embedded in VirtualBox 4.3. Network Address Translation Service (NAT) Works similarly to a home router, grouping systems that use it on the network, and does not allow systems outside this network to directly access systems inside it, but allows systems inside to interact with each other and with systems outside using TCP and UDP via IPv4 and IPv6.

Network Bridge

This is for more complex network tasks, such as network modeling and running servers in the guest system. When enabled, VirtualBox connects to one of the installed network cards and communicates directly by network packets, bypassing the network stack of your operating system.

Internal network

This can be used to create another network based on software that is visible for selected virtual machines, but not for applications running on the host or in the external world.

Virtual host adapter

This can be used to create a network containing a host and a set of virtual machines, without the need for a physical network interface. Instead, the host creates a virtual network interface (similar to the LOOPBACK interface), which provides interaction between virtual machines and the host.

Universal Driver

Rarely used modes use the same shared network interface, allowing the user to choose a driver that can be enabled in VirtualBox or distributed in the extension package.

On the this moment There are potentially two available under-modes:

UDP tunnel

This can be used for direct, simple and transparent interaction of virtual machines operating on different computers, with existing network infrastructure.

VDE network (virtual distributed Ethernet)

This parameter can be used to connect to the Virtual Distributed Ethernet switch on Linux or FreeBSD host. At the moment it requires compilation of VirtualBox from sources, as Oracle packages do not include it.

The following table shows short review The most important network modes:

VM ↔ Host. VM1 ↔ VM2. VM → Internet Vm ← Internet
Virtual host adapter + + - -
Internal network - + - -
Network Bridge + + + +
Network Address Broadcast (NAT) - - + Forwarding ports
Network Nat. - + + Forwarding ports

COM ports (serial ports)

VirtualBox. simple way Fully supports virtual serial ports on a virtual machine.

USB settings

USB support

Section " USB" in the window " Settings»The virtual machine allows you to configure the complex USB support VirtualBox.

VirtualBox allows virtual machines Directly access USB devices on your host. For this, VirtualBox represents a guest operating system with a virtual USB controller. As soon as the guest system begins to use the USB device, it will not be available on the host.

Note:

  1. Be careful with USB devices that are currently used on the host! For example, if you allow your guest when you activate it to connect to the USB hard disk, which is currently installed on the host, then this disc will be disconnected from the host without proper disconnection. This can lead to data loss.
  2. The Solaris hosts have several well-known restrictions on USB support.

In addition to the guest access permission to your local USB devices, VirtualBox allows you even to your subscribers to connect to remote USB devices using VirtualBox Remote Desktop Extension (VRDE).

In the dialog box Settings»You can first configure whether USB is available in the guest system, and then select USB support level: OHCI for USB 1.1, EHCI (which will also turn on OHCI) for USB 2.0 or XHCI for the entire USB speed.

Note: XHCI and EHCI controllers are supplied as a VirtualBox extension package, which should be installed separately. For more information, see "".

When USB support is enabled for a virtual machine, you can determine in detail which devices will be automatically connected to the guest. To do this, you can create so-called "filters" by specifying certain properties of the USB device. USB devices with an appropriate filter will be automatically transmitted by the guest after they are connected to the host. USB devices without an appropriate filter can be handed to a guest, for example, using the menu Devices / USB devices.

Click on the button " + »Right from the window" USB devices filters"Creates a new filter. You can give a filter name (for reference to it later) and specify the filter criteria. The more criteria you will specify, the more accurate devices will be selected. For example, if you specify only the identifier of the 46D provider, all devices created by Logitech will be available to the guest. On the other hand, if you fill in all fields, the filter will be applied only to a specific device model from a particular supplier, and not to other devices of the same type with another version and serial number.

The following criteria are available in the USB filter properties:

  1. Identifier supplier and product. Each supplier of USB products has an identification number, unique worldwide, "Supplier identifier. Similarly, each row of products is assigned the number "Product Identifier". Both numbers are usually written in hexadecimal form (that is, they consist of numbers 0-9 and letters a-f), and the colon separates the supplier from the product identifier. For example, 046D: C016 means Logitech as a supplier and M-UV69A Optical Wheel Mouse.

In addition, you can also specify " Manufacturer"And" Product" by the name.

To list all USB devices connected to your machine with the appropriate identifiers of suppliers and products, you can use the following command:

Vboxmanage List USBHOST.

In Windows, you can also see all USB devices connected to your system in device manager. In Linux you can use the command lsusb..

  1. Serial number. Although the identifiers of suppliers and products are already sufficiently specific to identifying USB devices, if you have two identical devices of one brand and product line, you will also need serial numbers For their correct filtering.
  2. Remote. This parameter indicates whether the device will be only local or remote (only via VRDP) or any other.

On the Windows host you need to disable and connect the USB device again to use it after creating a filter for it.

For example, you can create a new USB filter and specify the identifier of the supplier 046D (Logitech, Inc), the manufacturer's index 1 and "not deleted". Then any USB guest systems created by Logitech, Inc with the manufacturer 1 index will be visible to the guest system.

Several filters can choose one device - for example, a filter that selects all Logitech devices, and the one that selects a specific webcam.

You can deactivate Filters without removing them by clicking the checkbox next to the filter name.

Common folders

Shared folders allow you to easily exchange data between the virtual machine and your host. This feature requires the VirtualBox guest add-ons on a virtual machine. It will be described in more detail in the part dedicated to guest additions, in the "" section.

User interface

Section " User interface»Allows you to change some aspects of the user interface of this virtual machine.

Link menu

This widget allows you to disable specific menus (click on the menu item to release it), some entries of the menu (uncheck the checkbox in the item to shut down) and the menu bar fully (uncheck the right check box).

Mini Tulbar

In full screen or screen integration, the VirtualBox screen can display a small toolbar containing some items that are usually available in the virtual machine menu bar. This toolbar boils down to a small gray line while you do not press it with the mouse. Using the toolbar, you can return from the full screen or screen integration mode, perform the control of the machine or turn on certain devices. If you do not want to see the toolbar, disconnect this option.

The second setup allows you to display the toolbar at the top of the screen, and not show it down.

Bar status

This widget allows you to disable certain icons in the status bar (uncheck the flag from the icon to turn it off) to change the icons in places (for this drag the icon) and completely disable the status bar (uncheck the left checkbox).

Encrypt hard disk and virtual machine

Introduction:
Want to have a removable USB disk with your favorite operating system and fully encrypted? If you need to get, I connected to any compaction, worked, removed ... taken with hard, the info will not read. Do not you want this? Full work space in encrypted form. In this began to become, we will not talk about hiding IP and ways of anonymous movement over the network, here we will analyze in detail how to protect your PC. I encrypt the hard disk and install the virtual machine inside, plus we configure. All your black activity will be stored on a separate disk in an encrypted container.

The instruction is suitable for Mac and Windows users. In it we will describe how to create an encrypted container on separately uSB diskFor example, we will install a virtual machine with any operating system inside our disk.

Create an encrypted container with TrueCrypt:

IMPORTANT: For the beginning you need to download TrueCrypt, but then the case is dumb like the Americans recently bought them and now on official website offered to download the BitLocker analog program. Most likely the suspended software! For Win, Xos and Linux I advise you to find TrueCrypt 7.2.

Download TrueCrypt 7.2 Stable version and install:

TrueCrypt for Windows.
In the attachment download the installation Fal (Pass on the archive: site), there is a clean TrueCrypt 7.2 for Windows.

TrueCrypt for MAC.
In the attachment, download the installation Fal (Pass on the archive: site) the latest and stable version for XOS.

Run and install!

Instructions are suitable for users Mac and Windows.

Run and press the button Create top

We celebrate item Create an Encrypted File Container and Zhmem. Further

Here you choose Normal Tom and Zhmem. Further

An important point !!!

Here we offer to choose the path where the container and its name will be saved.

How to choose a container name and disguise it?

The name of the container can be any, foto.rar, Timati.mp3 and so on, I advise it to disguise, for example, download the DVD movie and inside the folders to replace the main file. Options can be invented a lot.

Way:
Here you can go 2 ways.
1) Save this container to a computer. Then just in the folder with movies, for example, we save the container for the name of the film and with the desired extension. You can always consequently rename the container file and transfer it to any other media.

Selecting a USB media:
Since we will use the 3 SERPENT-TWOFISH-AES encryption algorithm and SHA-512 hash, we have a lot of speed and on this I advise you to buy a good and fast USB SSD disk.

And so we chose the place and the name for our container, click Next and see.
We recommend making a password more than 20 characters including letters, special characters, numbers.

Congratulations, you created an encrypted container.

Now we need to open the container that an encrypted disc appears in the conductor where we will install a virtual machine. To do this, select any disc in the main window of the TrueCrypt program, press the "Select File ..." button, then choose the path to our container and click add.

Click the "Mount" button next step, enter the password and click OK.

All our encrypted disk is open and now we can save any files there.

Carefully treat the disconnection of this disc, close all files and virtual machines that work from this disk and press the DISTOUNT ALL button in TrueCrypt.

If the container is closed, then without passing it. Set passwords from 30 characters, it will protect you from Bruta.

Installing a virtual machine on an encrypted container:

The encrypted disk is open and ready to install virtually machines.

For mas you need to download and install Paralells

You can put any OS, read detailed manuals on the official website or online.

To raise the virical car under Windows we need VMware or VirtualBox

Installing vmware.

Installing VirtualBox

IMPORTANT: After installing virtually machines, turn off all
Synchronization with the main OC "Summer Hard Dist ....

Yester in the morning a free cross-platform virtual machine Oracle VirtualBox version 5.0 was released. Among improvements: Drag-and-drop files and folders, encryption hard disk on the fly and much more. A brief list of improvements under the cut, you can download from the official site.

Improved pathrahritualization

Significantly improved the speed of the guest Windows and Linux due to the fact that Guest Additions better modify them to work in a virtualized environment.

Improved processor virtualization

Guest operating systems are now available even more. cPU instructionswhich can take advantage of modern programs running on these operating systems.

Support USB 3.0

Guest operating systems can now interact with uSB devices 3.0 at full speed.

Bilateral DRAG-AND-DROP on Windows

If VirtualBox is running on Windows, then double-sided DRAG and DROP files and folders for guest Windows, Linux and Solaris!

Virtual Machine Disks Encryption

The virtual machine disc can be encrypted in real time according to the AES algorithm with a key length of 256 bits.

Detach Mode.

GUI can now be closed, leaving the virtual machine to work in the background. I waited for this last five years.

Many of us, on debt service or simply from curiosity, it was necessary to hide Windows from prying eye. As practice shows, using Linux cars in the office - does not always respond to the tasks set, and periodically, especially immediately after switching to Linux, some tasks still have to be performed in an alternative OS.

For these purposes, you can use virtual machines. There are many solutions of this issue, both free and not very, but today we stopped at VirtualBox. Download and install it will not be any difficulty, how to install the OS you need.

The problem is that VirtualBox, like any program you have installed, is available for viewing the one who is behind your computer, working with your account. Well, when there is no one for the computer, except you. And if suddenly?
To prevent such troubles, I decided to "hide" a virtual machine. For these purposes, I chose TrueCrypt.

You can install the TrueCrypt package by downloading it from the official website or using Y PPA Manager. Let me remind you that to install Y PPA Manager, you must complete the following set of commands:

sudo Add-APT-Repository PPA: WebUpd8Team / Y-PPA-Manager
sudo Apt-Get Update
sudo APT-Get Install Y-PPA-Manager

These teams will add repository with the above package manager, which he, by the way, pulls with Launchpad.net.
After these procedures, we discover Y PPA Manager select storage search.
In the search you need to drive TrueCrypt.

From the list of "Repp", you need to select i2p.packages by pressing the Add button.
After that, it is necessary to wait for the message that the repository is added and the list of packages is updated. ATTENTION, the procedure may take about 60-90 seconds, take patience.

After that, you can easily put a cover TrueCrypt team
Sudo Apt-Get Install TrueCrypt

After TrueCrypt is installed, you can start.

1) CREATE VOLUME - I will create an encrypted disk flange. It should be noted that the repository should be 3-4 GB more than the sizes of both virtual machine disks. The size of the VM discs can be viewed in its properties.

2) Create an encrypted container (point number 1).

3) Choose anything to the soul: a hidden or ordinary container.

4) you need to choose a place and specify the file name. The file name should be specified in the Name string.

6) After that, choose the size of the volume. Remember about 3-4GB needs to be left in stock.

7) Password. Come up with it not the shortest, but it's not worth the insanity, because You will have to enter you everyday.

8) file system. It is worth noting that the file hard disk your virtual machine will be noticeably more than 4 GB (in most cases), and therefore file System It is better to choose EXT3. In the old version of TrueCRYPT, you need to answer that yes, I will store files more than 2GB, and item that the container will be used only in Linux systems.

9) The following item generates a random sequence, which the entire container will be encrypted, it is worth the dark to pull the mouse and press the "Format" button.

10) the last item will be the question of the desire to create another encrypted volume.

After all the procedures, half the path is passed.

1) This is a mount point. For our purposes, it is necessary to mount all the time for the same place, because The road is important.

2) You need to select the container file that we created in previous paragraphs.

3) The button mounts the selected image.

After that, you will need to enter the volume password and the administrator password.

After which we perform moving hard disks In the container. Container is in / media

After moving the disks, you should re-create a virtual machine, specifying the location of the disks in the encrypted storage.

That's all.

Before each start, VM needs to open TrueCrypt and connect the encrypted container. After work - perform an unmounting and that's it. Your virtual machine is reliably hidden.

A drop in performance with everything is noticeable only when the system is loaded.


Top.