A completely different animal, full-disk encryption is said to be a more secure alternative to a container-based approach. You can either encrypt whole partitions (Windows or otherwise), or a full physical disk. What TrueCrypt will do in this case is place its own boot-loader, which will allow booting Windows off the encrypted partition (should you choose to encrypt your system/Windows partition or your whole drive). Please note that the procedure outlined below is meant only if you have Okb operating system—if you have a multi-boot system, proceed at your own risk as data loss can occur. bncrypting systems with multiple operating systems requires a separate article, and is beyond the scope of this one.
The initial steps are similar to creating a container; start TrueCrypt, and click Create Volume. Here, select Option 2 or 3, depending on whether you want to encrypt the Windows partition or drive; or select a partition only. Let’s select Option 3 ( Encrypt the system partition or entire system drive) for this example, to encrypt the Windows (‘system’) partition. TrueCrypt may then prompt for extra details— select Normal mode and then choose ‘ Encrypt the Windows system partition’ on the next screen.
At this stage, you will be asked for the type of boot HnYLrRnPHnW yRu wDnW FRnfigurHd ()LgurH 4). 6HOHFW Single Boot and press Next. On the Encryption Options screen, keep the default (AbS) encryption algorithm, just as you did earlier. Subsequently, enter a password, and in the next step, generate some randomness by whizzing the mouse pointer over the dialogue, as before.
Since you are dealing with the Windows partition, TrueCrypt will prompt you to create a rescue disc for a ‘rainy day’. Let’s create one, and proceed through the wizard, which will ask you to Burn (see Figure 5) and Verify the disk. Once WhH YHrLfiFDWLRn LV FRPSOHWH, yRu FDn FRnWLnuH.
At the next screen, select the wipe mode to deal with free space (Figure S). I chose to leave it at None. Continue the wizard,
Figure 4: Select the single-boot option
Figure 3: Randomising encryption keys, formatting volume