VeraCrypt 1.19 Bruksanvisning
Läs nedan 📖 manual på svenska för VeraCrypt 1.19 (169 sidor) i kategorin Foto- och/eller videoprogramvara. Denna guide var användbar för 2 personer och betygsatt med 4.5 stjärnor i genomsnitt av 2 användare
Sida 1/169

VERA
VERACRYPT
CRYPT
F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N
USER’S GUIDE
veracrypt.codeplex.com
Version Information
VeraCrypt User’s Guide, version 1.19
Released by IDRIX on October 17th, 2016
Legal Notices
THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY.
THE ENTIRE RISK AS TO THE QUALITY, CORRECTNESS, ACCURACY, OR COMPLETENESS OF THE CONTENT OF THIS
DOCUMENT IS WITH YOU. THE CONTENT OF THIS DOCUMENT MAY BE INACCURATE, INCORRECT, INVALID, INCOMPLETE
AND/OR MISLEADING. IN NO EVENT WILL ANY AUTHOR OF THE SOFTWARE OR DOCUMENTATION, OR ANY APPLICABLE
COPYRIGHT OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR (RE)DISTRIBUTE THIS SOFTWARE OR
DOCUMENTATION, BE LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO,
ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES,
A FAILURE OF THIS SOFTWARE TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING, BUT NOT
LIMITED TO, NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, MODIFICATION, OR (RE)DISTRIBUTION
OF THIS SOFTWARE OR DOCUMENTATION (OR A PORTION THEREOF), OR INABILITY TO USE THIS SOFTWARE OR
DOCUMENTATION, EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR
KNOWN TO ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY.
BY INSTALLING, RUNNING, USING, COPYING, (RE)DISTRIBUTING, AND/OR MODIFYING THIS SOFTWARE, INCLUDING, BUT
NOT LIMITED TO, ITS DOCUMENTATION, OR A PORTION THEREOF, YOU ACCEPT AND AGREE TO BE BOUND BY ALL TERMS
AND CONDITIONS OF THE VERACRYPT LICENSE THE FULL TEXT OF WHICH IS CONTAINED IN THE FILE License.txt
INCLUDED IN VERACRYPT BINARY AND SOURCE CODE DISTRIBUTION PACKAGES.

CONTENTS
Introduction..........................................................................................................................................5
Beginner’s Tutorial...............................................................................................................................6
How to Create and Use a VeraCrypt Container..........................................................................6
How to Create and Use a VeraCrypt-Encrypted Partition/Device............................................23
VeraCrypt Volume..............................................................................................................................24
Creating a New VeraCrypt Volume.............................................................................................................24
Favorite Volumes.........................................................................................................................................27
System Favorite Volumes............................................................................................................................29
System Encryption.............................................................................................................................31
Hidden Operating System........................................................................................................31
Operating Systems Supported for System Encryption.............................................................32
VeraCrypt Rescue Disk............................................................................................................32
Plausible Deniability...........................................................................................................................35
Hidden Volume............................................................................................................................................36
Protection of Hidden Volumes Against Damage......................................................................38
Security Requirements and Precautions Pertaining to Hidden Volumes..................................41
Hidden Operating System...........................................................................................................................45
Main Program Window.....................................................................................................................53
Program Menu............................................................................................................................................ 56
Volumes > Auto-Mount All Device-Hosted Volumes..............................................................56
Volumes > Dismount All Mounted Volumes............................................................................56
Volumes > Change Volume Password......................................................................................56
Volumes > Set Header Key Derivation Algorithm...................................................................56
Volumes > Add/Remove Keyfiles to/from Volume Volumes > Remove All Keyfiles from
Volume......................................................................................................................................57
Favorites > Add Mounted Volume to Favorites Favorites > Organize Favorite Volumes
Favorites > Mount Favorites Volumes.....................................................................................57
Favorites > Add Mounted Volume to System Favorites Favorites > Organize System Favorite
Volumes....................................................................................................................................57
System > Change Password.....................................................................................................57
System > Mount Without Pre-Boot Authentication.................................................................57
Tools > Clear Volume History..................................................................................................58
Tools > Traveler Disk Setup.....................................................................................................58
Tools > Keyfile Generator........................................................................................................58
Tools > Backup Volume Header Tools > Restore Volume Header...........................................58
Settings > Performance and Driver Options.............................................................................59
Settings > Preferences..............................................................................................................60
Mounting Volumes......................................................................................................................................62
Cache Password in Driver Memory.........................................................................................62
Mount Options..........................................................................................................................62
Parallelization.....................................................................................................................................63
Pipelining.............................................................................................................................................63
Hardware Acceleration......................................................................................................................64
2

Hot Keys..............................................................................................................................................65
Keyfiles................................................................................................................................................66
Keyfiles Dialog Window..........................................................................................................66
Security Tokens and Smart Cards.............................................................................................67
Keyfile Search Path..................................................................................................................68
Empty Password & Keyfile......................................................................................................68
Quick Selection........................................................................................................................68
Volumes > Add/Remove Keyfiles to/from Volume..................................................................69
Volumes > Remove All Keyfiles from Volume........................................................................69
Tools > Keyfile Generator........................................................................................................69
Settings > Default Keyfiles......................................................................................................69
Security Tokens & Smart Cards.......................................................................................................71
Portable Mode.....................................................................................................................................72
Tools > Traveler Disk Setup.....................................................................................................72
TrueCrypt Support.............................................................................................................................74
Converting TrueCrypt volumes and partitions...............................................................................74
Default Mount Parameters................................................................................................................75
Language Packs..................................................................................................................................76
Encryption Algorithms.......................................................................................................................77
AES.............................................................................................................................................................. 77
Serpent......................................................................................................................................................... 78
Twofish........................................................................................................................................................ 78
Camellia...................................................................................................................................................... 78
Kuznyechik.................................................................................................................................................. 78
Cascades of ciphers.....................................................................................................................................79
AES-Twofish............................................................................................................................79
AES-Twofish-Serpent...............................................................................................................79
Serpent-Twofish-AES...............................................................................................................79
Twofish-Serpent.......................................................................................................................79
Hash Algorithms.................................................................................................................................80
Supported Operating Systems...........................................................................................................81
Command Line Usage........................................................................................................................82
Security Model....................................................................................................................................87
Security Requirements and Precautions..........................................................................................90
Data Leaks................................................................................................................................90
Unencrypted Data in RAM.......................................................................................................93
Physical Security......................................................................................................................93
Malware....................................................................................................................................94
Multi-User Environment..........................................................................................................94
Authenticity and Integrity........................................................................................................95
Choosing Passwords and Keyfiles...........................................................................................95
Changing Passwords and Keyfiles...........................................................................................96
Trim Operation.........................................................................................................................96
Wear-Leveling..........................................................................................................................97
3
Produktspecifikationer
Varumärke: | VeraCrypt |
Kategori: | Foto- och/eller videoprogramvara |
Modell: | 1.19 |
Färg på produkten: | Zwart |
Förpackningens vikt: | 10400 g |
Förpackningens bredd: | 826 mm |
Djuppackning: | 232 mm |
Förpackningshöjd: | 602 mm |
Skärm diagonal: | 31.5 " |
Upplösning: | 1920 x 1080 Pixels |
Pekskärm: | Nee |
Original bildförhållande: | 16:9 |
Betraktningsvinkel, horisontell: | 178 ° |
Betraktningsvinkel, vertikal: | 178 ° |
Skärmform: | Flat |
Typiskt kontrastförhållande: | 1200:1 |
Frekvensområde horisontellt: | 24 - 83 kHz |
Frekvensområde vertikalt: | 50 - 75 Hz |
DVI-port: | Nee |
Monteringsalternativ för kabellås: | Ja |
Kabellåsspårtyp: | Kensington |
Inbyggda högtalare: | Ja |
Genomsnittlig effekt: | 2 W |
Strömförbrukning (i standby): | - W |
Display, antal färger: | 16.78 miljoen kleuren |
HD typ: | Full HD |
3D: | Nee |
Respons tid: | 5 ms |
Ljusstyrka (typiskt): | 250 cd/m² |
Digital horisontell frekvens: | 24 - 83 kHz |
Digital vertikal frekvens: | 50 - 75 Hz |
Djup (utan bas): | 58.4 mm |
Höjd (utan bas): | 432.8 mm |
Bredd (utan bas): | 729.7 mm |
Vikt (utan bas): | 6850 g |
Enhetsbredd (med stativ): | 729.7 mm |
Djupenhet (med stativ): | 175.5 mm |
Enhetshöjd (med stativ): | 495 mm |
Strömförbrukning (PowerSave): | 0.5 W |
Tunn klient installerad: | Nee |
Bildområde: | Mat |
Bildstorlek (horisontell): | 698.4 mm |
Bildstorlek (vertikal): | 392.85 mm |
AC-ingångsspänning: | 100 - 240 V |
AC-ingångsfrekvens: | 50 - 60 Hz |
Strömförbrukning (typiskt): | 40.5 W |
Tiltvinkelområde: | -5 - 10 ° |
Behöver du hjälp?
Om du behöver hjälp med VeraCrypt 1.19 ställ en fråga nedan och andra användare kommer att svara dig
Foto- och/eller videoprogramvara VeraCrypt Manualer

8 Augusti 2024
Foto- och/eller videoprogramvara Manualer
- Foto- och/eller videoprogramvara Sony
- Foto- och/eller videoprogramvara Nikon
- Foto- och/eller videoprogramvara Canon
- Foto- och/eller videoprogramvara Acronis
- Foto- och/eller videoprogramvara Apple
- Foto- och/eller videoprogramvara Adobe
- Foto- och/eller videoprogramvara Google
- Foto- och/eller videoprogramvara Roland
- Foto- och/eller videoprogramvara Axis
- Foto- och/eller videoprogramvara AVM
- Foto- och/eller videoprogramvara Microsoft
- Foto- och/eller videoprogramvara Korg
- Foto- och/eller videoprogramvara Smartwares
- Foto- och/eller videoprogramvara LevelOne
- Foto- och/eller videoprogramvara Antares
- Foto- och/eller videoprogramvara Hema
- Foto- och/eller videoprogramvara Corel
- Foto- och/eller videoprogramvara Sweex
- Foto- och/eller videoprogramvara Pinnacle
- Foto- och/eller videoprogramvara Roxio
- Foto- och/eller videoprogramvara IoSafe
- Foto- och/eller videoprogramvara PayPal
- Foto- och/eller videoprogramvara Terratec
- Foto- och/eller videoprogramvara ABN AMRO
- Foto- och/eller videoprogramvara Autodesk
- Foto- och/eller videoprogramvara FileMaker
- Foto- och/eller videoprogramvara Atomix
- Foto- och/eller videoprogramvara Magix
- Foto- och/eller videoprogramvara Facebook
- Foto- och/eller videoprogramvara Ulead
- Foto- och/eller videoprogramvara Propellerhead
- Foto- och/eller videoprogramvara LibreOffice
- Foto- och/eller videoprogramvara UNIT4
- Foto- och/eller videoprogramvara Intellinet
- Foto- och/eller videoprogramvara Albelli
- Foto- och/eller videoprogramvara Teklynx
- Foto- och/eller videoprogramvara Omni
- Foto- och/eller videoprogramvara Panduit
- Foto- och/eller videoprogramvara X-Rite
- Foto- och/eller videoprogramvara R-Go Tools
- Foto- och/eller videoprogramvara Gimp
- Foto- och/eller videoprogramvara Foxit
- Foto- och/eller videoprogramvara ABBYY
- Foto- och/eller videoprogramvara Wireshark
- Foto- och/eller videoprogramvara Laplink
- Foto- och/eller videoprogramvara Nik Software
- Foto- och/eller videoprogramvara Paragon
- Foto- och/eller videoprogramvara Western Bank
- Foto- och/eller videoprogramvara Showpad
- Foto- och/eller videoprogramvara Xils Lab
- Foto- och/eller videoprogramvara IRIS
- Foto- och/eller videoprogramvara Nuance
- Foto- och/eller videoprogramvara Cakewalk
- Foto- och/eller videoprogramvara Parallels
- Foto- och/eller videoprogramvara CyberLink
- Foto- och/eller videoprogramvara Lavasoft
- Foto- och/eller videoprogramvara Polyverse
- Foto- och/eller videoprogramvara AccSone
- Foto- och/eller videoprogramvara Mariner Software
- Foto- och/eller videoprogramvara Symantec
- Foto- och/eller videoprogramvara IDIS
- Foto- och/eller videoprogramvara NewBlueFX
- Foto- och/eller videoprogramvara Excire
Nyaste Foto- och/eller videoprogramvara Manualer

21 Februari 2025

28 Januari 2025

26 Januari 2025

26 Oktober 2024

15 Oktober 2024

13 Oktober 2024

6 Oktober 2024

4 Oktober 2024

27 September 2024

25 September 2024