亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? truecrypt.1

?? truecrypt-4.2a-source-cod 文件虛擬磁盤源代碼
?? 1
字號:
.\" DO NOT MODIFY THIS FILE!  It was generated by help2man 1.35.
.TH TRUECRYPT "1" "July 2006" "truecrypt 4.2a" "User Commands"
.SH NAME
truecrypt - manage TrueCrypt volumes
.SH SYNOPSIS
.B truecrypt
[\fIOPTIONS\fR] \fIVOLUME_PATH \fR[\fIMOUNT_DIRECTORY\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI-i\fR
.br
.B truecrypt
[\fIOPTIONS\fR] \fI-c | --create | -C | --change \fR[\fIVOLUME_PATH\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI-d | --dismount | -l | --list \fR[\fIMAPPED_VOLUME\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI--backup-headers | --restore-header FILE \fR[\fIVOLUME\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI--properties \fR[\fIVOLUME_PATH\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI--keyfile-create FILE\fR
.br
.B truecrypt
\fI-h | --help | --test | -V | --version\fR
.SH DESCRIPTION
Manages encrypted TrueCrypt volumes, which can be mapped as virtual block
devices and used as any other standard block device. All data being read
from a mapped TrueCrypt volume is transparently decrypted and all data being
written to it is transparently encrypted.
.SH OPTIONS

VOLUME_PATH [MOUNT_DIRECTORY]
.IP
Open a TrueCrypt volume specified by VOLUME_PATH and map it as a block device
/dev/mapper/truecryptN. N is the first available device number if not
otherwise specified with \fB\-N\fR. To map a hidden volume, specify its password
and/or keyfiles (the outer volume cannot be mapped at the same time).
Filesystem of the mapped volume is mounted at MOUNT_DIRECTORY if specified.
See also options \fB\-\-display\-password\fR, \fB\-\-filesystem\fR, \fB\-k\fR, \fB\-M\fR, \fB\-p\fR, \fB\-P\fR,
\fB\-\-password\-tries\fR, \fB\-r\fR, \fB\-u\fR, \fB\-\-update\-time\fR. Note that passing some of the options
may affect security or plausible deniability. See options \fB\-i\fR and \fB\-p\fR for more
information.
.PP
\fB\-\-backup\-headers\fR BACKUP_FILE [VOLUME_PATH]
.IP
Backup headers of a volume specified by VOLUME_PATH to a file BACKUP_FILE.
Volume path is requested from user if not specified on command line. Both
normal/outer and hidden volume headers are stored in the backup file even
if there is no hidden volume within the volume (to preserve plausible
deniability). When restoring the volume header, it is possible to select
which header is to be restored. Note that this command drops effective user
ID. See also \fB\-\-restore\-header\fR.
.PP
\fB\-c\fR, \fB\-\-create\fR [VOLUME_PATH]
.IP
Create a new volume. Most options are requested from user if not specified
on command line. Hidden volume can be created only in an existing file or
device. Size of the hidden volume should not exceed the free space of the
filesystem on the outer volume. Hidden volume protection (see option \fB\-P\fR)
should be used to update the outer volume contents after the hidden volume
is created. WARNING: To prevent data corruption, you should follow the
instructions in the EXAMPLES section on how to create a hidden volume.
Note that this command drops effective user ID.
See also options \fB\-\-cluster\fR, \fB\-\-disable\-progress\fR, \fB\-\-display\-keys\fR,
\fB\-\-encryption\fR, \fB\-k\fR, \fB\-\-filesystem\fR, \fB\-\-hash\fR, \fB\-p\fR, \fB\-\-random\-source\fR, \fB\-\-quick\fR, \fB\-\-size\fR,
\fB\-\-type\fR. Note that passing some of the options may affect security or plausible
deniability. See option \fB\-p\fR for more information.
.PP
\fB\-C\fR, \fB\-\-change\fR [VOLUME_PATH]
.IP
Change a password and/or keyfile(s) of a volume. Volume path and passwords are
requested from user if not specified on command line. PKCS\-5 PRF HMAC hash
algorithm can be changed with option \fB\-\-hash\fR. See also options \fB\-k\fR,
\fB\-\-keyfile\-add\fR, \fB\-p\fR, \fB\-\-random\-source\fR, \fB\-v\fR.
.PP
\fB\-d\fR, \fB\-\-dismount\fR [MAPPED_VOLUME]
.IP
Dismount and unmap mapped volumes. If MAPPED_VOLUME is not specified, all
volumes are dismounted and unmapped. See below for a description of
MAPPED_VOLUME.
.PP
\fB\-h\fR, \fB\-\-help\fR
.IP
Display help information.
.PP
\fB\-i\fR, \fB\-\-interactive\fR
.IP
Map and mount a volume interactively. Options which may affect security or
plausible deniability are requested from the user. See option \fB\-p\fR for more
information.
.PP
\fB\-l\fR, \fB\-\-list\fR [MAPPED_VOLUME]
.IP
Display a list of mapped volumes. If MAPPED_VOLUME is not specified, all
volumes are listed. By default, the list contains only volume path and mapped
device name pairs. A more detailed list can be enabled by verbose output
option (\fB\-v\fR). See below for a description of MAPPED_VOLUME.
.PP
\fB\-\-keyfile\-create\fR FILE
.IP
Create a new keyfile using the random number generator. FILE argument specifies
the output file. Note that this command drops effective user ID.
.PP
\fB\-\-properties\fR [VOLUME_PATH]
.IP
Display properties of a volume specified by VOLUME_PATH.
.PP
\fB\-\-restore\-header\fR BACKUP_FILE [VOLUME_PATH]
.IP
Restore header of a volume specified by VOLUME_PATH from a file BACKUP_FILE.
Volume path is requested from user if not specified on command line.
Type of the restored volume header (normal/hidden) is requested from user if
not specified with \fB\-\-type\fR. Note that this command drops effective user ID.
See also \fB\-\-backup\-headers\fR.
.PP
\fB\-\-test\fR
.IP
Test all internal algorithms used in the process of encryption and decryption.
.PP
\fB\-V\fR, \fB\-\-version\fR
.IP
Display version information.
.SS "MAPPED_VOLUME:"
.IP
Specifies a mapped or mounted volume. One of the following forms can be used:
.IP
1) Path to the encrypted TrueCrypt volume.
.IP
2) Mount directory of the volume's filesystem (if mounted).
.IP
3) Device number of the mapped volume.
.IP
4) Device name of the mapped volume.
.PP
\fB\-\-cluster\fR SIZE
.IP
Use specified cluster size when creating a new volume. SIZE defines the number
of sectors per cluster.
.PP
\fB\-\-disable\-progress\fR
.IP
Disable display of progress information during creation of a new volume.
.PP
\fB\-\-display\-keys\fR
.IP
Display encryption keys generated during creation of a new volume.
.PP
\fB\-\-display\-password\fR
.IP
Display password characters while typing.
.PP
\fB\-\-encryption\fR ENCRYPTION_ALGORITHM
.IP
Use specified encryption algorithm when creating a new volume.
.PP
\fB\-\-filesystem\fR TYPE
.IP
Filesystem type to mount. The TYPE argument is passed to mount(8) command
with option \fB\-t\fR. Default type is 'auto'. When creating a new volume, this
option specifies the filesystem to be created on the new volume.
.PP
\fB\-\-hash\fR HASH
.IP
Use specified hash algorithm when creating a new volume or changing password
and/or keyfiles.
.PP
\fB\-k\fR, \fB\-\-keyfile\fR FILE | DIRECTORY
.IP
Use specified keyfile to open a volume to be mapped (or when changing password
and/or keyfiles). When a directory is specified, all files inside it will be
used (non\-recursively). Additional keyfiles can be specified with multiple \fB\-k\fR
options. Empty keyfile (\fB\-k\fR ) disables interactive requests for keyfiles
(e.g., when creating a new volume). See also option \fB\-K\fR.
.PP
\fB\-K\fR, \fB\-\-keyfile\-protected\fR FILE | DIRECTORY
.IP
Use specified keyfile to open a hidden volume to be protected. This option
may be used only when mounting an outer volume with hidden volume protected.
See also options \fB\-k\fR and \fB\-P\fR.
.PP
\fB\-\-keyfile\-add\fR FILE | DIRECTORY
.IP
Add specified keyfile to a volume when changing its password and/or keyfiles.
This option must be also used to keep all previous keyfiles asigned to a
volume. See EXAMPLES for more information.
.PP
\fB\-M\fR, \fB\-\-mount\-options\fR OPTIONS
.IP
Filesystem mount options. The OPTIONS argument is passed to mount(8)
command with option \fB\-o\fR.
.PP
\fB\-N\fR, \fB\-\-device\-number\fR N
.IP
Use device number N when mapping a volume as a block device
/dev/mapper/truecryptN. Default is the first available device.
.PP
\fB\-\-overwrite\fR
.IP
Overwrite files without prompting the user for confirmation.
.PP
\fB\-p\fR, \fB\-\-password\fR PASSWORD
.IP
Use specified password to open a volume. Additional passwords can be
specified with multiple \fB\-p\fR options. An empty password can also be specified
("" in most shells). Note that passing a password on the command line is
potentially insecure as the password may be visible in the process list
(see ps(1)) and/or stored in a command history file.
.PP
\fB\-\-password\-tries\fR NUMBER
.IP
Prompt NUMBER of times for a password until the correct password is entered.
Default is to prompt three times.
.PP
\fB\-P\fR, \fB\-\-protect\-hidden\fR
.IP
Write\-protect a hidden volume when mapping an outer volume. Before mapping the
outer volume, the user will be prompted for a password to open the hidden
volume. The size and position of the hidden volume is then determined and the
outer volume is mapped with all sectors belonging to the hidden volume
protected against write operations. When a write to the protected area is
prevented, the whole volume is switched to read\-only mode. Verbose list command
(\fB\-vl\fR) can be used to query the state of the hidden volume protection. Warning
message is displayed when a volume switched to read\-only is being dismounted.
See also options \fB\-r\fR and \fB\-i\fR.
.PP
\fB\-\-quick\fR
.IP
Use quick format when creating a new volume. This option can be used only
when creating a device\-hosted volume. Quick format is always used when
creating a hidden volume.
.PP
\fB\-\-random\-source\fR FILE
.IP
Use FILE as a source of random numbers. Standard input is used if '\-' is
specified.
.PP
\fB\-r\fR, \fB\-\-read\-only\fR
.IP
Map and mount a volume as read\-only. Write operations to the volume may not
fail immediately due to the write buffering performed by the system, but the
physical write will still be prevented.
.PP
\fB\-\-size\fR SIZE
.IP
Use specified size when creating a new volume. SIZE is defined as number of
bytes or, when a size suffix K/M/G is used, Kilobytes/Megabytes/Gigabytes.
Note that size must be a multiple of 512 bytes.
.PP
\fB\-\-type\fR TYPE
.IP
Use specified volume type when creating a new volume or restoring a volume
header. TYPE can be 'normal' or 'hidden'.
.PP
\fB\-u\fR, \fB\-\-user\-mount\fR
.IP
Set default user and group ID of the filesystem being mounted to the user and
group ID of the process which executed TrueCrypt. Some filesystems (like FAT)
do not support user permissions and, therefore, it is necessary to supply a
default user and group ID to the system when mounting such filesystems.
.PP
\fB\-\-update\-time\fR
.IP
Do not preserve access and modification timestamps of volume containers and
access timestamps of keyfiles. By default, timestamps are restored after
a volume is unmapped or after a keyfile is closed.
.PP
\fB\-v\fR, \fB\-\-verbose\fR
.IP
Enable verbose output. Multiple \fB\-v\fR options can be specified to increase the
level of verbosity.
.SH EXAMPLES

truecrypt /root/volume.tc /mnt/tc
.IP
Map a volume /root/volume.tc and mount its filesystem at directory /mnt/tc.
.PP
truecrypt \fB\-u\fR /dev/hda2 /mnt/tc
.IP
Map a volume /dev/hda2 (first ATA disk, primary partition 2) and mount its
filesystem at /mnt/tc. Default user\-id is set, which is useful when mounting
a filesystem like FAT under a non\-admin user account.
.PP
truecrypt \fB\-i\fR
.IP
Map and mount a volume. Options are requested interactively.
.PP
truecrypt \fB\-d\fR
.IP
Dismount and unmap all mapped volumes.
.PP
truecrypt \fB\-d\fR /root/volume.tc
.IP
Dismount and unmap a volume /root/volume.tc.
.PP
truecrypt \fB\-d\fR /mnt/tc
.IP
Dismount and unmap a volume mounted at /mnt/tc.
.PP
truecrypt \fB\-vl\fR
.IP
Display a detailed list of all mapped volumes.
.PP
truecrypt \fB\-N\fR 1 /dev/hdc1 && mkfs /dev/mapper/truecrypt1
.IP
Map a volume /dev/hdc1 and create a new filesystem on it.
.PP
truecrypt \fB\-P\fR /dev/hdc1 /mnt/tc
.IP
Map and mount outer volume /dev/hdc1 and protect hidden volume within it.
.PP
truecrypt \fB\-p\fR "" \fB\-p\fR "" \fB\-k\fR key1 \fB\-k\fR key2 \fB\-K\fR key_hidden \fB\-P\fR volume.tc
.IP
Map outer volume ./volume.tc and protect hidden volume within it.
The outer volume is opened with keyfiles ./key1 and ./key2 and the
hidden volume with ./key_hidden. Passwords for both volumes are empty.
.PP
truecrypt \fB\-c\fR
.IP
Create a new volume. Options are requested interactively.
.PP
truecrypt \fB\-c\fR /dev/hda2
.IP
Create a new volume hosted at the second primary partition of the first
ATA disk.
.PP
truecrypt \fB\-k\fR keyfile \fB\-\-size\fR 10M \fB\-\-encryption\fR AES \fB\-\-hash\fR SHA\-1 \fB\-c\fR vol.tc
.IP
Create a new volume. Options which are not specified on command line are
requested from the user.
.PP
truecrypt \fB\-\-keyfile\-add\fR keyfile \fB\-C\fR volume.tc
.IP
Change password and add a new keyfile to volume.
.PP
truecrypt \fB\-k\fR keyfile \fB\-C\fR volume.tc
.IP
Change password and remove a keyfile from volume.
.PP
truecrypt \fB\-k\fR keyfile \fB\-\-keyfile\-add\fR keyfile \fB\-C\fR volume.tc
.IP
Change password and keep previous keyfile.
.SS "Creating a hidden volume without risking data corruption:"
.IP
1) Create an outer volume:
.IP
truecrypt \fB\-\-type\fR normal \fB\-\-size\fR 100M \fB\-c\fR volume.tc
.IP
2) Create a hidden volume:
.IP
truecrypt \fB\-\-type\fR hidden \fB\-\-size\fR 50M \fB\-c\fR volume.tc
.IP
3) Mount the outer volume with the hidden volume protected:
.IP
truecrypt \fB\-P\fR volume.tc /mnt/tc
.IP
4) Copy files to the outer volume:
.IP
cp outer_volume_file.txt /mnt/tc
.IP
5) Dismount the outer volume:
.IP
truecrypt \fB\-d\fR volume.tc
.IP
6) If a warning message has been displayed in 5), start again from 1). Either
a larger outer volume should be created in 1), or smaller files should be
copied to the outer volume in 4).
.SH DIAGNOSTICS
Exit status
.B 0
is returned if all requested actions completed successfully, otherwise
.B 1
is returned. Kernel module reports errors via system log with facility
.BR "kern" ". See"
.BR "syslogd" "(8) for more information."
.SH "REPORTING BUGS"
Report bugs at <http://www.truecrypt.org/bugs/>.
.SH COPYRIGHT
Copyright \(co 2004-2006 TrueCrypt Foundation. All Rights Reserved.
.br
Copyright \(co 1998-2000 Paul Le Roux. All Rights Reserved.
.br
Copyright \(co 2004 TrueCrypt Team. All Rights Reserved.
.br
Copyright \(co 1999-2005 Dr. Brian Gladman. All Rights Reserved.
.br
Copyright \(co 1995-1997 Eric Young. All Rights Reserved.
.br
Copyright \(co 2001 Markus Friedl. All Rights Reserved.
.PP
Released under the TrueCrypt Collective License 1.0
.SH "SEE ALSO"
.B http://www.truecrypt.org/docs/
.br
.B /usr/share/truecrypt/doc/TrueCrypt-User-Guide.pdf
.br
.BR "mount" "(8), " "umount" "(8), " "losetup" "(8), "
.BR "fuser" "(1), " "mkfs" "(8), " "fsck" "(8), " "dmsetup" "(8)"

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色老头久久综合| 岛国精品一区二区| 国产成人av一区二区三区在线| 粉嫩av一区二区三区| 欧美裸体一区二区三区| 中文字幕成人在线观看| 日本不卡123| 99视频一区二区三区| 精品国产伦一区二区三区观看体验 | 99视频超级精品| 精品卡一卡二卡三卡四在线| 亚洲精品视频在线观看网站| 国产69精品一区二区亚洲孕妇| 欧美日韩国产在线观看| 亚洲乱码国产乱码精品精小说 | 午夜视频一区二区三区| 91亚洲国产成人精品一区二三 | 欧美性极品少妇| 亚洲欧洲av一区二区三区久久| 久久爱www久久做| 欧美日韩精品综合在线| 亚洲精品成人悠悠色影视| eeuss影院一区二区三区| 26uuu久久综合| 狠狠色狠狠色合久久伊人| 91精品黄色片免费大全| 舔着乳尖日韩一区| 欧美日韩精品欧美日韩精品一| 亚洲精品一卡二卡| 色综合久久久久综合| 亚洲欧美色图小说| 色丁香久综合在线久综合在线观看| 国产精品入口麻豆原神| 成人网在线免费视频| 欧美激情在线一区二区| 国产91丝袜在线播放0| 国产精品美女久久久久aⅴ| 成人精品gif动图一区| 国产精品二区一区二区aⅴ污介绍| 国产69精品久久久久毛片| 国产精品理论在线观看| 91毛片在线观看| 亚洲国产cao| 欧美一区二区三区人| 麻豆成人91精品二区三区| 精品精品国产高清a毛片牛牛| 国精产品一区一区三区mba视频 | 成人欧美一区二区三区小说| 欧美情侣在线播放| 老司机免费视频一区二区| 久久亚洲二区三区| 成人爱爱电影网址| 亚洲欧美日韩中文播放| 欧美老肥妇做.爰bbww视频| 日本不卡高清视频| 久久久九九九九| eeuss鲁片一区二区三区在线观看| 日韩伦理av电影| 欧美日韩成人激情| 国产一区二区三区免费看| 中文字幕佐山爱一区二区免费| 欧美性猛交xxxxxxxx| 久久69国产一区二区蜜臀| 中文字幕乱码久久午夜不卡| 欧美在线一区二区| 国产一区二区三区免费在线观看| 国产精品久久久久影视| 欧美视频在线一区二区三区 | 91蜜桃在线观看| 日本欧美一区二区三区乱码| 国产色一区二区| 欧美日韩免费在线视频| 精品亚洲国内自在自线福利| 亚洲精品少妇30p| 日韩女优视频免费观看| 色综合久久88色综合天天| 日本va欧美va瓶| 亚洲免费在线观看视频| 精品国产一区二区精华| 在线中文字幕一区二区| 国产精品一区二区三区网站| 五月婷婷综合激情| 国产精品久久久久久久久免费相片 | 久久女同精品一区二区| 欧美在线观看一区| 国产一区二区三区四| 亚洲va欧美va人人爽午夜| 亚洲国产精品99久久久久久久久 | 中文字幕五月欧美| 精品动漫一区二区三区在线观看| 一本大道久久a久久综合婷婷| 国产麻豆欧美日韩一区| 日韩极品在线观看| 亚洲综合一区二区精品导航| 国产精品久久看| 亚洲欧洲韩国日本视频| 精品国产乱子伦一区| 91麻豆精品国产自产在线| 欧美中文字幕一二三区视频| 成人免费三级在线| 国内欧美视频一区二区| 日韩精品高清不卡| 亚洲综合在线观看视频| 国产精品久久久久一区 | 国内久久精品视频| 麻豆传媒一区二区三区| 国产日产亚洲精品系列| 91精品国产色综合久久不卡电影 | 日本精品一区二区三区高清| 国产成人免费av在线| 国产精品久久久久久久久免费相片| 欧美美女喷水视频| 一本色道a无线码一区v| 成人美女视频在线观看18| 国产69精品久久777的优势| 狠狠色综合色综合网络| 精品一区二区三区免费播放 | 亚洲日本成人在线观看| 欧美国产激情二区三区| 国产精品午夜在线| 久久天堂av综合合色蜜桃网| 久久久一区二区| 色天天综合久久久久综合片| 色婷婷久久久久swag精品| 色哟哟精品一区| 欧美日韩综合在线免费观看| 欧美肥妇free| 欧美绝品在线观看成人午夜影视| 欧美一区二区视频免费观看| 91精品国产综合久久久久久漫画| 国产亚洲综合在线| 天堂影院一区二区| 日韩电影免费在线看| 日本三级韩国三级欧美三级| 美女一区二区三区在线观看| 亚洲精品美国一| 欧美国产1区2区| 中文字幕在线视频一区| 亚洲欧美日韩在线| 亚洲国产视频直播| 免费成人小视频| 国产成人免费视频| 欧美日韩视频在线第一区| 在线观看成人小视频| 欧美成人伊人久久综合网| 91麻豆精品91久久久久久清纯 | 色婷婷综合中文久久一本| 91福利精品视频| 在线成人高清不卡| 精品国产一区二区三区久久影院| 国产校园另类小说区| 亚洲视频免费在线观看| 亚洲a一区二区| 麻豆精品新av中文字幕| 99久久国产免费看| 欧美日韩国产a| 国产亚洲精品bt天堂精选| 国产精品白丝在线| 亚洲电影一区二区三区| 国产一区二区免费视频| 91在线国产观看| 69堂成人精品免费视频| 久久久精品黄色| 日本亚洲欧美天堂免费| 成人综合婷婷国产精品久久免费| 91影院在线观看| 日韩一卡二卡三卡四卡| 一区二区三区精品久久久| 蜜芽一区二区三区| 日韩视频一区二区三区| 日本一区二区三区四区| 美腿丝袜亚洲一区| 91麻豆视频网站| 精品国产91洋老外米糕| 亚洲靠逼com| 国产精品自拍毛片| 欧美写真视频网站| 中文字幕 久热精品 视频在线| 久久69国产一区二区蜜臀| 日本电影亚洲天堂一区| 久久久久亚洲蜜桃| 亚洲午夜一区二区三区| 国精产品一区一区三区mba桃花| 欧美主播一区二区三区美女| 久久久久99精品国产片| 日韩成人免费在线| 国产一区二区在线免费观看| 欧美成人三级电影在线| 亚洲自拍偷拍av| 9久草视频在线视频精品| 国产婷婷色一区二区三区在线| 偷拍一区二区三区| 色婷婷综合久久久久中文一区二区 | 日韩av一区二区在线影视| 成人黄色大片在线观看| 2020日本不卡一区二区视频| 日日噜噜夜夜狠狠视频欧美人 | 国产麻豆成人精品| 欧美精品丝袜中出| 亚洲成人精品一区二区|