亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? truecrypt.1

?? 一個關于磁盤加密保護的驅動開發以及示例源碼.對于學習這方面的人可以有點參考和學習作用.
?? 1
字號:
.\" DO NOT MODIFY THIS FILE!  It was generated by help2man 1.36.
.TH TRUECRYPT "1" "May 2007" "truecrypt 4.3a" "User Commands"
.SH NAME
truecrypt - manage TrueCrypt volumes
.SH SYNOPSIS
.B truecrypt
[\fIOPTIONS\fR] \fIVOLUME_PATH \fR[\fIMOUNT_DIRECTORY\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI-i\fR
.br
.B truecrypt
[\fIOPTIONS\fR] \fI-c | --create | -C | --change \fR[\fIVOLUME_PATH\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI-d | --dismount | -l | --list \fR[\fIMAPPED_VOLUME\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI--backup-headers | --restore-header FILE \fR[\fIVOLUME\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI--properties \fR[\fIVOLUME_PATH\fR]
.br
.B truecrypt
[\fIOPTIONS\fR] \fI--keyfile-create FILE\fR
.br
.B truecrypt
\fI-h | --help | --test | -V | --version\fR
.SH DESCRIPTION
Manages encrypted TrueCrypt volumes, which can be mapped as virtual block
devices and used as any other standard block device. All data being read
from a mapped TrueCrypt volume is transparently decrypted and all data being
written to it is transparently encrypted.
.SH OPTIONS

VOLUME_PATH [MOUNT_DIRECTORY]
.IP
Open a TrueCrypt volume specified by VOLUME_PATH and map it as a block device
/dev/mapper/truecryptN. N is the first available device number if not
otherwise specified with \fB\-N\fR. Filesystem of the mapped volume is mounted at
MOUNT_DIRECTORY if specified. To open a hidden volume, specify its password
and/or keyfiles (the outer volume cannot be mapped at the same time).
See also EXAMPLES and options \fB\-\-display\-password\fR, \fB\-\-filesystem\fR, \fB\-k\fR, \fB\-M\fR, \fB\-p\fR, \fB\-P\fR,
\fB\-\-password\-tries\fR, \fB\-r\fR, \fB\-u\fR, \fB\-\-update\-time\fR. Note that passing some of the options
may affect security (see options \fB\-i\fR and \fB\-p\fR for more information).
This command requires administrator privileges (sudo(8) is used if available).
.PP
\fB\-\-backup\-headers\fR BACKUP_FILE [VOLUME_PATH]
.IP
Backup headers of a volume specified by VOLUME_PATH to a file BACKUP_FILE.
Volume path is requested from user if not specified on command line. Both
normal/outer and hidden volume headers are stored in the backup file even
if there is no hidden volume within the volume (to preserve plausible
deniability). When restoring the volume header, it is possible to select
which header is to be restored. See also \fB\-\-restore\-header\fR.
.PP
\fB\-c\fR, \fB\-\-create\fR [VOLUME_PATH]
.IP
Create a new volume. Most options are requested from user if not specified
on command line. Hidden volume can be created only in an existing file or
device. Size of the hidden volume should not exceed the free space of the
filesystem on the outer volume. Hidden volume protection (see option \fB\-P\fR)
should be used to update the outer volume contents after the hidden volume
is created. WARNING: To prevent data corruption, you should follow the
instructions in the EXAMPLES section on how to create a hidden volume.
See also options \fB\-\-cluster\fR, \fB\-\-disable\-progress\fR, \fB\-\-display\-keys\fR,
\fB\-\-encryption\fR, \fB\-k\fR, \fB\-\-filesystem\fR, \fB\-\-hash\fR, \fB\-p\fR, \fB\-\-random\-source\fR, \fB\-\-quick\fR, \fB\-\-size\fR,
\fB\-\-type\fR. Note that passing some of the options may affect security (see option
\fB\-p\fR for more information).
.PP
\fB\-C\fR, \fB\-\-change\fR [VOLUME_PATH]
.IP
Change a password and/or keyfile(s) of a volume. Volume path and passwords are
requested from user if not specified on command line. PKCS\-5 PRF HMAC hash
algorithm can be changed with option \fB\-\-hash\fR. See also options \fB\-k\fR,
\fB\-\-keyfile\-add\fR, \fB\-p\fR, \fB\-\-random\-source\fR, \fB\-v\fR.
.PP
\fB\-d\fR, \fB\-\-dismount\fR [MAPPED_VOLUME]
.IP
Dismount and unmap mapped volumes. If MAPPED_VOLUME is not specified, all
volumes are dismounted and unmapped. See below for a description of
MAPPED_VOLUME.
This command requires administrator privileges (sudo(8) is used if available).
.PP
\fB\-h\fR, \fB\-\-help\fR
.IP
Display help information.
.PP
\fB\-i\fR, \fB\-\-interactive\fR
.IP
Map and mount a volume interactively. Options which may affect security are
requested from the user. See option \fB\-p\fR for more information.
This command requires administrator privileges (sudo(8) is used if available).
.PP
\fB\-l\fR, \fB\-\-list\fR [MAPPED_VOLUME]
.IP
Display a list of mapped volumes. If MAPPED_VOLUME is not specified, all
volumes are listed. By default, the list contains only volume path and mapped
device name pairs. A more detailed list can be enabled by verbose output
option (\fB\-v\fR). See below for a description of MAPPED_VOLUME.
This command requires administrator privileges (sudo(8) is used if available).
.PP
\fB\-\-keyfile\-create\fR FILE
.IP
Create a new keyfile using the random number generator. FILE argument specifies
the output file.
.PP
\fB\-\-properties\fR [VOLUME_PATH]
.IP
Display properties of a volume specified by VOLUME_PATH.
.PP
\fB\-\-restore\-header\fR BACKUP_FILE [VOLUME_PATH]
.IP
Restore header of a volume specified by VOLUME_PATH from a file BACKUP_FILE.
Volume path is requested from user if not specified on command line.
Type of the restored volume header (normal/hidden) is requested from user if
not specified with \fB\-\-type\fR. See also \fB\-\-backup\-headers\fR.
.PP
\fB\-\-test\fR
.IP
Test all internal algorithms used in the process of encryption and decryption.
.PP
\fB\-V\fR, \fB\-\-version\fR
.IP
Display program version and legal notices.
.SS "MAPPED_VOLUME:"
.IP
Specifies a mapped or mounted volume. One of the following forms can be used:
.IP
1) Path to the encrypted TrueCrypt volume.
.IP
2) Mount directory of the volume's filesystem (if mounted).
.IP
3) Device number of the mapped volume.
.IP
4) Device name of the mapped volume.
.PP
\fB\-\-cluster\fR SIZE
.IP
Use specified cluster size when creating a new volume. SIZE defines the number
of sectors per cluster.
.PP
\fB\-\-disable\-progress\fR
.IP
Disable display of progress information during creation of a new volume.
.PP
\fB\-\-display\-keys\fR
.IP
Display encryption keys generated during creation of a new volume.
.PP
\fB\-\-display\-password\fR
.IP
Display password characters while typing.
.PP
\fB\-\-encryption\fR ENCRYPTION_ALGORITHM
.IP
Use specified encryption algorithm when creating a new volume.
.PP
\fB\-\-filesystem\fR TYPE
.IP
Filesystem type to mount. The TYPE argument is passed to mount(8) command
with option \fB\-t\fR. Default type is 'auto'. When creating a new volume, this
option specifies the filesystem to be created on the new volume.
.PP
\fB\-\-hash\fR HASH
.IP
Use specified hash algorithm when creating a new volume or changing password
and/or keyfiles.
.PP
\fB\-k\fR, \fB\-\-keyfile\fR FILE | DIRECTORY
.IP
Use specified keyfile to open a volume to be mapped (or when changing password
and/or keyfiles). When a directory is specified, all files inside it will be
used (non\-recursively). Additional keyfiles can be specified with multiple \fB\-k\fR
options. Empty keyfile (\fB\-k\fR '') disables interactive requests for keyfiles
(e.g., when creating a new volume). See also option \fB\-K\fR.
.PP
\fB\-K\fR, \fB\-\-keyfile\-protected\fR FILE | DIRECTORY
.IP
Use specified keyfile to open a hidden volume to be protected. This option
may be used only when mounting an outer volume with hidden volume protected.
See also options \fB\-k\fR and \fB\-P\fR.
.PP
\fB\-\-keyfile\-add\fR FILE | DIRECTORY
.IP
Add specified keyfile to a volume when changing its password and/or keyfiles.
This option must be also used to keep all previous keyfiles asigned to a
volume. See EXAMPLES for more information.
.PP
\fB\-M\fR, \fB\-\-mount\-options\fR OPTIONS
.IP
Filesystem mount options. The OPTIONS argument is passed to mount(8)
command with option \fB\-o\fR. See also options \fB\-r\fR and \fB\-u\fR.
.PP
\fB\-N\fR, \fB\-\-device\-number\fR N
.IP
Use device number N when mapping a volume as a block device
/dev/mapper/truecryptN. Default is the first available device.
.PP
\fB\-\-overwrite\fR
.IP
Overwrite files without prompting the user for confirmation.
.PP
\fB\-p\fR, \fB\-\-password\fR PASSWORD
.IP
Use specified password to open a volume. Additional passwords can be
specified with multiple \fB\-p\fR options. An empty password can also be specified
('' in most shells). Note that passing a password on the command line is
potentially insecure as the password may be visible in the process list
(see ps(1)) and/or stored in a command history file.
.PP
\fB\-\-password\-tries\fR NUMBER
.IP
Prompt NUMBER of times for a password until the correct password is entered.
Default is to prompt three times.
.PP
\fB\-P\fR, \fB\-\-protect\-hidden\fR
.IP
Write\-protect a hidden volume when mapping an outer volume. Before mapping the
outer volume, the user will be prompted for a password to open the hidden
volume. The size and position of the hidden volume is then determined and the
outer volume is mapped with all sectors belonging to the hidden volume
protected against write operations. When a write to the protected area is
prevented, the whole volume is switched to read\-only mode. Verbose list command
(\fB\-vl\fR) can be used to query the state of the hidden volume protection. Warning
message is displayed when a volume switched to read\-only is being dismounted.
See also options \fB\-r\fR and \fB\-i\fR.
.PP
\fB\-\-quick\fR
.IP
Use quick format when creating a new volume. This option can be used only
when creating a device\-hosted volume. Quick format is always used when
creating a hidden volume.
.PP
\fB\-\-random\-source\fR FILE
.IP
Use FILE as a source of random numbers. Standard input is used if '\-' is
specified.
.PP
\fB\-r\fR, \fB\-\-read\-only\fR
.IP
Map and mount a volume as read\-only. Write operations to the volume may not
fail immediately due to the write buffering performed by the system, but the
physical write will still be prevented.
.PP
\fB\-\-size\fR SIZE
.IP
Use specified size when creating a new volume. SIZE is defined as number of
bytes or, when a size suffix K/M/G is used, Kilobytes/Megabytes/Gigabytes.
Note that size must be a multiple of 512 bytes.
.PP
\fB\-\-type\fR TYPE
.IP
Use specified volume type when creating a new volume or restoring a volume
header. TYPE can be 'normal' or 'hidden'.
.PP
\fB\-u\fR, \fB\-\-user\-mount\fR
.IP
Make a volume being mounted accessible in a non\-administrator account. Some
filesystems (e.g., FAT) do not support Unix\-style access control and it is
necessary to use this option when mounting them. Ownership of the mounted
filesystem is determined by environment variables set by sudo(8) command.
Note that Unix\-style filesystems (e.g., ext2) do not support this option.
.PP
\fB\-\-update\-time\fR
.IP
Do not preserve access and modification timestamps of file containers.
By default, timestamps are restored after a volume is unmapped.
.PP
\fB\-v\fR, \fB\-\-verbose\fR
.IP
Enable verbose output. Multiple \fB\-v\fR options can be specified to increase the
level of verbosity.
.SH EXAMPLES

truecrypt /root/volume.tc /mnt/tc
.IP
Map a volume /root/volume.tc and mount its filesystem at directory /mnt/tc.
.PP
truecrypt \fB\-u\fR /dev/hda2 /mnt/tc
.IP
Map a volume /dev/hda2 (first ATA disk, primary partition 2) and mount its
filesystem at /mnt/tc. Default user\-id is set, which is useful when mounting
a filesystem, such as FAT, for use in a non\-administrative account.
.PP
truecrypt \fB\-i\fR
.IP
Map and mount a volume. Options are requested interactively.
.PP
truecrypt \fB\-d\fR
.IP
Dismount and unmap all mapped volumes.
.PP
truecrypt \fB\-d\fR /root/volume.tc
.IP
Dismount and unmap a volume /root/volume.tc.
.PP
truecrypt \fB\-d\fR /mnt/tc
.IP
Dismount and unmap a volume mounted at /mnt/tc.
.PP
truecrypt \fB\-vl\fR
.IP
Display a detailed list of all mapped volumes.
.PP
truecrypt \fB\-N\fR 1 /dev/hdc1 && mkfs /dev/mapper/truecrypt1
.IP
Map a volume /dev/hdc1 and create a new filesystem on it.
.PP
truecrypt \fB\-P\fR /dev/hdc1 /mnt/tc
.IP
Map and mount outer volume /dev/hdc1 and protect hidden volume within it.
.PP
truecrypt \fB\-p\fR '' \fB\-p\fR '' \fB\-k\fR key1 \fB\-k\fR key2 \fB\-K\fR key_hidden \fB\-P\fR volume.tc
.IP
Map outer volume ./volume.tc and protect hidden volume within it.
The outer volume is opened with keyfiles ./key1 and ./key2 and the
hidden volume with ./key_hidden. Passwords for both volumes are empty.
.PP
truecrypt \fB\-c\fR
.IP
Create a new volume. Options are requested interactively.
.PP
truecrypt \fB\-c\fR /dev/hda2
.IP
Create a new volume hosted at the second primary partition of the first
ATA disk.
.PP
truecrypt \fB\-k\fR keyfile \fB\-\-size\fR 10M \fB\-\-encryption\fR AES \fB\-\-hash\fR SHA\-1 \fB\-c\fR vol.tc
.IP
Create a new volume. Options which are not specified on command line are
requested from the user.
.PP
truecrypt \fB\-\-keyfile\-add\fR keyfile \fB\-C\fR volume.tc
.IP
Change password and add a new keyfile to volume.
.PP
truecrypt \fB\-k\fR keyfile \fB\-C\fR volume.tc
.IP
Change password and remove a keyfile from volume.
.PP
truecrypt \fB\-k\fR keyfile \fB\-\-keyfile\-add\fR keyfile \fB\-C\fR volume.tc
.IP
Change password and keep previous keyfile.
.SS "Creating a hidden volume without risking data corruption:"
.IP
1) Create an outer volume:
.IP
truecrypt \fB\-\-type\fR normal \fB\-\-size\fR 100M \fB\-c\fR volume.tc
.IP
2) Create a hidden volume:
.IP
truecrypt \fB\-\-type\fR hidden \fB\-\-size\fR 50M \fB\-c\fR volume.tc
.IP
3) Mount the outer volume with the hidden volume protected:
.IP
truecrypt \fB\-P\fR volume.tc /mnt/tc
.IP
4) Copy files to the outer volume:
.IP
cp outer_volume_file.txt /mnt/tc
.IP
5) Dismount the outer volume:
.IP
truecrypt \fB\-d\fR volume.tc
.IP
6) If a warning message has been displayed in 5), start again from 1). Either
a larger outer volume should be created in 1), or less data should be copied
to the outer volume in 4).
.SH DIAGNOSTICS
Exit status
.B 0
is returned if all requested actions completed successfully, otherwise
.B 1
is returned. Kernel module reports errors via system log with facility
.BR "kern" ". See"
.BR "syslogd" "(8) for more information."
.SH "REPORTING BUGS"
Report bugs at <http://www.truecrypt.org/bugs/>.
.SH COPYRIGHT
Copyright \(co 2003-2007 TrueCrypt Foundation. All Rights Reserved.
.br
Copyright \(co 1998-2000 Paul Le Roux. All Rights Reserved.
.br
Copyright \(co 1999-2006 Dr. Brian Gladman. All Rights Reserved.
.br
Copyright \(co 1995-1997 Eric Young. All Rights Reserved.
.br
Copyright \(co 2001 Markus Friedl. All Rights Reserved.
.PP
Released under the TrueCrypt Collective License 1.2
.SH "SEE ALSO"
.B http://www.truecrypt.org/docs/
.br
.B /usr/share/truecrypt/doc/TrueCrypt-User-Guide.pdf
.br
.BR "mount" "(8), " "umount" "(8), " "losetup" "(8), "
.BR "fuser" "(1), " "mkfs" "(8), " "fsck" "(8), " "dmsetup" "(8)"

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国内精品在线播放| 欧美日韩精品二区第二页| 在线视频一区二区三区| 69久久99精品久久久久婷婷| 日本一区二区动态图| 日本在线播放一区二区三区| 成人av在线播放网址| 欧美一区二区三区在线电影| 亚洲免费伊人电影| 国产乱子轮精品视频| 欧美日韩mp4| 亚洲伦在线观看| 99久久精品费精品国产一区二区| 欧美一级高清片在线观看| 亚洲最大的成人av| av亚洲产国偷v产偷v自拍| 26uuu亚洲婷婷狠狠天堂| 亚洲国产毛片aaaaa无费看 | 99久久精品免费精品国产| 日韩精品一区二区三区蜜臀| 午夜国产精品一区| 欧美午夜不卡在线观看免费| 国产精品久久久久久久久久免费看| 日韩中文字幕麻豆| 欧美日韩精品一区二区三区| 一区二区三区在线视频观看| 成人动漫av在线| 国产欧美1区2区3区| 黑人巨大精品欧美黑白配亚洲| 欧美一区二区视频在线观看| 天堂午夜影视日韩欧美一区二区| 91福利在线观看| 亚洲一级二级三级| 欧美影片第一页| 亚洲一区国产视频| 欧美日韩国产片| 男人的天堂久久精品| 制服视频三区第一页精品| 日日嗨av一区二区三区四区| 欧美乱妇15p| 日本成人在线不卡视频| 欧美r级在线观看| 精品一区二区三区香蕉蜜桃 | 美女视频一区二区| 久久综合资源网| 高清在线不卡av| 亚洲欧美另类综合偷拍| 欧洲激情一区二区| 日韩精品亚洲一区| 久久天天做天天爱综合色| 国产又黄又大久久| 亚洲图片激情小说| 欧美精品在线一区二区| 日韩国产在线一| 精品国产免费人成在线观看| 国产精品影音先锋| 亚洲视频网在线直播| 欧美午夜不卡在线观看免费| 美女脱光内衣内裤视频久久影院| 国产视频一区二区在线观看| av中文一区二区三区| 亚洲一区二区在线免费观看视频| 欧美岛国在线观看| 91在线观看免费视频| 日av在线不卡| 亚洲欧洲精品一区二区三区不卡 | 盗摄精品av一区二区三区| 亚洲精品成人天堂一二三| 欧美精选在线播放| 高清日韩电视剧大全免费| 亚洲成人1区2区| 国产日韩欧美a| 在线成人av网站| 成人精品一区二区三区四区| 亚洲成av人综合在线观看| 2019国产精品| 欧美日韩成人高清| 99久久亚洲一区二区三区青草 | 欧美一区二区三区思思人| 成人动漫在线一区| 日本不卡一二三| 亚洲男帅同性gay1069| 日韩免费电影一区| 欧美亚洲日本国产| 国产成人精品1024| 日韩成人免费电影| 一区二区三区.www| 日本一区免费视频| 欧美大肚乱孕交hd孕妇| 色视频欧美一区二区三区| 国产成人精品亚洲午夜麻豆| 蜜臀久久久久久久| 亚洲成av人在线观看| 中文字幕日韩一区| 久久久久久久综合狠狠综合| 91精品国产综合久久香蕉麻豆| 一本一道波多野结衣一区二区| 国产精品一二二区| 激情文学综合网| 免费高清不卡av| 亚洲va欧美va人人爽| 亚洲嫩草精品久久| 亚洲色图在线视频| 国产精品亲子伦对白| 国产婷婷色一区二区三区| 精品国产乱码久久久久久牛牛 | 日本韩国一区二区| 一本到三区不卡视频| 成人av高清在线| 成人av先锋影音| 成熟亚洲日本毛茸茸凸凹| 国产一区二区三区黄视频 | 91成人免费在线| 色综合天天综合在线视频| 成人一区二区视频| 成人精品国产一区二区4080| 成熟亚洲日本毛茸茸凸凹| 国产一区不卡视频| 国产高清不卡一区二区| 国产成人在线免费| 成人精品小蝌蚪| 成人的网站免费观看| 91影视在线播放| 欧美三区在线观看| 日韩免费在线观看| 久久综合久久综合久久| 国产欧美综合在线观看第十页| 国产日韩欧美不卡| 亚洲女人小视频在线观看| 亚洲综合在线免费观看| 亚洲va欧美va人人爽午夜| 免费人成黄页网站在线一区二区 | 久久久不卡网国产精品二区| 26uuu另类欧美| 国产精品久久免费看| 一区二区三区在线影院| 三级久久三级久久久| 国产在线麻豆精品观看| 成人性生交大片免费看在线播放| www.亚洲国产| 欧美日韩成人一区二区| 精品国产99国产精品| 国产精品国产a级| 亚洲午夜av在线| 国产一区在线观看视频| 91女人视频在线观看| 欧美一区二区精品在线| 欧美激情在线免费观看| 亚洲一二三四在线| 国产自产2019最新不卡| 欧美亚洲综合一区| 欧美不卡激情三级在线观看| 国产精品福利一区| 日产国产欧美视频一区精品| 成人激情免费网站| 3d动漫精品啪啪一区二区竹菊| 欧美激情一区二区三区全黄| 亚洲国产精品人人做人人爽| 国产乱理伦片在线观看夜一区| 色先锋资源久久综合| 26uuu色噜噜精品一区二区| 一区二区三区四区不卡在线| 狠狠色丁香婷综合久久| 欧美三日本三级三级在线播放| 国产亚洲人成网站| 日产精品久久久久久久性色| 91亚洲精品一区二区乱码| 久久人人爽人人爽| 亚洲一二三四在线| 97精品国产97久久久久久久久久久久| 欧美一级免费观看| 一区二区三区在线免费播放| 粉嫩绯色av一区二区在线观看| 日韩一卡二卡三卡四卡| 亚洲一区二区在线观看视频 | 国产精品一区在线观看你懂的| 在线观看视频一区二区欧美日韩| 国产午夜精品理论片a级大结局| 一区二区免费在线播放| 丁香婷婷综合色啪| 久久久噜噜噜久久中文字幕色伊伊 | 天天色 色综合| 色成年激情久久综合| 国产精品国产三级国产普通话99 | 日韩激情在线观看| 色婷婷综合久久久中文一区二区| 国产色一区二区| 国产精一区二区三区| 日韩手机在线导航| 日本伊人色综合网| 欧美一区二区三区思思人| 亚洲成人777| 欧美日韩视频在线观看一区二区三区| 中文字幕日本不卡| 99久久国产综合精品色伊| 国产视频911| 99久久久无码国产精品| 综合久久国产九一剧情麻豆| av在线播放一区二区三区| 国产精品素人视频|