Easy Way To Encrypt Hard Disk With VeraCrypt

Did you hear about TrueCrypt? If yes, you will have lesser problems understanding the concept as it is nearly the same. VeraCrypt is an open-source and free disk encryption software that is based on TrueCrypt. It offers enhanced security to the algorithms that have been used for the system. It also partitions the encryptions shielding them from the new developments in brute-force attacks. Additionally, it solves several vulnerabilities as well as security issues found in TrueCrypt.

This advanced-level security invites some delay SOLELY to the launch of the encrypted partitions without disturbing the performance of the application use phase. This is, however, acceptable to the legit owner although it makes it much difficult for an attacker to achieve access to the encrypted data. VeraCrypt is truly compatible with TrueCrypt and can even mount the TrueCrypt volumes. It also has the capability to convert them to the VeraCrypt format.

Encrypting Hard Disk With VeraCrypt

Here is a step-by-step guide on how to encrypt your hard disk with the help of VeraCrypt. This aims to be helpful for beginners who are wishing to do so but do not know how the procedures work. Follow the procedure step-by-step for successful encryption.

Step 1 

If it is the first time you are using VeraCrypt, download and install VeraCrypt. After successful download, launch VeraCrypt by double-clicking on the “VeraCrypt.exe” file. Alternatively, you can also click on the VeraCrypt shortcut in your windows start menu.

Step 2

The main VeraCrypt window will open. Locate the “Create Volume” button and click on it.


Step 3

On doing this, the “VeraCrypt Volume Creation Wizard” window will open. At this point, you need to choose the location where you want the VeraCrypt Encrypt Hard Disk With VeraCrypt volume to be created. A VeraCrypt volume can stay in a file, also known as a container, in a drive or partition. But in this tutorial, we will go with the first type. Thus, we will create a VeraCrypt volume within a file. This option is selected by default. So you can click “Next”. Note, here the right side of the wizard is shown as a screenshot.


Step 4

Now, you will need to choose whether to create the volume as hidden or standard VeraCrypt. But, we will choose the standard one and create a standard VeraCrypt volume. The option is selected by default. So go ahead and click “Next”.


Step 5

At this point, you have to specify where you want the VeraCrypt volume (the file container) to be created. Note that the VeraCrypt container is just like a usual file. Thus, it needs a file name that you have to choose in the next step. As the dialog box appears, click on “Select File”. Make sure that the volume creation window remains open in the background.


Step 6

This tutorial will focus on the creation of volume VeraCrypt in the F drive as in F:\Data\. The file name of the volume or container needs to be “My Volume”. Note that the file name “My Volume” originally does not exist but will create it for you.

Take a note that VeraCrypt will not encrypt any of the existing files while creating the file container. If in this step, you select an existing file, it will just be overwritten and will be replaced by the newly created volume. This means that the overwritten file will be lost and not encrypted. Later on, you will be able to encrypt the existing files by moving them to the VeraCrypt volume.

  • Choose the desired path in the selector where you wish to create the container.
  • Type the desired container name for the file in the “Filename” box.
  • Click “Save”. The file selector window will disappear.

In the next steps, we will return to the volume creation wizard of VeraCrypt. Also, note that after you have copied the unencrypted existing files to the VeraCrypt volume, you must securely wipe off the original unencrypted files. You might find a software tool of your choice that performs the secure erasure function and honestly, many of them are free.


Step 7

Click “Next” in the Volume Creation Window.


Step 8

In this step, you can select an encryption algorithm as well as a hash algorithm for the volume. If you are unsure about what to choose here, you can go ahead with the default settings. Click “Next”.


Step 9

Here, we have specified that the VeraCrypt container size would be 250 megabytes. You can choose a different size for the VeraCrypt container. After you have specified your desired container size in the empty field, click “Next”.


Step 10

Here come the most important steps of all. You are required to choose a good volume password. Read the note given in the dialog box before you enter your password. You need to type the password in the first empty space. Next, you have to re-enter the password to confirm. The “Next” button will be disabled until you type both the passwords same.


Step 11

Now, you have to randomly move the mouse as much as possible till the indicator becomes green. It will be better if you move the mouse for a longer period. The cryptographic strength of the encryption keys significantly increases and further increases security. After this, click “Format”.


As you do this, the volume creation begins and VeraCrypt creates a file named “My Volume” in the folder “F:\Data\”. This file will be the VeraCrypt container. The volume creation may take time depending on the size of the volume. As the process gets over, a dialog box will be displayed. Click “OK” to close the dialog box.


Step 12

The VeraCrypt volume has been created successfully. Now, in the volume creation window, click “Exit”.

The next steps are for mounting the volume that has just been created. We will be returning to the main window of VeraCrypt that was already running. If that is not running, you need to go to step 1 and launch the VeraCrypt and continue from step-13.


Step 13

At this point, you need to select one of the drive lists from the drop-down list. This will be the drive letter on which the VeraCrypt container would be mounted. For this tutorial, we have chosen drive M, but you can choose anyone from the available options.


Step 14

Click on “Select File”.


Step 15

In the file selector, you need to browse the container file that you have created in steps 6-12 and select it. Then click “Open”. The file selector window will get disappeared.


In the next steps, we will be returning to the main VeraCrypt window.

Step 16

Click on “Mount” in the main VeraCrypt window and you will receive a password prompt dialog box.


 Step 17

Type the same password that you have set in step 10 in the password input field.


 Step 18

In this step, you have to select the PRF algorithm that has been used while creating the volume. The default PRF is SHA-512 that VeraCrypt uses. In case you do not know which PRF has been used, you can just set it to “autodetection”. However, the mounting process will take time. After entering the password, click “OK”.

Now, VeraCrypt will try to mount the volume. If the password entered is incorrect, you will be notified and you will be required to repeat the previous step. You need to repeat the previous step wherein you have to re-enter the password and click “OK”. If the password is correct, the volume will get mounted.


 Step 19

This is the final step. We have already mounted the container as a virtual disk M. The virtual disk is also entirely encrypted including free space, allocation tables, file names, and more. This behaves like a real disk. You can copy, move, save files to this virtual disk. They will be encrypted on the fly as they get written.

In case you open a file that is stored on the  VeraCrypt volume, say, in a media player, the file will get auto decrypted to RAM or the memory on the fly while the file is being read. Note that when you open a stored file on a VeraCrypt volume or when you write/copy a file to/from the VeraCrypt volume, you will nerve be asked to reenter the password. You will just need to enter the correct password only while you are mounting the volume.


You can also open the mounted volume by selecting it on the list and then double-click on the selected item. Simultaneously, you can also browse the mounted volume the same way you normally browse the other types of volumes. You can copy the folders and the files to and from the VeraCrypt volume, in the same manner, you will copy them to any normal disk. The files are being copied from the encrypted VeraCrypt volume or read gets automatically decrypted on the fly in the RAM.


Note that VeraCrypt never stores the decrypted data to a disk. It just stores them for some time in the RAM. Even when the volume of VeraCrypt is mounted, the volume stored data is encrypted. When you restart Windows or even turn off your computer, the volume gets dismounted and all the files stored on it get inaccessible and encrypted. When you restart Windows or even turn off your computer, the volume gets dismounted and all the stored files become inaccessible and encrypted. The same thing happens when the power supply suddenly gets interrupted. In order to make them accessible, you will need to mount the volume again. For doing so, you need to repeat the steps from 13 to 18.

If you wish to close the volume and make the files inaccessible again, you would either need to restart your OS or dismount the volume. For doing it, you would need to follow the below-mentioned steps:

  • Select the volume from the list of the mounted volumes appearing in the main VeraCrypt window.
  • Click “Dismount”.


If you want to make the stored files in the volume accessible again, you have to re-mount the volume following the steps from 13 to 18.

With this, we come to the end of the tutorial where you have successfully learned and encrypted your hard disk using VeraCrypt.

David Johnson

A software engineer by profession, David Johnson also holds interest in the Dark Web. He is passionately inclined towards the various technologies and methods used in the darknet making him one of the top contributors of Darknetsites. His knowledge and experience are well reflected in the in-depth tutorials he writes.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button