A Guide to Switch from Truecrypt to Diskcryptor

TrueCrypt was a highly popular open source disk encryption tool that could keep volumes of hard drive data safe and secure. It was a well-received file encryption utility till it got officially banned by its developers. Once, the original developers posted the official warning that this software is no more under maintenance, and thus might have some security loophole, users got suspicious about the encryption security powers of the tool. Developers also requested the users to move on to other file encryption utility as the tool won’t receive any security updates. If you are also planning for a switch, then Diskcryptor is a good option. To learn more about Diskcryptor, read this article.

You might be aware that TrueCrypt got disowned all of sudden, and its anonymous authors didn’t even reveal any concrete reasons for the move. But due to the high popularity of this hard drive encryption tool, third-party audits of this software are going on, and these audits have not found any major security loophole in this tool. However, from the security perspective, it is not good to use a software program that doesn’t receive security updates. Also, it is risky, to keep your sensitive hard drive data off guard. As an alternative to TrueCrypt, you can use Symantec Drive Encryption, DiskCryptor, VeraCrypt, BoxCryptor, AxCrypt and many more. 

How to Decrypt the Archived data?

Before you encrypt your sensitive hard drive data using a new file encryption utility, you must decrypt the data encrypted by TrueCrypt. To decrypt the data, perform the following steps: 

  • Open TrueCrypt
  • Select the drive/partition/folder you want to decrypt, and right-click on it 
  • That will open the a right-click menu 
  • Click ‘Permanently Decrypt.’
  • That will bring up a message asking your confirmation on the requested operation of permanent decryption
  • Here, click ‘Yes.'
  • Once again the message will pop up asking for your final call on permanent decryption.
  • If you are sure that you want to decrypt the data, then select ‘Yes.’ 
  • Once, you give your confirmation for twice, the decryption process will get started.
  • Depending on the size of your encrypted data, the process will take some time. 
  • As soon as the process gets completed, close all the applications, programs, documents, etc. on your computer.
  • Then, reboot your computer.

With these steps, you have successfully decrypted the data. Now, the data is accessible to one and all. Now, you can get the data encrypted by another file encryption program, such as DiskCryptor. It is also an open source disk encryption tool, and thus, it's completely free.  It can encrypt the whole disk, partitions, single files and folders and external devices such as CD and thumb drives. Also, the software supports encryption through different encryption algorithms such as AES, Serpent, Twofish, and other combination of cascaded algorithms. 

How to Encrypt Data using DiskCryptor?

  • Download the software from its official website. 
  • Most importantly, before you start the encryption process, you need to create a bootable Windows disk (LiveCD) with DiskCryptor. You can easily get the steps if you search online. 
  • Creating this bootable Windows disk is essential because it gets useful in retrieving the encrypted data in case something goes wrong like if you forget the password or some booting problems.

Once you have successfully created the bootable Windows disk, open the DiskCryptor and perform the followings steps:

  • Then, select the system drive (the drive where Windows gets installed). Usually, it’s the Drive C:
  • Next, click ‘Encrypt.’
  • Now, continue following the screen prompts to configure various settings. 
  • Once you have set the configuration settings, you need to set a password. Your password should include upper and lower-case letters so that it becomes a complex and difficult-to-crack password.
  • Now, the encryption process will start. The process might take some extra time depending on the size of your data. 
  • You can continue using your computer while the encryption process is going on.
  • If you require shutting down your computer in between, then click on 'Pause.'
  • Then, when you reboot your computer, click on 'Encrypt' to resume the encryption process.
  • DiskCryptor will list your drive as 'mounted,' once encrypting process gets completed.


The hard drives of computers that host sensitive data, especially the computers in organizations and offices, should get encrypted with a hard drive encryption software. There are various such disk encryption software programs available. DiskCryptor is a good option. It is powerful, has easy user interface and reliable in terms encryption security. Modern operating systems got inbuilt drive encrypting tools as well. You can use the inbuilt programs also. Otherwise, you can go to open source tools like DiskCryptor, VeraCrypt, BoxCryptor, AxCrypt, etc.

Similar Articles

Blind Spots in Software Testing

Have you ever accidentally added spice to a cake, because you were baking a cake and a steak at the same time? Have you dumped a spoon in a dustbin instead of a washbasin?  

Online Exams: Best Practices to Ensure Security

Online exams may seem like a modern contraption and, quite frankly, they are indeed quite advanced. But what they are not is brand new — yep, the concept of online exams has been around for nearly as long as the concept of online learning has been around.

How to Update a Wordpress Website: Top Tips and Tricks

WordPress websites are easily one of the popular means to get a website up and running very, very quickly. It was not merely a part of the first blogging and websites boom — it was one of the key drivers. And even though we have several other technologies and platforms in the market, WordPress websites continue to be one of the biggest and, most important of course, constituents of the world wide web

remote testing

Software Applications have become a major need for every enterprise today. While developing these applications, the teams list out several expected results so that it becomes easier to validate after the software is completely developed. This way of testing the application by comparing it with the actual results and expected results is known as software testing

Rich Text editor, sometimes called a WYSIWYG editor, is the one that appears in areas where text can be entered. You can control the appearance of your text using the Rich Text Editor. It contains the formatting tools and editing icons needed to edit your text. 

PHP frameworks: Why Developers Prefer Laravel

Web apps are an essential part of any and every modern business in the world today. Why? Because we live in a highly digital world wherein more and more things are done online. And given that it is so convenient, it has become imperative for businesses to embrace web apps as an integral part of their strategies

Popular Factors That Shape Software Testing Strategies

The software has taken center stage and rightly so — after all, human existence has become so highly dependent on the digital realm. Given that, we need more and more such digital tools to help drive us forward in whatever it is we seek to do.

web development

The importance of quick collaboration and rapid deployment in today’s world of fast-paced deployment is undeniable. Issues and defects are an inevitable part of the software development process that keeps on coming at every stage along with the feedback.

Faster and Better Testing Results

As a tester, when you hear the words “Software Testing” what comes to your mind? Do your mind takes you on the road of specific testing like regression testing or functional testing or you start seeing whole procedure as separate steps like planning, analyzing, visualization, and making a report?