Ubuntu 14.04 64bit tcplay
info tcplay 1.1 kan mit software center installiert werden.
Da ich tcplay im Menu nicht finden kann, schreibe ich 'tcplay' in terminal.
Dann erscheint eine liste mit commands.
usage: tcplay -c -d device [-g] [-z] [-w] [-a pbkdf_hash] [-b cipher] [-f keyfile_hidden] [-k keyfile] [-x pbkdf_hash] [-y cipher] tcplay -i -d device [-e] [-f keyfile_hidden] [-k keyfile] [-s system_device] [--fde] [--use-backup] tcplay -m mapping -d device [-e] [-f keyfile_hidden] [-k keyfile] [-s system_device] [--fde] [--use-backup] tcplay --modify -d device [-k keyfile] [--new-keyfile=keyfile] [--new-pbkdf-prf=pbkdf_hash] [-s system_device] [--fde] [--use-backup] [-w] tcplay --modify -d device [-k keyfile] --restore-from-backup-hdr [-w] tcplay -j mapping tcplay -u mapping tcplay -h | -v Valid commands are: -c, --create Creates a new TC volume on the device specified by -d or --device. -h, --help Print help message and exit. -i, --info Gives information about the TC volume specified by -d or --device. -j <mapping name>, --info-mapped=<mapping name> Gives information about the mapped TC volume under the given mapping. -m <mapping name>, --map=<mapping name> Creates a dm-crypt mapping with the given name for the device specified by -d or --device. -u <mapping name>, --unmap=<mapping name> Removes a dm-crypt mapping with the given name. --modify Changes the volume's passphrase, keyfile and optionally the hashing function used for the PBKDF password derivation. -v, --version Print version message and exit. Valid options for --create are: -a <pbkdf prf algorithm>, --pbkdf-prf=<pbkdf prf algorithm> Specifies which hashing function to use for the PBKDF password derivation when creating a new volume. To see valid options, specify '-a help'. -b <cipher>, --cipher=<cipher> Specifies which cipher to use when creating a new TC volume. To see valid options, specify '-b help'. -g, --hidden Specifies that the newly created volume will contain a hidden volume. -x <pbkdf prf algorithm>, --pbkdf-prf=<pbkdf prf algorithm> Specifies which hashing function to use for the PBKDF password derivation when creating a new hidden volume. By default, the same as for the outer volume will be used. To see valid options, specify '-x help'. -y <cipher>, --cipher=<cipher> Specifies which cipher to use when creating a new hidden volume. By default, the same as for the outer volume will be used. To see valid options, specify '-y help'. -z, --insecure-erase Skips the erase of the disk. Possible security hazard. -w, --weak-keys Uses a weak source of entropy (urandom) for key material. WARNING: This is a REALLY REALLY bad idea for anything but testing. Valid options for --modify are: --new-keyfile=<key file> Specifies a key file to use for the password derivation, when re-encrypting the header, can appear multiple times. --new-pbkdf-prf=<pbkdf prf algorithm> Specifies which hashing function to use for the PBKDF password derivation when re-encrypting the header. To see valid options, specify '-a help'. -s <disk path>, --system-encryption=<disk path> Specifies that the disk (e.g. /dev/da0) is using system encryption. --fde Specifies that the disk (e.g. /dev/da0) is using full disk encryption. --use-backup Uses the backup headers (at the end of the volume) instead of the primary headers. Both normal and backup headers will be modified! This is useful when your primary headers have been corrupted. --restore-from-backup-hdr Implies --use-backup, no new PBKDF hashing function, no new keyfiles and no new passphrase. In other words, this will simply restore both headers from the backup header. -w, --weak-keys Uses a weak source of entropy (urandom) for salt material. The key material is not affected, as the master keys are kept intact. WARNING: This is a bad idea for anything but testing. Valid options for --info and --map are: -e, --protect-hidden Protect a hidden volume when mounting the outer volume. -s <disk path>, --system-encryption=<disk path> Specifies that the disk (e.g. /dev/da0) is using system encryption. --fde Specifies that the disk (e.g. /dev/da0) is using full disk encryption. --use-backup Uses the backup headers (at the end of the volume) instead of the primary headers. This is useful when your primary headers have been corrupted. Valid options common to all commands are: -d <device path>, --device=<device path> Specifies the path to the volume to operate on (e.g. /dev/da0s1). -f <key file>, --keyfile-hidden=<key file> Specifies a key file to use for the hidden volume password derivation. This option is only valid in combination with -e, --protect-hidden or -g, --hidden. -k <key file>, --keyfile=<key file> Specifies a key file to use for the password derivation, can appear multiple times.
Was schreibe ich um truecrypt devices zu finden?
Was schreibe ich um tc files zu finden?
Was schreibe ich um tc device zu mount'en zb sdb1?
Was schreibe ich um tc files zu mount'en?
Gleiche Fragen wie man unmount'ed?
Danke.