From 5e1fffa87191c3566bcbe20c6e8d29d5f21651d5 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 13 May 2017 17:34:16 +0200 Subject: Add HTML documentation. --- ...VeraCrypt Without Administrator Privileges.html | 59 ++++++++++++++++++++++ 1 file changed, 59 insertions(+) create mode 100644 doc/html/Using VeraCrypt Without Administrator Privileges.html (limited to 'doc/html/Using VeraCrypt Without Administrator Privileges.html') diff --git a/doc/html/Using VeraCrypt Without Administrator Privileges.html b/doc/html/Using VeraCrypt Without Administrator Privileges.html new file mode 100644 index 00000000..c02320e6 --- /dev/null +++ b/doc/html/Using VeraCrypt Without Administrator Privileges.html @@ -0,0 +1,59 @@ + + + + +VeraCrypt - Free Open source disk encryption with strong security for the Paranoid + + + + + + +
+VeraCrypt +
+ + + +
+

+Documentation +>> +Miscellaneous +>> +Using Without Admin Rights +

+ +
+
+

Using VeraCrypt Without Administrator Privileges

+

In Windows, a user who does not have administrator privileges can use VeraCrypt, but only after a system administrator installs VeraCrypt on the system. The reason for that is that VeraCrypt needs a device driver to provide transparent on-the-fly + encryption/decryption, and users without administrator privileges cannot install/start device drivers in Windows.
+
+After a system administrator installs VeraCrypt on the system, users without administrator privileges will be able to run VeraCrypt, mount/dismount any type of VeraCrypt volume, load/save data from/to it, and create file-hosted VeraCrypt volumes on the system. + However, users without administrator privileges cannot encrypt/format partitions, cannot create NTFS volumes, cannot install/uninstall VeraCrypt, cannot change passwords/keyfiles for VeraCrypt partitions/devices, cannot backup/restore headers of VeraCrypt + partitions/devices, and they cannot run VeraCrypt in ‘portable’ mode.

+
+ + + + + + +
+Warning: No matter what kind of software you use, as regards personal privacy in most cases, it is +not safe to work with sensitive data under systems where you do not have administrator privileges, as the administrator can easily capture and copy your sensitive data, including passwords and keys.
+

 

+
+
+
\ No newline at end of file -- cgit v1.2.3