From 32052f214b052531cc55d5d52c0283adabf838ca Mon Sep 17 00:00:00 2001 From: a1346054 <36859588+a1346054@users.noreply.github.com> Date: Sat, 4 Sep 2021 19:59:25 +0000 Subject: Minor cleanup of the repo (#822) * *: source files should not be executable * *: make sure files have final newline * *: remove BOM from text files * translations: unify headers * *: fix typos * *: trim excess whitespace --- doc/html/System Encryption.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'doc/html/System Encryption.html') diff --git a/doc/html/System Encryption.html b/doc/html/System Encryption.html index ed92c717..174ef49d 100644 --- a/doc/html/System Encryption.html +++ b/doc/html/System Encryption.html @@ -10,7 +10,7 @@ -
+
VeraCrypt
@@ -27,7 +27,7 @@

-Documentation +Documentation >> System Encryption

@@ -65,7 +65,7 @@ Because of BIOS requirement, the pre-boot password is typed using US key During the system encryption process, VeraCrypt automatically and transparently switches the keyboard to US layout in order to ensure that the password value typed will match the one typed in pre-boot mode. Thus, in order to avoid wrong password errors, one must type the password using the same keys as when creating the system encryption.

Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is - running). In EFI boot mode, which is the default on modern PCs, VeraCrypt can not encrypt this partition since it must remain unencrypted so that the BIOS can load the EFI bootloader from it. This in turn implies that in EFI boot mode, VeraCrypt offers only to encrypt the system partition where Windows is installed (the user can later manualy encrypt other data partitions using VeraCrypt). + running). In EFI boot mode, which is the default on modern PCs, VeraCrypt can not encrypt this partition since it must remain unencrypted so that the BIOS can load the EFI bootloader from it. This in turn implies that in EFI boot mode, VeraCrypt offers only to encrypt the system partition where Windows is installed (the user can later manualy encrypt other data partitions using VeraCrypt). In MBR legacy boot mode, VeraCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).

 

Next Section >>

-- cgit v1.2.3