
VeraCrypt Virtual Encrypted Disks
Preparing for Encryption
- Identify which records require additional encryption
- Ensure you have adequate storage space for encrypted content
- Back up any critical data before encryption
Creating Encrypted Storage
- Select "New Encrypted Disk" from the Tools menu
- Choose a descriptive name for your encrypted storage
- Select an appropriate location that balances security and accessibility
- Create a strong, unique password (different from your main DEXIT password)
Configuring Encryption Settings
- Select encryption strength based on your security needs
- Configure mount options for your encrypted disk
- Set up auto-lock features when appropriate
DEXIT's encrypted file handling seamlessly interfaces with VeraCrypt's container system, enabling users to securely store and access data through a unified dashboard while maintaining separate encryption protocols for each layer.
- DEXIT provides a comprehensive suite of tools tailored for both individuals and organizations to manage data effectively. It focuses on key areas such as data governance, reputation protection, and regulatory compliance.
- These capabilities ensure that data is not only managed efficiently but also safeguarded against potential threats and misuse, enhancing overall trust and credibility.
- VeraCrypt complements DEXIT by adding robust encryption features that protect data at multiple levels.
Some of its main features include:
+ Creation of virtual encrypted disks within files, mounted as real disks.
+ Encryption of entire partitions or storage devices, such as USB flash drives or hard drives.
+ Pre-boot authentication to encrypt partitions or drives where Windows is installed.
+ Real-time, on-the-fly encryption that is automatic and transparent.
+ Utilization of parallelization and pipelining to maintain data read/write speeds.
+ Hardware-accelerated encryption on modern processors.
+ Plausible deniability through hidden volumes and operating systems, providing an extra layer of security.
- Together, DEXIT and VeraCrypt offer a comprehensive solution for data privacy, combining effective data management with cutting-edge encryption technology.
- This integration ensures that data remains secure and compliant with regulatory standards, giving users peace of mind and confidence in their data privacy measures.
IDRIX - Cryptography and IT Security Experts - https://www.idrix.fr/Root/
- VeraCrypt Home : https://www.veracrypt.fr/en/Home.html
- Source Code : https://www.veracrypt.fr/code/
- Downloads : https://www.veracrypt.fr/en/Downloads.html
- Documentation : https://www.veracrypt.fr/en/Documentation.html
- Donate : https://www.veracrypt.fr/en/Donation.html
- Forums : https://sourceforge.net/p/veracrypt/discussion/
After Download & Installation
- Beginner's Tutorial : https://www.veracrypt.fr/en/Beginner%27s%20Tutorial.html
Latest Stable Release
Windows: < click here to see current download version >
Virtual Encrypted Disk Integration

The integration of DEXIT and VeraCrypt represents a significant leap forward in data privacy and management.
Illustration above shows:
- DEXIT accessing VeraCrypt Virtual Encrypted disk.
- Once installed and configured your VeraCrypt Volume window will appear similar to the one shown in the example above and to the right.
- The selection of the Drive, Volume, Size and Encryption is all user defined. The values use here are for illustration only.
Virtual Encrypted Disk
- Drive : V:
- Volume : F:\VeraCrypt\DEXIT\DEX_VeraCrypt
- Size : 5.0 GB
- Encryption : AES
- Type : Normal