Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
VeraCrypt 1.25.7 update reintroduces support for Windows Vista, 7 and 8 systems
[Image: veracrypt-1.25.7.webp]

The latest version of the open source encryption software VeraCrypt brings back support for the operating systems Windows Vista, Windows 7 and Windows 8.The developers of VeraCrypt released VeraCrypt 1.25.4 in December 2021. One of the changes of the release was the removal of support for Windows Vista, Windows 7 and Windows 8 / 8.1. The reason for the removal was that new requirements for driver code signing forced the development team to drop support for these versions of Windows.

Tip: here is how you fix the automatic repair issue of VeraCrypt on Windows.

Windows Vista is no longer supported by Microsoft. Windows 7 is in its third year of extended security releases, and Windows 8.1 is still in extended support.

The official end of support date for Windows 8.1 is January 10, 2023. Both Windows 7 and 8.1 will run out of support at around the same time.

VeraCrypt 1.25.7 brings back support for Windows Vista, Windows 7 and Windows 8.1. The team notes that certain patches need to be installed on Windows 7 and Vista devices to get the latest version of VeraCrypt installed on these devices.
Quote:Windows 7 support requires that either KB3033929 or KB4474419 is installed.
  • KB3033929 is a security update that Microsoft released on September 3, 2015.
  • KB4474419 is the SHA-2 code signing support update.
Windows Vista support requires that either KB4039648 or KB4474419 is installed.

With these patches installed, VeraCrypt 1.25.7 installs fine on the three operating system versions.

The new version introduces another useful option that is specific to Windows machines. Three Registry options have been added that may be used to tune the performance "for SSD disks and having better stability under heavy load".

Here is what the three Registry values do and how you set them:
  1. Open the Registry Editor by selecting Start, typing regedit.exe and loading the result.
  2. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\veracrypt.
  3. Create the DWORDs with a right-click on veracrypt and the selection of New > Dword (32-bit) Value) from the context menu.
The DWORD VeraCryptEncryptionFragmentSize defines the size of encryption date fragment in KiB. The default value is 256, it can be increased up to a value of 2048.

The DWORD VeraCryptEncryptionIoRequestCount defines the maximum number of parallel I/O requests. The default is 16, it can be increased up to a value of 8192.

The DWORD VeraCryptEncryptionItemCount defines the maximum number of encryption queue items processed in parallel. Its default value and maximum value is half the value of VeraCryptEncryptionIoRequestCount.

The developers suggest to change the values to 512 (VeraCryptEncryptionFragmentSize), 128 (VeraCryptEncryptionIoRequestCount) and 64 (VeraCryptEncryptionItemCount) respectively, as it enhances "sequential read speed on some SSD NVMe systems".

VeraCrypt users who run Solid State Drives, especially NVMe drives, may need to experiment with the options to find the best values for their systems and use cases.

Now You: do you encrypt your systems?
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • ismail

Forum Jump:

Users browsing this thread: 1 Guest(s)
You have to register before you can post on our site.



Recent Posts
GFYI [Official] NoVirusThanks OSArmor P...
Big thanks to the or...pisondi — 18:51
AMD Ryzen 7000: Up to 16 Cores, AVX-512 ...
Robert Hallock ...harlan4096 — 08:30
Sumatra PDF 3.4.2
SumatraPDF version ...harlan4096 — 08:24
NoVirusThanks OSArmor v1.7.0
NoVirusThanks OSAr...harlan4096 — 08:22
360 Total Security
360 Total Security...harlan4096 — 08:20

Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

Online Staff
pisondi's profile pisondi