Encrypted Dual-Boot: Slackware 14.2 and Windows 10

How’s it goin’ guys?

Its been quite a long time and I am very happy to be back here!

I am a little embarrassed to say its been a few months since I even booted into a Linux system that is my own – of course I do deal with different types of servers and such for work, so that doesn’t count… hehehe 😛

Although this video isn’t anything too fancy, it is mainly just a way to kick start myself back into my usual lab setup (the same one from before) and also regular posts right here on the blog! Hopefully you guys are excited as well.

I figured in a day and age where our own internet service provider sells our traffic, we might as well take a few extra steps to secure our data both in our operating system and when it comes to our network traffic as well… in this episode, we will be dealing with our OS and probably start looking into an encrypted layer of security for the network traffic in the next few episodes.

In any case, let’s begin this tutorial…


Before we begin, we will need to create 2 USBs for installing Slackware and Windows. Check out guides for each one below:

– How To Create a Bootable Slackware 14.2 USB

– How To Create a Bootable Windows 10 USB

We will now take a look at how to partition a hard drive for dual-boot using AES encryption for our home directory…

As some of you may know, hard drive capacities are not totally accurate, so for the 1,000GB in that hard drive there is really only 900 and something gigabytes so the number on one of those partitions won’t exactly be accurate, but whatever…

You will also notice that there is no swap partition for Linux and there is a good reason for that: I am installing this on my desktop, which honestly, given how much memory I have and the fact I basically never leave my computer hibernating, there is simply no need for one. If it was my laptop I would definitely include a swap partition and possibly encrypt it as well.

Anyway, we will be encrypting two sectors of our hard drive: the Slackware ‘/home’ directory and also the ‘Files’ partition (500GB).

The reason for this is because I don’t plan on using my other partitions to store any critical data, in which case, I do not care if anybody gains access to the data contained in it since it will be mainly program installations and such. It is good to note that we will have access to the ‘Files’ partition from both Slackware and Windows and that this partition will use a different encryption scheme than our ‘/home’ partition which has AES 256 bit encryption.

The main encryption scheme we will be using is the LUKS (Linux Unified Key Setup) setup, which you can learn more about it here.

As always, I have made an easy step-by-step video which you can follow below:

The main encryption scheme for the ‘Files’ partition will be covered in the next tutorial coming this week…

Stay tuned and thanks for watching! 🙂

1 thought on “Encrypted Dual-Boot: Slackware 14.2 and Windows 10”

Leave a Reply

Your email address will not be published. Required fields are marked *