或直接与 powershell或附加二进制文件 该二进制文件无需编译即可在 Windows NET Framework 上执行脚本: cs 脚本。
As an Idea: (for anyone still finding this post)
You could make this C# Script over at the post #18021118 (which accesses truecrypt to retrive mount information) (there is also a VeraCrypt version over there.) ...
into a commandline tool to be used from your windows batch (added a simple example here: http://github.com/BananaAcid/VeraCrypt-Cmd - replace the get mounts file with the one from the readme within)
or use it directly with powershell
or with an additional binary wich executes scripts on the windows NET Framework without compiling: cs-script.
发布评论
评论(2)
我认为这是不可能的。您可以使用
wmic Logicaldisk 获取更多信息
但没有任何迹象表明 Truecrypt 分配了驱动器号。I think this is not possible. You could get much information with
wmic logicaldisk
but nothing will indicate that Truecrypt assigned the drive letter.作为一个想法:(对于仍然找到这篇文章的任何人)
您可以在帖子#18021118处制作这个C#脚本访问 truecrypt 以检索安装信息)(那里还有一个 VeraCrypt 版本。)...
As an Idea: (for anyone still finding this post)
You could make this C# Script over at the post #18021118 (which accesses truecrypt to retrive mount information) (there is also a VeraCrypt version over there.) ...