Schedule

Schedule

Tuesday, May 5

1430870400 All About Android

Wednesday, May 6

1430926200 FLOSS Weekly
1430931600 Tech News Today
1430935200 Windows Weekly
1430942400 This Week in Google
1430953200 Tech News 2Night
1430955000 Android App Arena
1430960400 Ham Nation

Thursday, May 7

1431018000 Tech News Today
1431021600 Know How...
1431032400 Home Theater Geeks
1431039600 Tech News 2Night

Friday, May 8

1431104400 Tech News Today
1431108000 This Week in Law
1431118800 Before You Buy
1431126000 Tech News 2Night

Saturday, May 9

1431194400 The Tech Guy

Sunday, May 10

1431280800 The Tech Guy
1431295200 This Week in Tech

Monday, May 11

1431363600 Tech News Today
1431367200 Triangulation
1431372600 iPad Today
1431379800 Coding 101
1431385200 Tech News 2Night

Tuesday, May 12

1431450000 Tech News Today
1431453600 MacBreak Weekly
1431462600 Security Now
1431471600 Tech News 2Night
1431475200 All About Android

Wednesday, May 13

1431531000 FLOSS Weekly
1431536400 Tech News Today
1431540000 Windows Weekly
1431547200 This Week in Google
1431558000 Tech News 2Night
1431559800 Android App Arena
1431565200 Ham Nation

Thursday, May 14

1431622800 Tech News Today
1431626400 Know How...
1431637200 Home Theater Geeks
1431644400 Tech News 2Night

Friday, May 15

1431709200 Tech News Today
1431712800 This Week in Law
1431723600 Before You Buy
1431730800 Tech News 2Night

Most Recent Episodes

Tech News 2Night

The Apple Watch is "Just a Watch" says one reviewer.

MacBreak Weekly

Apple Watch accessories.

Tech News Today

Facebook is now using Nokia's Here maps for mobile web.

iPad Today

Star Wars apps for iPad and iOS

Tech News 2Night

A Facebook privacy update promised 1 year ago, went into effect over the weekend

Coding 101

Coder to Programmer, and Carlos Souza with more Ruby.

Triangulation

Neil Young talks about high-res music player Pono.

Tech News Today

US Justice Department plans to reveal more about the government's of phone tracking systems.

This Week in Tech

Apple Watch, Tesla's home battery, Hyperloop, Microsoft Build 2015, Hololens, and more.

The Tech Guy
The Tech Guy 1184 May 3rd, 2015

The problem with smart watches.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte