Schedule

Schedule

Tuesday, October 21

1413921600 Security Now
1413928800 Before You Buy
1413932400 Tech News 2Night
1413936000 All About Android
1413945000 Padre's Corner

Wednesday, October 22

1413991800 FLOSS Weekly
1413997200 Tech News Today
1414000800 Windows Weekly
1414008000 This Week in Google
1414018800 Tech News 2Night
1414026000 Ham Nation

Thursday, October 23

1414083600 Tech News Today
1414087200 Know How...
1414090800 Marketing Mavericks
1414096200 Coding 101
1414099800 Home Theater Geeks
1414105200 Tech News 2Night
1414107000 The Giz Wiz

Friday, October 24

1414170000 Tech News Today
1414173600 This Week in Law
1414180800 Android App Arena
1414191600 Tech News 2Night

Saturday, October 25

1414260000 The Tech Guy

Sunday, October 26

1414346400 The Tech Guy
1414360800 This Week in Tech

Monday, October 27

1414429200 Tech News Today
1414432800 Triangulation
1414438200 iPad Today
1414450800 Tech News 2Night

Tuesday, October 28

1414515600 Tech News Today
1414519200 MacBreak Weekly
1414526400 Security Now
1414533600 Before You Buy
1414537200 Tech News 2Night
1414540800 All About Android
1414549800 Padre's Corner

Wednesday, October 29

1414596600 FLOSS Weekly
1414602000 Tech News Today
1414605600 Windows Weekly
1414612800 This Week in Google
1414623600 Tech News 2Night
1414630800 Ham Nation

Thursday, October 30

1414688400 Tech News Today
1414692000 Know How...
1414695600 Marketing Mavericks
1414701000 Coding 101
1414704600 Home Theater Geeks
1414710000 Tech News 2Night
1414711800 The Giz Wiz

Friday, October 31

1414774800 Tech News Today
1414778400 This Week in Law
1414785600 Android App Arena

Most Recent Episodes

Tech News Today

Samsung announced that its Knox security platform received NSA approval for use by US Government.

This Week in Enterprise Tech

Enterprise Storage with Howard Marks

iPad Today

Clips for smart copy/paste, Flickr's new iPad app, iOS 8.1

Tech News 2Night

iOS 8.1 is now available

Triangulation

Writer, editor, and professional bohemian.

Tech News Today

Reports claim that the Chinese government is intercepting connections to Apple's iCloud from China.

This Week in Tech
Episode #480: And. Roid. October 19th, 2014

Apple Pay, Twitter turmoil, cable chaos, and more.

The Tech Guy
The Tech Guy 1128 October 19th, 2014

OS X Yosemite, Android Lollipop, and more.

The Tech Guy
The Tech Guy 1127 October 18th, 2014

Could a neighbor's Wi-Fi affect my Wi-Fi reliability?

Tech News 2Night

Snapchat feeds will soon have ads.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte