Schedule

Schedule

Wednesday, April 1

1427918400 This Week in Google
1427929200 Tech News 2Night
1427931000 Android App Arena
1427936400 Ham Nation

Thursday, April 2

1427994000 Tech News Today
1427997600 Know How...
1428003000 Marketing Mavericks
1428008400 Home Theater Geeks
1428015600 Tech News 2Night
1428017400 The Giz Wiz

Friday, April 3

1428080400 Tech News Today
1428084000 This Week in Law
1428094800 Before You Buy
1428102000 Tech News 2Night
1428105600 Padre's Corner

Saturday, April 4

1428170400 The Tech Guy

Sunday, April 5

1428256800 The Tech Guy
1428271200 This Week in Tech

Monday, April 6

1428339600 Tech News Today
1428343200 Triangulation
1428348600 iPad Today
1428355800 Coding 101
1428361200 Tech News 2Night

Tuesday, April 7

1428426000 Tech News Today
1428429600 MacBreak Weekly
1428438600 Security Now
1428447600 Tech News 2Night
1428451200 All About Android

Wednesday, April 8

1428507000 FLOSS Weekly
1428512400 Tech News Today
1428516000 Windows Weekly
1428523200 This Week in Google
1428534000 Tech News 2Night
1428535800 Android App Arena
1428541200 Ham Nation

Thursday, April 9

1428598800 Tech News Today
1428602400 Know How...
1428607800 Marketing Mavericks
1428613200 Home Theater Geeks
1428620400 Tech News 2Night
1428622200 The Giz Wiz

Friday, April 10

1428685200 Tech News Today
1428688800 This Week in Law
1428699600 Before You Buy
1428706800 Tech News 2Night
1428710400 Padre's Corner

Saturday, April 11

1428775200 The Tech Guy

Most Recent Episodes

FLOSS Weekly
Episode #330: Docker April 1st, 2015

Solomon Hykes and Docker has it's 2nd birthday.

Tech News Today

1200 Radio Shack stores may stay open with more Sprint products.

All About Android

Samsung Galaxy S6, The Chrome Stick, and Android Apps on Chrome OS!

Tech News 2Night

Microsoft Surface 3 can run Windows 10.

Security Now

Is it possible to replace a crashed hard drive when UEFI secure boot is on?

MacBreak Weekly
Episode #448: Normcore March 31st, 2015

How Tidal will affect Apple's Beats.

Tech News Today

IBM invests in the Internet of Things.

Tech News 2Night

Windows Spartan sneak peak

Coding 101
Episode #61: Carlos Souza March 30th, 2015

Learn ruby from codeschool.com and Carlos Souza

iPad Today

Tumblr, Instapaper, Crazy Gears

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte