Schedule

Schedule

Wednesday, July 30

1406734200 FLOSS Weekly
1406739600 Tech News Today
1406743200 Windows Weekly
1406750400 This Week in Google
1406761200 Tech News 2Night
1406763000 redditUP
1406768400 Ham Nation

Thursday, July 31

1406826000 Tech News Today
1406829600 Know How...
1406833200 The Social Hour
1406838600 Coding 101
1406842200 Home Theater Geeks
1406847600 Tech News 2Night
1406849400 The Giz Wiz
1406858400 OMGcraft

Friday, August 1

1406912400 Tech News Today
1406916000 This Week in Law
1406923200 Android App Arena
1406934000 Tech News 2Night

Saturday, August 2

1407002400 The Tech Guy

Sunday, August 3

1407088800 The Tech Guy
1407103200 This Week in Tech

Monday, August 4

1407171600 Tech News Today
1407175200 Triangulation
1407180600 iPad Today
1407193200 Tech News 2Night
1407195000 Marketing Mavericks

Tuesday, August 5

1407258000 Tech News Today
1407261600 MacBreak Weekly
1407268800 Security Now
1407276000 Before You Buy
1407279600 Tech News 2Night
1407283200 All About Android

Wednesday, August 6

1407339000 FLOSS Weekly
1407344400 Tech News Today
1407348000 Windows Weekly
1407355200 This Week in Google
1407366000 Tech News 2Night
1407367800 redditUP
1407373200 Ham Nation

Thursday, August 7

1407430800 Tech News Today
1407434400 Know How...
1407438000 The Social Hour
1407443400 Coding 101
1407447000 Home Theater Geeks
1407452400 Tech News 2Night
1407454200 The Giz Wiz
1407463200 OMGcraft

Friday, August 8

1407517200 Tech News Today
1407520800 This Week in Law
1407528000 Android App Arena
1407538800 Tech News 2Night

Most Recent Episodes

Security Now

iOS v7 Jailbroken, iOS Backdoors, and Android Certificate Checking

Tech News 2Night

China investigates Microsoft.

OMGcraft

Command blocks in Minecraft.

MacBreak Weekly

A closer look at OS X Yosemite.

Tech News Today

A recently discovered Android flaw leaves phones exposed to malware and personal data theft.

This Week in Enterprise Tech

Threat Intelligence and Security Assessment

iPad Today

F Sim Space Shuttle, Dulux Visualizer, NPR One

Marketing Mavericks

How to market and monetize you're content online.

Tech News 2Night

OkCupid conducted matchmaking experiments on users

Tech News Today

Samsung's first Tizen smartphone is reportedly delayed indefinitely.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte