Schedule

Schedule

Thursday, October 30

1414688400 Tech News Today
1414692000 Know How...
1414695600 Marketing Mavericks
1414701000 Coding 101
1414704600 Home Theater Geeks
1414710000 Tech News 2Night
1414711800 The Giz Wiz

Friday, October 31

1414774800 Tech News Today
1414778400 This Week in Law
1414785600 Android App Arena
1414796400 Tech News 2Night

Saturday, November 1

1414864800 The Tech Guy

Sunday, November 2

1414954800 The Tech Guy
1414969200 This Week in Tech

Monday, November 3

1415037600 Tech News Today
1415041200 Triangulation
1415046600 iPad Today
1415059200 Tech News 2Night

Tuesday, November 4

1415124000 Tech News Today
1415127600 MacBreak Weekly
1415134800 Security Now
1415142000 Before You Buy
1415145600 Tech News 2Night
1415149200 All About Android
1415158200 Padre's Corner

Wednesday, November 5

1415205000 FLOSS Weekly
1415210400 Tech News Today
1415214000 Windows Weekly
1415221200 This Week in Google
1415232000 Tech News 2Night
1415239200 Ham Nation

Thursday, November 6

1415296800 Tech News Today
1415300400 Know How...
1415304000 Marketing Mavericks
1415309400 Coding 101
1415313000 Home Theater Geeks
1415318400 Tech News 2Night
1415320200 The Giz Wiz

Friday, November 7

1415383200 Tech News Today
1415386800 This Week in Law
1415394000 Android App Arena
1415404800 Tech News 2Night

Saturday, November 8

1415473200 The Tech Guy

Most Recent Episodes

Ham Nation

Bob Heil shows how to DX on a vintage station.

This Week in Google

Larry Page hands leadership of many Google products to Sundar Pichai.

Tech News 2Night

Moblie Payment Terminal Wars

iFive for the iPhone

Siri location tip, landscape keyboard.

Windows Weekly
Episode #386: Pom Pom Paul October 29th, 2014

MS Office 15 in 2015 and a $50 Xbox One Holiday price cut.

FLOSS Weekly
Episode #314: CoreOS October 29th, 2014

Linux for Massive Server Deployments.

Tech News Today

FCC wants to bring cable TV to the Internet, UK gets NSA data without warrant, and more.

All About Android
Episode #185: Aspire Higher October 29th, 2014

djay 2 hits Android, threats to NFC payments, and Motorola Droid Turbo.

Padre's Corner

Tim Stevens on tech, journalism, integrity and speed.

Before You Buy

iMac with 5K Retina display review.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte