Schedule

Schedule

Wednesday, September 17

1410967800 FLOSS Weekly
1410973200 Tech News Today
1410976800 Windows Weekly
1410984000 This Week in Google
1410994800 Tech News 2Night
1410996600 redditUP
1411002000 Ham Nation

Thursday, September 18

1411059600 Tech News Today
1411063200 Know How...
1411066800 The Social Hour
1411072200 Coding 101
1411075800 Home Theater Geeks
1411081200 Tech News 2Night
1411083000 The Giz Wiz
1411092000 OMGcraft

Friday, September 19

1411146000 Tech News Today
1411149600 This Week in Law
1411156800 Android App Arena
1411167600 Tech News 2Night

Saturday, September 20

1411236000 The Tech Guy

Sunday, September 21

1411322400 The Tech Guy
1411336800 This Week in Tech

Monday, September 22

1411405200 Tech News Today
1411408800 Triangulation
1411414200 iPad Today
1411426800 Tech News 2Night
1411428600 Marketing Mavericks

Tuesday, September 23

1411491600 Tech News Today
1411495200 MacBreak Weekly
1411502400 Security Now
1411509600 Before You Buy
1411513200 Tech News 2Night
1411516800 All About Android
1411525800 Padre's Corner

Wednesday, September 24

1411572600 FLOSS Weekly
1411578000 Tech News Today
1411581600 Windows Weekly
1411588800 This Week in Google
1411599600 Tech News 2Night
1411601400 redditUP
1411606800 Ham Nation

Thursday, September 25

1411664400 Tech News Today
1411668000 Know How...
1411671600 The Social Hour
1411677000 Coding 101
1411680600 Home Theater Geeks
1411686000 Tech News 2Night
1411687800 The Giz Wiz
1411696800 OMGcraft

Friday, September 26

1411750800 Tech News Today
1411754400 This Week in Law
1411761600 Android App Arena
1411772400 Tech News 2Night

Most Recent Episodes

Padre's Corner

Cancer Bees, Clean Coal, Ranting on Comcast, and a romp through TechTV.

Before You Buy

Leo Laporte reviews the Moto 360 Android Wear watch.

All About Android

Does everything point back to Android Silver, that oft rumored and never confirmed project?

Security Now
Episode #473: Google vs. SHA-1 September 16th, 2014

Steve Gibson analyzes Google on deprecating SHA-1.

Tech News 2Night

iPhone 6 NFC for Apple Pay only.

MacBreak Weekly
Episode #420: Apple Hangover September 16th, 2014

Insight into Tim Cook

OMGcraft

Chad shows how to make armor stands and everything you can do with them in Minecraft 1.8.

Tech News Today

Samsung marketing hits a new level with the upcoming launch of its YouTube sitcom.

Marketing Mavericks
Episode #23: One More Thing September 15th, 2014

Apple's special event, T-Mobile's CEO, and the NFL.

Tech News 2Night

FBI Finalizes Facial Recognition System

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte