Schedule

Schedule

Monday, January 26

1422304200 iPad Today
1422316800 Tech News 2Night

Tuesday, January 27

1422381600 Tech News Today
1422385200 MacBreak Weekly
1422392400 Security Now
1422399600 Before You Buy
1422403200 Tech News 2Night
1422406800 All About Android
1422415800 Padre's Corner

Wednesday, January 28

1422462600 FLOSS Weekly
1422468000 Tech News Today
1422471600 Windows Weekly
1422478800 This Week in Google
1422489600 Tech News 2Night
1422491400 Android App Arena
1422496800 Ham Nation

Thursday, January 29

1422554400 Tech News Today
1422558000 Know How...
1422561600 Marketing Mavericks
1422567000 Coding 101
1422570600 Home Theater Geeks
1422576000 Tech News 2Night
1422577800 The Giz Wiz

Friday, January 30

1422640800 Tech News Today
1422644400 This Week in Law
1422662400 Tech News 2Night

Saturday, January 31

1422730800 The Tech Guy

Sunday, February 1

1422817200 The Tech Guy
1422831600 This Week in Tech

Monday, February 2

1422900000 Tech News Today
1422903600 Triangulation
1422909000 iPad Today
1422921600 Tech News 2Night

Tuesday, February 3

1422986400 Tech News Today
1422990000 MacBreak Weekly
1422997200 Security Now
1423004400 Before You Buy
1423008000 Tech News 2Night
1423011600 All About Android
1423020600 Padre's Corner

Wednesday, February 4

1423067400 FLOSS Weekly
1423072800 Tech News Today
1423076400 Windows Weekly
1423083600 This Week in Google
1423094400 Tech News 2Night
1423096200 Android App Arena
1423101600 Ham Nation

Thursday, February 5

1423159200 Tech News Today
1423162800 Know How...

Most Recent Episodes

Tech News Today
Episode #1182: Why Just WiFi? January 26th, 2015

WikiLeaks is mad at Google for not leaking something.

This Week in Tech

Windows 10 everywhere, App Neutrality, HoloLens, space net, and more.

The Tech Guy
The Tech Guy 1156 January 25th, 2015

Elon Musk wants to put the internet in space.

The Tech Guy
The Tech Guy 1155 January 24th, 2015

Is it safe to update Java on Windows XP?

Tech News 2Night
Episode #260: Box's Big IPO January 23rd, 2015

Skymall files for Bankruptcy

This Week in Law

Who should be responsible for determining international cyber law policies?

Tech News Today

Apple Watch battery and Winklevi the NASDAQ of Bitcoin.

This Week in Computer Hardware

GTX 960, Microsoft HaloLens, ECS LIVA X, and more!

Home Theater Geeks

More CES 2015 highlights.

Coding 101
Episode #51: Steve Gibson January 22nd, 2015

Creator of SpinRite.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte