Schedule

Schedule

Tuesday, September 23

1411491600 Tech News Today
1411495200 MacBreak Weekly
1411502400 Security Now
1411509600 Before You Buy
1411513200 Tech News 2Night
1411516800 All About Android
1411525800 Padre's Corner

Wednesday, September 24

1411572600 FLOSS Weekly
1411578000 Tech News Today
1411581600 Windows Weekly
1411588800 This Week in Google
1411599600 Tech News 2Night
1411601400 redditUP
1411606800 Ham Nation

Thursday, September 25

1411664400 Tech News Today
1411668000 Know How...
1411671600 The Social Hour
1411677000 Coding 101
1411680600 Home Theater Geeks
1411686000 Tech News 2Night
1411687800 The Giz Wiz
1411696800 OMGcraft

Friday, September 26

1411750800 Tech News Today
1411754400 This Week in Law
1411761600 Android App Arena
1411772400 Tech News 2Night

Saturday, September 27

1411840800 The Tech Guy

Sunday, September 28

1411927200 The Tech Guy
1411941600 This Week in Tech

Monday, September 29

1412010000 Tech News Today
1412013600 Triangulation
1412019000 iPad Today
1412031600 Tech News 2Night
1412033400 Marketing Mavericks

Tuesday, September 30

1412096400 Tech News Today
1412100000 MacBreak Weekly
1412107200 Security Now
1412114400 Before You Buy
1412118000 Tech News 2Night
1412121600 All About Android
1412130600 Padre's Corner

Wednesday, October 1

1412177400 FLOSS Weekly
1412182800 Tech News Today
1412186400 Windows Weekly
1412193600 This Week in Google
1412204400 Tech News 2Night
1412206200 redditUP
1412211600 Ham Nation

Thursday, October 2

1412269200 Tech News Today
1412272800 Know How...
1412276400 The Social Hour
1412281800 Coding 101
1412285400 Home Theater Geeks
1412290800 Tech News 2Night
1412292600 The Giz Wiz
1412301600 OMGcraft

Most Recent Episodes

Marketing Mavericks
Episode #24: UnMarketing September 22nd, 2014

How the Ritz-Carlton went the extra mile, how to make a viral video, and more.

This Week in Enterprise Tech

The iGuardian

iPad Today

iPhone 6 Plus vs. iPad mini, Adobe buys Aviary

Tech News 2Night

iPhone 6 Breaks Sales Record

Triangulation
Episode #168: Dan "Shoe" Hsu September 22nd, 2014

Editor-in-chief of GamesBeat.

Tech News Today
Episode #1097: Duck Duck No Go September 22nd, 2014

The privacy-oriented search engine, DuckDuckGo,has been blocked in China by the Chinese government.

This Week in Tech
Episode #476: Brain in a Jar September 21st, 2014

Apple gold, warrant canaries, Fire for kids, Larry Ellison's island, and more.

The Tech Guy
The Tech Guy 1120 September 21st, 2014

Are iOS alternate keyboards secure?

The Tech Guy
The Tech Guy 1119 September 20th, 2014

Where is the best place to buy a gaming PC?

Tech News 2Night

Selling Drugs on Instagram

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte