Schedule

Schedule

Sunday, March 1

1425236400 The Tech Guy
1425250800 This Week in Tech

Monday, March 2

1425319200 Tech News Today
1425322800 Triangulation
1425328200 iPad Today
1425335400 Coding 101
1425340800 Tech News 2Night

Tuesday, March 3

1425405600 Tech News Today
1425409200 MacBreak Weekly
1425418200 Security Now
1425427200 Tech News 2Night
1425430800 All About Android

Wednesday, March 4

1425486600 FLOSS Weekly
1425492000 Tech News Today
1425495600 Windows Weekly
1425502800 This Week in Google
1425513600 Tech News 2Night
1425515400 Android App Arena
1425520800 Ham Nation

Thursday, March 5

1425578400 Tech News Today
1425582000 Know How...
1425587400 Marketing Mavericks
1425592800 Home Theater Geeks
1425600000 Tech News 2Night
1425601800 The Giz Wiz

Friday, March 6

1425664800 Tech News Today
1425668400 This Week in Law
1425679200 Before You Buy
1425686400 Tech News 2Night
1425690000 Padre's Corner

Saturday, March 7

1425754800 The Tech Guy

Sunday, March 8

1425837600 The Tech Guy
1425852000 This Week in Tech

Monday, March 9

1425920400 Tech News Today
1425924000 Triangulation
1425929400 iPad Today
1425936600 Coding 101
1425942000 Tech News 2Night

Tuesday, March 10

1426006800 Tech News Today
1426010400 MacBreak Weekly
1426019400 Security Now
1426028400 Tech News 2Night
1426032000 All About Android

Wednesday, March 11

1426087800 FLOSS Weekly
1426093200 Tech News Today

Most Recent Episodes

The Tech Guy
The Tech Guy 1165 February 28th, 2015

Storing photos and files if an iPad is your only computer.

Tech News 2Night

Google is working on a spectacular new campus.

This Week in Law
Episode #294: Dingo Free FCC February 27th, 2015

Do fan films infringe copyright or fall under Fair Use?

Tech News Today

Twitter fixes its troll control features

This Week in Computer Hardware

USB 3.1 performance, NVIDIA faces lawsuit for GeForce GTX 970 and more.

The Giz Wiz

Sick science toys, ThinkGeek blocks & games, Chad drinks from the Petaluma River and more!

Tech News 2Night

Apple sends invitations for March 9th announcement

Home Theater Geeks

Chip Adams, NBC Olympics, and thanks to SMPTE.

Coding 101

Let's talk about structures.

Know How...

Airbag for your Motorcycle.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte