Schedule

Schedule

Thursday, February 26

1424989800 Home Theater Geeks
1424995200 Tech News 2Night
1424997000 The Giz Wiz

Friday, February 27

1425060000 Tech News Today
1425063600 This Week in Law
1425081600 Tech News 2Night

Saturday, February 28

1425150000 The Tech Guy

Sunday, March 1

1425236400 The Tech Guy
1425250800 This Week in Tech

Monday, March 2

1425319200 Tech News Today
1425322800 Triangulation
1425328200 iPad Today
1425335400 Coding 101
1425340800 Tech News 2Night

Tuesday, March 3

1425405600 Tech News Today
1425409200 MacBreak Weekly
1425418200 Security Now
1425427200 Tech News 2Night
1425430800 All About Android

Wednesday, March 4

1425486600 FLOSS Weekly
1425492000 Tech News Today
1425495600 Windows Weekly
1425502800 This Week in Google
1425513600 Tech News 2Night
1425515400 Android App Arena
1425520800 Ham Nation

Thursday, March 5

1425578400 Tech News Today
1425582000 Know How...
1425587400 Marketing Mavericks
1425594600 Home Theater Geeks
1425600000 Tech News 2Night
1425601800 The Giz Wiz

Friday, March 6

1425664800 Tech News Today
1425668400 This Week in Law
1425679200 Before You Buy
1425686400 Tech News 2Night
1425690000 Padre's Corner

Saturday, March 7

1425754800 The Tech Guy

Sunday, March 8

1425837600 The Tech Guy

Most Recent Episodes

Tech News Today

Google breaks Google+ into pieces

Ham Nation
Episode #185: Hello New Hams! February 25th, 2015

Randy(K7AGE) builds a field strength meter from a digital multimeter.

This Week in Google
Episode #289: L'il Rick February 25th, 2015

Chromebook Pixel 2

Android App Arena
Episode #34: Battery February 25th, 2015

Battery Percent Enabler, Battery Panic, Battery Widget Reborn, YouTube Kids

iFive for the iPhone

Epic Zen Garden, return a lost iPhone with Siri

Tech News 2Night

Your wallet is not welcome here, it's bring your Google-to-work day, and more.

Windows Weekly
Episode #402: Watch Your Squad February 25th, 2015

OneDrive API, Microsoft Band updated, and Xbox System Update in March.

FLOSS Weekly

Simon Phipps, Patrick Masson and the OSI.

Tech News Today

Reddit joins Google in its quest to cover up naked people online, and more.

All About Android
Episode #202: Nexusize It February 24th, 2015

The upcoming Samsung Galaxy S6, HTC One M9, and a look at the LG G Flex 2.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte