Schedule

Schedule

Tuesday, April 21

1429635600 Tech News Today
1429639200 MacBreak Weekly
1429648200 Security Now
1429657200 Tech News 2Night
1429660800 All About Android

Wednesday, April 22

1429716600 FLOSS Weekly
1429722000 Tech News Today
1429725600 Windows Weekly
1429732800 This Week in Google
1429743600 Tech News 2Night
1429745400 Android App Arena
1429750800 Ham Nation

Thursday, April 23

1429808400 Tech News Today
1429812000 Know How...
1429817400 Marketing Mavericks
1429822800 Home Theater Geeks
1429830000 Tech News 2Night
1429831800 The Giz Wiz

Friday, April 24

1429894800 Tech News Today
1429898400 This Week in Law
1429909200 Before You Buy
1429916400 Tech News 2Night

Saturday, April 25

1429984800 The Tech Guy

Sunday, April 26

1430071200 The Tech Guy
1430085600 This Week in Tech

Monday, April 27

1430154000 Tech News Today
1430157600 Triangulation
1430163000 iPad Today
1430170200 Coding 101
1430175600 Tech News 2Night

Tuesday, April 28

1430240400 Tech News Today
1430244000 MacBreak Weekly
1430253000 Security Now
1430262000 Tech News 2Night
1430265600 All About Android

Wednesday, April 29

1430321400 FLOSS Weekly
1430326800 Tech News Today
1430330400 Windows Weekly
1430337600 This Week in Google
1430348400 Tech News 2Night
1430350200 Android App Arena
1430355600 Ham Nation

Thursday, April 30

1430413200 Tech News Today
1430416800 Know How...
1430422200 Marketing Mavericks
1430427600 Home Theater Geeks
1430434800 Tech News 2Night
1430436600 The Giz Wiz

Most Recent Episodes

iPad Today

Snapchat, Beat Sneak Bandit, Lost Within

Coding 101

Flash, Objective-C and Swift!

Tech News 2Night

Attention tech addicts... The doctor will see you now!

Triangulation

A documentary which exposes the dearth of American female and minority software engineers.

Tech News Today

Google is changing its search algorithm to favor mobile friendly sites.

This Week in Tech

This Week in Tech Turns 10!

The Tech Guy
The Tech Guy 1180 April 19th, 2015

Securing your Yahoo Mail account.

The New Screen Savers
Episode #0: We're Back! April 19th, 2015

The New Screen Savers launches May 2nd. Subscribe now!

The Tech Guy
The Tech Guy 1179 April 18th, 2015

Can I still back up off-site when internet connection is unreliable?

Before You Buy

First looks at the 3DR Solo Drone and Sony HDR 4K Monitors at NAB.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte