Schedule

Schedule

Saturday, September 20

1411236000 The Tech Guy

Sunday, September 21

1411322400 The Tech Guy
1411336800 This Week in Tech

Monday, September 22

1411405200 Tech News Today
1411408800 Triangulation
1411414200 iPad Today
1411426800 Tech News 2Night
1411428600 Marketing Mavericks

Tuesday, September 23

1411491600 Tech News Today
1411495200 MacBreak Weekly
1411502400 Security Now
1411509600 Before You Buy
1411513200 Tech News 2Night
1411516800 All About Android
1411525800 Padre's Corner

Wednesday, September 24

1411572600 FLOSS Weekly
1411578000 Tech News Today
1411581600 Windows Weekly
1411588800 This Week in Google
1411599600 Tech News 2Night
1411601400 redditUP
1411606800 Ham Nation

Thursday, September 25

1411664400 Tech News Today
1411668000 Know How...
1411671600 The Social Hour
1411677000 Coding 101
1411680600 Home Theater Geeks
1411686000 Tech News 2Night
1411687800 The Giz Wiz
1411696800 OMGcraft

Friday, September 26

1411750800 Tech News Today
1411754400 This Week in Law
1411761600 Android App Arena
1411772400 Tech News 2Night

Saturday, September 27

1411840800 The Tech Guy

Sunday, September 28

1411927200 The Tech Guy
1411941600 This Week in Tech

Monday, September 29

1412010000 Tech News Today
1412013600 Triangulation
1412019000 iPad Today
1412031600 Tech News 2Night
1412033400 Marketing Mavericks

Most Recent Episodes

Tech News 2Night

Selling Drugs on Instagram

This Week in Law

Did the FBI sleuth or hack to find the location of the Silk Road server?

Android App Arena
Episode #13: Material Design September 19th, 2014

Hands-on reviews of Reddit News, Today Calendar, Wally and Hangouts Dialer.

TWiT Live Specials
Episode #207: iPhone 6 Unboxing September 19th, 2014

Leo unboxes a brand new iPhone 6.

Tech News Today

The launch of the iPhone 6 and iPhone 6 Plus was greeted by long lines and widespread shortages.

This Week in Computer Hardware

New Moto X, GTX 980 leaks, and people raving regarding the iPhone 6.

The Giz Wiz
Episode #1486: No Potato Rotato September 18th, 2014

Capresso, self centering measuring tape, cut resistant gloves.

Home Theater Geeks
Episode #224: CEDIA 2014 Round-Up September 18th, 2014

Scott, Michael, Mark and Tom recap the CEDIA 2014 expo.

The Social Hour

Tiiny app, Apple CEO Tim Cook says "no social", Uber & Lyft are killing taxi business

OMGcraft

A brand new multi-genre map from qmagnet and his team.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte