Schedule

Schedule

Sunday, December 21

1419188400 The Tech Guy
1419202800 This Week in Tech

Monday, December 22

1419271200 Tech News Today
1419274800 Triangulation
1419280200 iPad Today
1419292800 Tech News 2Night

Tuesday, December 23

1419357600 Tech News Today
1419361200 MacBreak Weekly
1419368400 Security Now
1419375600 Before You Buy
1419379200 Tech News 2Night
1419382800 All About Android
1419391800 Padre's Corner

Wednesday, December 24

1419444000 Tech News Today
1419447600 Windows Weekly
1419454800 This Week in Google
1419465600 Tech News 2Night

Thursday, December 25

1419530400 Tech News Today
1419534000 Know How...
1419537600 Marketing Mavericks
1419543000 Coding 101
1419546600 Home Theater Geeks
1419553800 The Giz Wiz

Friday, December 26

1419616800 Tech News Today
1419638400 Tech News 2Night

Saturday, December 27

1419706800 The Tech Guy

Sunday, December 28

1419793200 The Tech Guy
1419807600 This Week in Tech

Monday, December 29

1419876000 Tech News Today
1419879600 Triangulation
1419885000 iPad Today
1419897600 Tech News 2Night

Tuesday, December 30

1419962400 Tech News Today
1419966000 MacBreak Weekly
1419973200 Security Now
1419980400 Before You Buy
1419984000 Tech News 2Night
1419987600 All About Android
1419996600 Padre's Corner

Most Recent Episodes

The Tech Guy
The Tech Guy 1145 December 20th, 2014

Is North Korea responsible for the Sony hack?

Tech News 2Night

BBC says Apple mistreats factory workers.

This Week in Law

Photojournalist claims a blog infringes his copyright of the monkey selfie.

Tech News Today

The BBC has aired a new documentary slamming Apple

This Week in Computer Hardware

AMD Omega Driver, mechanical keys, and Broadwell NUC pics.

The Giz Wiz
Episode #1498: Inflate My Ego December 18th, 2014

TalkBand, disco lights, inflatable chair, and more!

Home Theater Geeks

Multichannel audio, speaker placement, and multiple subwoofers.

Tech News 2Night

A Security Flaw in Millions of Routers

Coding 101

Polishing up the holiday pricer.

Know How...

In case you didn't know this is Episode 123

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte