Schedule

Schedule

Tuesday, September 2

1409677200 Tech News Today
1409680800 MacBreak Weekly
1409688000 Security Now
1409695200 Before You Buy
1409698800 Tech News 2Night
1409702400 All About Android
1409711400 Padre's Corner

Wednesday, September 3

1409758200 FLOSS Weekly
1409763600 Tech News Today
1409767200 Windows Weekly
1409774400 This Week in Google
1409785200 Tech News 2Night
1409787000 redditUP
1409792400 Ham Nation

Thursday, September 4

1409850000 Tech News Today
1409853600 Know How...
1409857200 The Social Hour
1409862600 Coding 101
1409866200 Home Theater Geeks
1409871600 Tech News 2Night
1409873400 The Giz Wiz
1409882400 OMGcraft

Friday, September 5

1409936400 Tech News Today
1409940000 This Week in Law
1409947200 Android App Arena
1409958000 Tech News 2Night

Saturday, September 6

1410026400 The Tech Guy

Sunday, September 7

1410112800 The Tech Guy
1410127200 This Week in Tech

Monday, September 8

1410195600 Tech News Today
1410199200 Triangulation
1410204600 iPad Today
1410217200 Tech News 2Night
1410219000 Marketing Mavericks

Tuesday, September 9

1410282000 Tech News Today
1410285600 MacBreak Weekly
1410292800 Security Now
1410300000 Before You Buy
1410303600 Tech News 2Night
1410307200 All About Android
1410316200 Padre's Corner

Wednesday, September 10

1410363000 FLOSS Weekly
1410368400 Tech News Today
1410372000 Windows Weekly
1410379200 This Week in Google
1410390000 Tech News 2Night
1410391800 redditUP
1410397200 Ham Nation

Thursday, September 11

1410454800 Tech News Today
1410458400 Know How...
1410462000 The Social Hour
1410467400 Coding 101
1410471000 Home Theater Geeks
1410476400 Tech News 2Night
1410478200 The Giz Wiz
1410487200 OMGcraft

Most Recent Episodes

This Week in Tech

Virtual nausea, Uber vs. Lyft, smart phone kill switch, and more.

The Tech Guy
The Tech Guy 1114 August 31st, 2014

How reliable are SSDs?

The Tech Guy
The Tech Guy 1113 August 30th, 2014

Is a Chromebook a suitable replacement for an old computer?

Tech News 2Night

Facebook status updates are now searchable on mobile.

This Week in Law

Google receives 1 million DMCA takedown notices a day.

Android App Arena

A collection of games that are best played while wearing headphones.

Tech News Today

Microsoft's MSN Messenger is shutting down for good.

This Week in Computer Hardware

Haswell-E leak and 8TB hard drives.

Home Theater Geeks

Blind Audio Testing

Tech News 2Night

Apple announces Sept. 9th event.

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte