Schedule

Schedule

Sunday, November 23

1416769200 The Tech Guy
1416783600 This Week in Tech

Monday, November 24

1416852000 Tech News Today
1416855600 Triangulation
1416861000 iPad Today
1416873600 Tech News 2Night

Tuesday, November 25

1416938400 Tech News Today
1416942000 MacBreak Weekly
1416949200 Security Now
1416956400 Before You Buy
1416960000 Tech News 2Night
1416963600 All About Android
1416972600 Padre's Corner

Wednesday, November 26

1417019400 FLOSS Weekly
1417024800 Tech News Today
1417028400 Windows Weekly
1417035600 This Week in Google
1417046400 Tech News 2Night
1417048200 Android App Arena
1417053600 Ham Nation

Thursday, November 27

1417111200 Tech News Today
1417114800 Know How...
1417118400 Marketing Mavericks
1417123800 Coding 101
1417127400 Home Theater Geeks
1417132800 Tech News 2Night
1417134600 The Giz Wiz

Friday, November 28

1417197600 Tech News Today
1417201200 This Week in Law
1417219200 Tech News 2Night

Saturday, November 29

1417287600 The Tech Guy

Sunday, November 30

1417374000 The Tech Guy
1417388400 This Week in Tech

Monday, December 1

1417456800 Tech News Today
1417460400 Triangulation
1417465800 iPad Today
1417478400 Tech News 2Night

Tuesday, December 2

1417543200 Tech News Today
1417546800 MacBreak Weekly
1417554000 Security Now
1417561200 Before You Buy
1417564800 Tech News 2Night
1417568400 All About Android
1417577400 Padre's Corner

Most Recent Episodes

The Tech Guy
The Tech Guy 1137 November 22nd, 2014

Will using a VPN encrypt a VOIP call?

This Week in Law

Does a broad privacy policy grant a company access to customer data?

Tech News 2Night

Uber's bad PR Prompts Changes at Lyft

Tech News Today

Google and Rockstar settle their patent case

The Giz Wiz

3D fruit printer, Mous Musicase, Nomiku sous vide, and more!

This Week in Computer Hardware

Dell's 60Hz IPS Monitors, Gorilla Glass 4, and Windows 10.

Coding 101

The holiday pricer.

Tech News 2Night

Google's Tool to Remove Ads

Home Theater Geeks

3D Audio, Acoustic Room Design, and Anythony Grimani.

Marketing Mavericks

LinkedIn, HR resumes, Social Footprint

Know How... 43

Encrypt Your Data with TrueCrypt

May 9 2013

Theory

Time to get secure. We're going to show you how and why to use TrueCrypt to protect your data from prying eyes.

TrueCrypt is an open source encryption application for on-the-fly encryption. What's "on the fly" encryption? That means that data is available as quickly as unencrypted data. This also means data is encrypted or decrypted right before it is saved or loaded.

TrueCrypt is a cross-platform solution (OS X, Windows, Linux). It installs a device driver into your OS which basically creates a virtual drive out of either a source file or a source partition."

A TrueCrypt file/folder/volume is absolutely useless without your password and/or keyfile. There are some boring things you might want secure: tax info, bank account data, finances (stopping identity theft even if you lose your machine, you're set).

Creating a file container

    How do we do this?
  • Download TrueCrypt
  • Create an encrypted file container
  • Either pick a file or put a path
  • Choose Encryption and Hash algorithm : Steve Gibson on Security Now says the defaults are sufficient. (but if you want, you can chain your encryption)
  • Choose your Volume Size
  • Password, Format option
  • Then to create your encryption key, you've got to move a mouse cursor around the window. the longer you move the cursor, the stronger the key
  • Then you format

If you're going to use the Truecrypt volume on a USB drive, you probably want to keep the Truecrypt.EXE or app on the USB drive.

Hidden volumes

From Truecrypt.org: "A hidden volume can be mounted the same way as a standard TrueCrypt volume: Click Select File or Select Device to select the outer/host volume (important: make sure the volume is not mounted). Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer volume will be mounted is determined by the entered password (i.e., when you enter the password for the outer volume, then the outer volume will be mounted; when you enter the password for the hidden volume, the hidden volume will be mounted).

Connect with us!

Download or subscribe to this show at twit.tv/kh.

Contribute to our show! Send us an email at knowhow@twit.tv Join our Google+ Community and join in the conversation. There are nearly 3000 of you guys in there chipping in show ideas and helping each other out. It's a fantastic resource.

Thanks to Cachefly for the bandwidth for this show.

Runtime: 19:17

People: Leo Laporte