SlideShare a Scribd company logo
1 of 3
Download to read offline
How to completely protect your USB?
As more and more individuals and enterprises are emphasizing on the importance of data
security. Password protection technology has become a hot topic nowadays. Today, I'm going to
show my own opinions about a variety of data protection methods based on my experience.

Part one: Protect your USB from being accessed
There's a kind of products that aims at protecting external hard drives, such as USB flash drive,
pen drive, memory card, thumb drive etc.This kind of encryption products is designed for
password protecting files stored in flash drives. USB encryption products can be divided into
encryption hardware, encryption software and encryption method built in Windows OSes.
1.

Secure data with USB encryption hardware.

The first one is just a kind of special USB flash drives with built-in fingerprint processing
technology, some USB encryption hard drive allows owner to set several admin fingerprints and
user fingerprints. In addition to the fingerprints identification, the USB encryption hardware
provides second layer of protection---you can set password for the USB. However, the price of
this kind of hardware is a little bit high. Maybe you will say that it's worthwhile for data security,
while what if you need many these USB flash drives? That would be a significant amount of
expense.

2.

Protect USB with bitlocker

Bitlocker drive belongs to the second classification; it is free to encrypt external hard drives in
some Windows OSes. Bitlocker is able to protect hard drives from physical access to the drive.
That's to say, if someone take your hard drive from you and connect it to another PC trying to
access the data in it, the Bitlocker will make the drive unreadable. This function adopts 128 bit or
256 bit encryption technology, which is strong enough to protect the data stored in computer
and USBs. What's more, it's completely free. However, it has many shortcomings, for example: it
can only be used to lock the entire hard drive; and time needed for encryption is depends on the
memory space, it's generally very slow. And there's another problem, Bitlocker drive isn't
supported by all Windows operating systems, Windows 7 Professional, Windows Vista Business
Edition and the Home Editions do not include BitLocker.
3.

Protect USB by TrueCrypt

Regarding to USB encryption software, there’re many such kind of programs on the Internet.
TrueCrypt is freeware and you can follow the tutorial on the site to learn how to use it. As its
description on the site, there're only four requirements for you to complete the USB encryption:
a computer with a USB port, a computer with a Windows operating system, a user account with
'administrator' rights, a USB stick. However, I have to say that the process of whole encryption
with this program is too complex. Nowadays, people are all searching for tools that are effective
and easy to install and use. I just try to lock my flash drive with it once and then have no interest
to use it again. Concerning this point, Kakasoft USB security is better than it. It's easy to install
and easy to use, you can complete encryption in several steps. This software is able to lock
individual files in USB, while it can't prevent others storing files in the USB flash drive.

4.

Protect USB by hiding in partition

And there's another way that can be found on the Internet---creating a hidden partition on USB
flash drive to hide all files. Actually, this method is useful for people to backup files so as to avoid
unintentionally formatting data. If you want to password protect files stored in the USB flash
drives, you need to use another encryption program to set a password for it.

Part two: Protect individual file or folder in USB
1. Manually protect each file
Sometimes we often need to share our files in USB with others. However, we may store some
files that we don’t want others to view them. In this situation, what should we do? In fact, some
files have built-in password protection function, for example, word, power point, excel, etc.
which allow you to save them with a password. Of course, the secure level of this kind of
built-in protection is not that high; some programs even don't have this function, such as picture,
software and so on.
2. Protect folder on USB by Kakasoft folder protector
Regarding to the problem above, I choose to adopt folder protector software to protect individual
files in PC or USB flash drives. In order to protect different forms of documents in one time, I put
them in one folder and encrypt the folder with this software. However this software can only be
used in Windows operating systems.

Conclusion:
There are always many topics about data security, and there are always many solutions to data
leakage. Data security is not only a problem of enterprise; it's also a problem of our individuals.
How to find out an effective data encryption program that is suitable for us? In my opinion, try
and test are necessary; besides, searching relevant knowledge on forums and collecting others
advices will also help you a lot.
I am a technical writer from Kakasoft which is a leading provider of computer protection software.
I always care about data safety in our daily life, such as USB security, password protect folder and
so on. Welcome to exchange views with me.

More Related Content

Viewers also liked

Spark, Deep Learning and Life Sciences, Systems Biology in the Big Data Age
Spark, Deep Learning and Life Sciences, Systems Biology in the Big Data AgeSpark, Deep Learning and Life Sciences, Systems Biology in the Big Data Age
Spark, Deep Learning and Life Sciences, Systems Biology in the Big Data Agebatchinsights
 
8 клас урок 10
8 клас урок 108 клас урок 10
8 клас урок 10pupilsShostka
 
8 клас урок 11
8 клас урок 118 клас урок 11
8 клас урок 11pupilsShostka
 
初歩から始めるJava勉強会 プレゼンテーション資料
初歩から始めるJava勉強会 プレゼンテーション資料初歩から始めるJava勉強会 プレゼンテーション資料
初歩から始めるJava勉強会 プレゼンテーション資料Terumi Tamura
 
Pharmacophore extraction from Matched Molecular Pair Analysis
Pharmacophore extraction from Matched Molecular Pair AnalysisPharmacophore extraction from Matched Molecular Pair Analysis
Pharmacophore extraction from Matched Molecular Pair AnalysisEd Griffen
 
ŠKODA case study
ŠKODA case studyŠKODA case study
ŠKODA case studyNewsworks
 
Aplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacionAplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacionasenetcbb
 
Accenture: Commercial analytics insights CPG Companies 27-7-12
Accenture: Commercial analytics insights CPG Companies 27-7-12 Accenture: Commercial analytics insights CPG Companies 27-7-12
Accenture: Commercial analytics insights CPG Companies 27-7-12 Brian Crotty
 
The Future of Research: The future of creativity
The Future of Research: The future of creativityThe Future of Research: The future of creativity
The Future of Research: The future of creativityIpsos UK
 
Codigo fonte contrabaixo_paraleigos
Codigo fonte contrabaixo_paraleigosCodigo fonte contrabaixo_paraleigos
Codigo fonte contrabaixo_paraleigosaryew
 
Production capacity – planning and control
Production capacity – planning and controlProduction capacity – planning and control
Production capacity – planning and controlSonali Garwal
 
Information Management training courses in Dubai
Information Management training courses in DubaiInformation Management training courses in Dubai
Information Management training courses in DubaiChristopher Bradley
 

Viewers also liked (13)

Spark, Deep Learning and Life Sciences, Systems Biology in the Big Data Age
Spark, Deep Learning and Life Sciences, Systems Biology in the Big Data AgeSpark, Deep Learning and Life Sciences, Systems Biology in the Big Data Age
Spark, Deep Learning and Life Sciences, Systems Biology in the Big Data Age
 
8 клас урок 10
8 клас урок 108 клас урок 10
8 клас урок 10
 
8 клас урок 11
8 клас урок 118 клас урок 11
8 клас урок 11
 
初歩から始めるJava勉強会 プレゼンテーション資料
初歩から始めるJava勉強会 プレゼンテーション資料初歩から始めるJava勉強会 プレゼンテーション資料
初歩から始めるJava勉強会 プレゼンテーション資料
 
Pharmacophore extraction from Matched Molecular Pair Analysis
Pharmacophore extraction from Matched Molecular Pair AnalysisPharmacophore extraction from Matched Molecular Pair Analysis
Pharmacophore extraction from Matched Molecular Pair Analysis
 
ŠKODA case study
ŠKODA case studyŠKODA case study
ŠKODA case study
 
Aplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacionAplicación de herramienta tecnológica presentacion
Aplicación de herramienta tecnológica presentacion
 
CouchDB
CouchDBCouchDB
CouchDB
 
Accenture: Commercial analytics insights CPG Companies 27-7-12
Accenture: Commercial analytics insights CPG Companies 27-7-12 Accenture: Commercial analytics insights CPG Companies 27-7-12
Accenture: Commercial analytics insights CPG Companies 27-7-12
 
The Future of Research: The future of creativity
The Future of Research: The future of creativityThe Future of Research: The future of creativity
The Future of Research: The future of creativity
 
Codigo fonte contrabaixo_paraleigos
Codigo fonte contrabaixo_paraleigosCodigo fonte contrabaixo_paraleigos
Codigo fonte contrabaixo_paraleigos
 
Production capacity – planning and control
Production capacity – planning and controlProduction capacity – planning and control
Production capacity – planning and control
 
Information Management training courses in Dubai
Information Management training courses in DubaiInformation Management training courses in Dubai
Information Management training courses in Dubai
 

Recently uploaded

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

7 methods to protect your usb security

  • 1. How to completely protect your USB? As more and more individuals and enterprises are emphasizing on the importance of data security. Password protection technology has become a hot topic nowadays. Today, I'm going to show my own opinions about a variety of data protection methods based on my experience. Part one: Protect your USB from being accessed There's a kind of products that aims at protecting external hard drives, such as USB flash drive, pen drive, memory card, thumb drive etc.This kind of encryption products is designed for password protecting files stored in flash drives. USB encryption products can be divided into encryption hardware, encryption software and encryption method built in Windows OSes. 1. Secure data with USB encryption hardware. The first one is just a kind of special USB flash drives with built-in fingerprint processing technology, some USB encryption hard drive allows owner to set several admin fingerprints and user fingerprints. In addition to the fingerprints identification, the USB encryption hardware provides second layer of protection---you can set password for the USB. However, the price of this kind of hardware is a little bit high. Maybe you will say that it's worthwhile for data security, while what if you need many these USB flash drives? That would be a significant amount of expense. 2. Protect USB with bitlocker Bitlocker drive belongs to the second classification; it is free to encrypt external hard drives in some Windows OSes. Bitlocker is able to protect hard drives from physical access to the drive. That's to say, if someone take your hard drive from you and connect it to another PC trying to
  • 2. access the data in it, the Bitlocker will make the drive unreadable. This function adopts 128 bit or 256 bit encryption technology, which is strong enough to protect the data stored in computer and USBs. What's more, it's completely free. However, it has many shortcomings, for example: it can only be used to lock the entire hard drive; and time needed for encryption is depends on the memory space, it's generally very slow. And there's another problem, Bitlocker drive isn't supported by all Windows operating systems, Windows 7 Professional, Windows Vista Business Edition and the Home Editions do not include BitLocker. 3. Protect USB by TrueCrypt Regarding to USB encryption software, there’re many such kind of programs on the Internet. TrueCrypt is freeware and you can follow the tutorial on the site to learn how to use it. As its description on the site, there're only four requirements for you to complete the USB encryption: a computer with a USB port, a computer with a Windows operating system, a user account with 'administrator' rights, a USB stick. However, I have to say that the process of whole encryption with this program is too complex. Nowadays, people are all searching for tools that are effective and easy to install and use. I just try to lock my flash drive with it once and then have no interest to use it again. Concerning this point, Kakasoft USB security is better than it. It's easy to install and easy to use, you can complete encryption in several steps. This software is able to lock individual files in USB, while it can't prevent others storing files in the USB flash drive. 4. Protect USB by hiding in partition And there's another way that can be found on the Internet---creating a hidden partition on USB flash drive to hide all files. Actually, this method is useful for people to backup files so as to avoid unintentionally formatting data. If you want to password protect files stored in the USB flash drives, you need to use another encryption program to set a password for it. Part two: Protect individual file or folder in USB 1. Manually protect each file
  • 3. Sometimes we often need to share our files in USB with others. However, we may store some files that we don’t want others to view them. In this situation, what should we do? In fact, some files have built-in password protection function, for example, word, power point, excel, etc. which allow you to save them with a password. Of course, the secure level of this kind of built-in protection is not that high; some programs even don't have this function, such as picture, software and so on. 2. Protect folder on USB by Kakasoft folder protector Regarding to the problem above, I choose to adopt folder protector software to protect individual files in PC or USB flash drives. In order to protect different forms of documents in one time, I put them in one folder and encrypt the folder with this software. However this software can only be used in Windows operating systems. Conclusion: There are always many topics about data security, and there are always many solutions to data leakage. Data security is not only a problem of enterprise; it's also a problem of our individuals. How to find out an effective data encryption program that is suitable for us? In my opinion, try and test are necessary; besides, searching relevant knowledge on forums and collecting others advices will also help you a lot. I am a technical writer from Kakasoft which is a leading provider of computer protection software. I always care about data safety in our daily life, such as USB security, password protect folder and so on. Welcome to exchange views with me.