A USB drive that stores encrypted data. The encryption may be performed by third-party encryption software or the software that comes usb access control with the drive. In either case, the software is configured to encrypt the data before writing to the drive and decrypt after reading.usb security monitor

I would still expect the obvious implications of uncommanded keyboard/mouse inputs to be readily detected by the most novice user. Attacker walks into a bank with an infected flash drive. Spots an empty desk with a computer. Walks by and pauses long enough to insert the USB stick into the back of the computer and then continues on. Wouldn’t be better to make them run their firmware on a sandbox (a virtual machine) ?, so any potential dangerous instruction can be intercepted. Password-protected: as told earlier, usb secure enables to protect portable media. Even if no administration right is required for the installation, data are stored and cannot be viewed or changed without the right password.

When all is said and done, USB Lock is basically Predator Lite. It serves the same core purpose – requiring the USB key to be plugged in order for the computer to be usable – but it doesn’t have the extra bells and whistles that make Predator awesome (namely, the scheduler and per-user customization). I didn’t think it was possible, but I feel that internet and computer security is worse today, or more flawed today, than it was 10 years secure usb ago. Photo Monitoring : PREDATOR can take pictures with your webcam continuously (time interval is configurable), even when the keyboard and the mouse are inactive. Picture files are stored in a folder, or exported by email or ftp. Frequently changes the security codes recorded on your USB drive. If an intruder manages to copy your stick, this copy will not work because the codes on your own stick will have changed in the meantime.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s