![]() Jump Drive S55 includes Encrypt Stick Lite software, an advanced security. Step 3: Click the Mount button, type in your password, then click the OK button. And for added versatility, the drive is backwards compatible with USB 2.0 devices. Drag and drop your files into your secure folder and never have to worry anymore Experience the ease and comfort of drag and dropping your files into. Step 2: Click the Select device button and choose your USB flash drive. Create new secure folders, back-up files with SecureAccess Unlimited Pro and enjoy having your files safe and secure. As you can see the only one that is the same is the filesys.enc file. Install the software anywhere you need it and log-in. ![]() Once you download and install it on your computer, the program can be used to encrypt all data stored on the flash drive. Despite protecting the information stored on your USB devices effectively, the application is simple and easy-to-install. This surprised me as I expected all the files to all be different. At EncryptStick, we provide the most effective USB flash drive encryption software program to users. ![]() This made me wonder, obviously the software is reading the serial number value to allow access to the encrypted container, so what would happen if I created another blank encrypted container, with a known password, on a device flashed with the same serial number as the original one?Īfter creating a new encrypted container on a flashed USB I compared the hashes of SecureAccess system files to see what had changed. 1739900307A0D887.enk – this is the serial number of the USB drive.Īs discovered in my previous research you will remember that in order for the SecureAccess software to recognise the USB device it had to be flashed with the same serial number as the original device (as well as the Vendor ID & Product ID).USB Flash Drive-1739900307A0D887.idx – the last sixteen alphanumeric digits are the serial number of the USB drive. Encrypt Stick turns your flash drive into a private vault where you store any file you want to protect. You can create encrypted and hidden 'vaults' on virtually any writable media including Mac, PC, shared network drives, external hard drives and additional USB flash drives.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |