This article will help you view Linux files on a flash drive when connected to a Windows 10 computer. This is a more common problem than you might think. In 2020, the percentage of computer users who use Linux is just above 25% of all computer users? This implies you will eventually receive a USB flash drive which was formatted and used in Linux to save files. If you are a Windows user and currently in this situation, here is your help.
Linux may use FAT32 or exFAT to format a flash drive, but the default would be either ext2, ext3 or ext4.
In Windows, when a USB is formatted as the ext type, Windows will ask to format the drive. Do not do this if there is data on the drive you are trying to access. (Previous article on best way to format USB drives)
The solution to resolve the Windows request to format the drive, and see the Linux files on the drive is do the following:
This first tip might not be “required” but it is highly recommended.
In the Search field of Windows type Control Panel and click Enter
This will take you to the Control Panel.
Click Programs and then click Turn Windows features on and off
In the dialog box which pops up, you’ll need to scroll down most of the way when locking for
Did you buy one of those ultra-thin laptops and fall in love with the light weight, sleek size and powerful processor? Yet, sit there not be able to use all its power because you don’t have the ports to connect what you want? The 9 in 1 USB-C hub will solve your problems. You can do almost anything with it, just like your desktop.
The USB-C hub allows you to connect a monitor, speakers, headphones, SD card and 10BseT network cable at home (very useful). The hardwired Ethernet cable connection is clutch, but the other thing which is valuable to me is connecting a spare VGA monitor for a second screen.
The 9 in 1 hub is compact, lightweight (like my laptop) and well built. The hub consists of wedged shaped aluminum tube with the taller side featuring the video ports. A circuit board is suspended inside by plastic inserts that also serve to align and cover the gaps in each port. The two end caps are press fitted into the tube without any additional adhesive. I doubt the device will fall apart if dropped, but if it does, easy enough to snap back together.
Understanding the quality of a product requires one to take it apart and see how it’s manufacturer. The hub disassembles easily by popping off the plastic cap over the Ethernet port. The board inside then slides out without effort. The cap on the cable end can be removed to complete disassembly but is not required to full access the board. The USB-C cable is wired to the board through some form of displacement connector and secured with adhesive. The shielding on the cable is also ungrounded thus add minimal functional. Fortunately the cable is short enough it should have minimal effect on signal reliability.
All major components, other than the DAC, are older but from recognized manufacturers. The hub is wired with 2 of the 4 USB-C high speed lanes assigned to USB and the remaining lanes assigned to Display Port. This means USB operates without compromise while DP is limited to 2 lanes. This means higher bandwidth operation such as 4K 60Hz is not possible. The on-board 3A DC converter should supply ample power to all components. There should be no issues operating all ports simultaneously assuming low power USB devices are used.
- The USB hub supports 2.4A fast charging; thus charging a single device quickly maybe possible. However, the hub itself is limited to 3A so charging multiple devices at high speeds will not work.
- The HDMI output is limited to HDMI 1.4. But all non-3D HDMI display modes within the spec should be supported.
- VGA output works in both widescreen (16:9) 1080p and 4:3 UXGA
- Card reader functions simultaneously with both Micro SD and full size
- 2-Ch DAC functions requires output from HDMI. It converts HDMI audio to analog 2-ch output.
- Ethernet uses both link detection and EEE to conserve power both when idle and while operating. Shorter Ethernet cables/connection should result in less heat generated. Ethernet also supports various wake functions.
When compared to the OEM Microsoft branded Surface dock that sits around $200.00, there really isn’t a choice for most users. This dock is certainly worth it’s money at $30 (time of this post).
View all articles related to USB hub products posted by GetUSB.info.
This article will overview PDF copy protection and the available options. A couple of things worth mentioning before getting into the details:
- Encryption is different than copy protection. Encryption is a technology solution where the PDF owner assigns a password to the document and after the user enters that password the user can do anything they want with the file. Print, share, screen capture, etc. The idea for encryption is the document being unattainable until a password is entered.
- Copy protection does not use a password and anyone can see the file. However; the file cannot be copied, printed, shared or screen captured. The idea behind copy protection is the PDF being viewed by anyone, but nothing can be done with the file. When people are searching for PDF copy protection, this is the solution most likely sought after.
PDF or Portable Document Format is an open standard. What this means is the document format was designed to be used in just about any document reader program. The goal for the PDF specification was to make the format as universal as possible. For this reason, it is a bit more difficult than one would think to copy protect a PDF file.
Windows comes pre-installed with Adobe Reader. In addition, Windows has embedded Adobe API code to read PDF files. Even if Adobe Reader was not installed on your computer, or uninstalled, the underlying code is still there to open a PDF. In additional to Adobe Reader (#1 PDF reader in the market) there are dozens of additional PDF reader programs. Again, the goal for all these readers is to open and read a portable document file.
Adobe copy protection solutions are very well known for being cracked. If you Google “Adobe copy protection crack” you will find pages of ways the Adobe security features are compromised. Here and here are two examples of Google search results with web pages dedicated to hacking.
The fundamental problem with copy protection are the lack of controls when viewing a PDF. Meaning a PDF content owner (you) does not have the control over Adobe Reader, or other programs, to stop the user (your client/customer/student) from printing, screen grabbing, sharing and saving.
The idea behind a PDF copy protection solution is a framework where the PDF can be opened and viewed, while you (the content owner) maintains control of the document.
Of course Adobe Reader, FoxIt Reader and others, will not provide the tools to block a user from printing or saving from within their program. In contrast, we need a “reader” or “viewer” with controls to block those functions.
With this in mind, it is difficult to provide a reader with these security functions. Most users who receive a PDF do not want to download and install another program just to read a PDF file. The ease and beauty of a PDF gets lost in that process. No longer is the PDF a portable document format. In addition, a software program that can be downloaded to view a PDF can also be downloaded by a hacker to be reverse engineered. There needs to be something more than just a secure reader/viewer to control the PDF.
The most secure way to copy protect a PDF file is to associate it with something physical. There are some software (only) solutions, but those are not as secure as a solution with something physical.
The following article will explain how to check your USB flash drive for if it’s bootable. There is no software needed, no download, just a couple of simple commands in your Windows 10 operating system.
A master boot record (MBR) is a special type of boot sector at the very beginning of a partition storage device like a fixed disk (hard drive) or removable drive (USB thumb drive). The MBR contains executable code to function as a loader for the installed operating system. This loader turns over the functions of the hardware (mother board bios) and passes that loading responsibility off to the operating system (Windows).
This is how you check if your USB is bootable, or not:
First, please have only the one USB stick connected which you want to check if it’s bootable. It’s not required to do this, but will my the instructions below a bit easier to follow, that’s all.
Using the Windows search function copy and paste this into the search field and click Enter
The screen shot below will pop up after you click Enter. Using the image as a reference, select “Disk Management” under the “Storage” folder“. In the middle of the dialogue box you will see the drive letter associated with your USB flash drive. In the middle of the box you will probably see the USB listed two different times. The top portion of the box, the USB will be listed along with other devices, like your hard drive and optical drive. The bottom portion of the box, the USB will be shown as “Removable“
Once you’ve determined which drive letter is your USB drive, you may Right Click on the drive letter and select Properties.
A Properties dialogue box appears giving you the option to select any one of the devices show in the previous window (the Disk Management window). From this dialogue box, click the Hardware tab and select the “Mass Storage USB Device” by a single click. Then click the Properties button at the bottom.
The last dialogue box are the Properties of your specific flash drive.
Click the Volumes tab at the top, you then must click “Populate” to get the device information. . The “Partition Style” will read either Master Boot Record (MBR) or the field will be empty.
If the above information isn’t detailed enough for the information you are looking for, the next step is to use a hex editor and check if the boot strap code is actually in the Master Boot Record. This is a bit more detail and the guys at Hakzone did a really good job of summarizing how this would be done using a hex editor program.
The lifespan of a USB flash drive relates to three factors. In general terms, a flash drive will last much longer than you think and here are some details to help you understand the answer.
The three factors related to the life span of a USB flash drive are:
- How the drive is made
- Wear leveling technology
- How the drive is treated
Flash drives are a commodity product and (generally) driven by lowest price. With that in mind there are plenty of shortcuts a manufacturer can use to save time and money. What is important to understand, is knowing the quality of product you are going to use.
How the drive is made
A flash drive is made up of five primary components: The PCB (printed circuit board) the flash memory, the USB controller, the components and the soldering which holds everything together.
Printed Circuit Board (PCB)
Most promotional memory products (flash drives given away at trade shows) will use a two layer printed circuit board. Two layer boards are bad for use with any USB device, including a flash drive. The USB specification requires four layers for a product to be made to specification. A four layer board will include the, much needed, grounding plane of the PCB to insure transmission without interference from the trace lines. A two layer board is at a much greater risk of not performing as it should. If you received a USB at a trade show, don’t consider that device for “long term” or “important” storage options.
This is an image of a four layer USB flash drive by Nexcopy with Micron memory with write speeds of 12MB/s
Flash memory used in the production of USB drives stems from a sea of unknown factors. Flash drives are the bottom of the barrel when it comes to NAND memory as part of the BOM (bill of material). All the good quality NAND memory is used for more expensive products like phones, set-top boxes, communications hardware, etc… and the manufacturer of USB flash drives, is typically, the last tier of manufacturing consumption. With that in mind, one trick the flash manufacturers use, is down-sizing the memory wafer (NAND chip). Let us provide an example: Toshiba is the world’s largest memory manufacturer, and after production of say a 64GB chip, they test it. If the quality of the silicon cells in the chip are below a certain percentage, the chip gets downgraded to a 32GB chip. They test it. If the memory is still failing QC, it gets downgraded again. The process continues. So if you are dealing with a 512MB USB stick, you are dealing with the worst part of NAND memory chip. Very unreliable. The quickest way to test the quality of flash memory is test the write speed. For USB 2.0 product, if you see a write speed of 9-10MB/second or better… its’ good quality. For USB 3.0 if you see a write speed of 18-20MB/second or better you are dealing with good quality. A slow write speed means the silicon of the chip is having a harder time making the phase change (positive or negative) to save data to the memory chip.
The USB controller is the chip on the flash drive with all the brains. The USB controller is the gate keeper between the host computer and the USB stick. The chip allows the host computer to read or write data to and from the flash memory on the flash drive. Because the USB controller is the brain of the flash drive, it’s important to have a controller that performs well and is reliable. One of the most important features of the USB controller is wear leveling. This is also one of the most important aspects for defining the lifespan of a USB flash drive. More about wear leveling in a bit. For now, the important point is understanding the compatibility of the USB controller to that of the flash memory. The NAND memory market is very fast pasted. New technology is always developing. For this reason, the firmware inside the USB controller is very important. The firmware “marries” the flash memory to the device and creates a usable flash drive. There are many flavors of firmware for a single controller and it all boils down to how often the USB manufacturer updates those firmware tools. It is very possible to load firmware that is not optimized for the NAND memory used in the production of the flash drive. It’s also very possible the firmware is set for a different objective, for example, the firmware was set to be optimized for capacity rather than read/write speeds. The amount of control the USB factory has with these firmware tools is mind-blowing. The firmware tools are used to configure the USB stick to exactly what they want. In summary, there is no real way to test the quality of the USB controller and it’s firmware other than having an intimate knowledge and relationship with the actual manufacturer of the USB flash drive. The point to explaining the function of a USB controller is to show what a large impact it has on the overall performance of the drive.
In general terms the TF card and microSD card are the same. They are the same in physical size and same in most technical terms. The two devices may be used in exchange with each other.
There are some technical differences between the two which will be explained later, for now, the biggest difference between a TF card and microSD card is the history of the name.
The TF card came out first. TF card or T-Flash or TransFlash was first to market from SanDisk in 2004. SanDisk, in partnership with Motorola, created the TF card specification. The TF card was the smallest read/write memory form factor and was designed for mobile devices (thus the small size).
TF cards are based on NAND1 memory. The TF card did not last long. At the end of 2004 the Secure Digital Association, which is the governing body over Secure Digital media, absorbed the TransFlash technology and re-branded as: microSD.
This implies, the life of the TF card ended in late 2004 and the microSD card has been available ever since. This will explain why you cannot find a “TF” branded card today (2020). The other reason you cannot find TF cards today is the maximium size of only 16MBs or 32MBs at the time of production. Today you cannot find any memory device with that small of gigabyte capacity.
Here is the technical difference between the two: Micro SD cards can support SDIO mode, which means they can perform tasks unrelated to memory, such as Bluetooth, GPS, and Near Field Communication. Whereas a TransFlash card cannot perform this kind of task.
SDIO mode stands for Secure Digital Input Output, a type of Secure Digital card interface. It may be used as an interface for input or output devices.
The SD Association devised a way to standardize the speed ratings for different cards. These are defined as ‘Speed Class’ and refer to the absolute minimum sustained write speeds. Cards can be rated as Class 2 (minimum write speed of 2MB/s), Class 4 (4MB/s), Class 6 (6MB/s) or Class 10 (10MB/s). It’s important to note that these are the minimum, so it’s entirely possible a card can achieve faster speeds.
NAND is not an acronym. Instead, the term is short for “NOT AND,” a Boolean operator and logic gate. The NAND operator produces a FALSE value only if both values of its two inputs are TRUE. It may be contrasted with the NOR operator, which only produces a TRUE value if both inputs are FALSE.
In this article we will detail how the Nexcopy USB copy protection solution works. Before we start there are important definitions we must all agree upon. As in today’s market place there are multiple vendors using the wrong definitions to explain copy protection.
Copy protection is different than encryption; although copy protection does use a form of encryption in the overall solution.
Encryption is scrambling up data and requiring a password to piece all the data together and display it. Once the password is entered the data can be viewed. The potential security issue is the user who entered the password can now do anything they wish with the files, print, save, share, etc.
Copy protection is different in two ways. First, there is no password required to view the data. Second, the files cannot be saved, printed, shared, streamed when viewed by even the most trusted user.
The later, copy protection, is what most people want when it comes to multi-media files like PDF, video, audio and HTML pages. Most users want the data to be seen by as many people as possible, yet the data cannot be saved, shared, streamed, printed or screen captured.
So with that in mind, let us review how the Nexcopy solution works for USB copy protection.
Here are six bullet points regarding features Nexcopy provides which others do not:
- Copy protected content plays on both Mac and Windows computers
- There are no Admin rights required to play the content
- There is no installation required on the host computer
- The content runs 100% from the flash drive
- The USB stick is write protect, so files cannot be deleted or changed
- The solution is both hardware and software, ultra-secure
The Nexcopy USB copy protection solution runs with the assumption the content owner does not want to share the data with even duplication service companies. It is assumed the content owner wants total control of the data before, during and after the USB duplication process.
Here are the steps for using the Copy Secure drives as the content owner:
Does the title of this article even make sense? Yes, but not to most.
USB enumeration is the process a host computer goes through to identify the type of USB device connected and what the operating system should do with the newly detected device.
Fingerprint would simply imply the different steps a computer operating system goes through when determine the USB device type.
For 99.7% of the people who visit this site, this information doesn’t matter, but for others it does. The security industry would be the prime candidate for wanting this information. If a security expert, team or programmer knows the exact steps an operating system goes through to mount a USB device, it will help them keep programs secure.
Andrea Barisani, a security expert based out of Italy, put together some open source code which compares the USB enumeration fingerprint for the MacOS, Windows and Linux. The open source code is available on Github.com (here).
This bit of code is probably valuable to software programmers who deal with USB flash drives and portable applications.
You never know where a flash drive has been.
It’s always best to scan a USB flash drive.
Did you know Windows Defender can be setup to scan a USB stick automatically, when it’s plugged in? Below are the steps to make that configuration setup.
By default, Windows 10 does not have this setting configured. We are not sure why, as USB sticks and downloads from internet sites are probably the two most vunerable ways to get a computer infected. Our only guess, is the scan process of a USB stick can take some time, and for a user to have that step done with each connection, could reduce the user experience.
This tutorial will take about three minutes to setup. I would suggest read the rest of this article and when done, go back and perform the few steps required to make the Windows Defender scan for USB flash drives.
We are going to make a Group Policy to scan USB flash drives using Windows Defender.
Let us run the Group Policy editor.
Press the Windows Key + R
Type gpedit.msc and press Enter or OK.
Look for the Administrative Templates under the top Computer Configuration directory, expand this directory (folder)
Scroll down to Windows Components, expand it
In that directory scroll down more and look for Windows Defender Antivirus, expand it
Finally, look for the Scan folder and click that folder.
On the right side of the dialogue box you will see additional settings, search for the Scan removable drives and double click that setting
This setting is disabled by default. Please click the radial enable button to enable this setting for your Windows computer.
Click Apply in the bottom right and then click OK.
That is it. Your Windows computer will now automatically scan USB flash drives using Windows Defender.
Alternatively, you can insert a USB stick and right click the drive letter and select Scan with Windows Defender but the problem here, is the USB could have already done it’s virus work before you had a chance to scan for malicious code.
Billy Idol’s Hot In The City is a tune which comes to mind whenever talking about USB gadgets that cool thyself.
With summer coming into full swing, this is a good time for a USB fan mention. Cruising the Amazon website this Aikoper product popped up. At first glance I honestly thought the fan was designed by Apple Computers. The aluminum base, slick black body and the cool grey vents, thought it was from Apple for sure. Wrong!
This USB fan has some unique features we believe everyone will like.
There is no switch for turning the fan on or off. Rather you touch the aluminum base. That is very Apple’esc. A single tap to the base and the USB fan goes into “low speed” mode. A double tap will put the USB fan into “high speed” mode. The third tap will turn the fan off. The touch sensitive base has four rubber pads to insure no vibration during operation.
The fan itself is a dual-blade design. Meaning there are four blades toward the front of the bionic shaped shell and another four blades near the rear of the black shell. The idea here is reducing the device noise while in operation.
The black shell case is convex in design to pull air down and into the system, rather than up and into the system. Although the pitch of the shell isn’t great, we may assume less dust and dirt will come into the system from a pull-down air flow design. The curved shell sits on a the aluminum base with some pitch mobility to angle the fan a bit higher or lower for optimal position while in use.
The product dimensions are 5.6 x 3.9 x 4.9 (inches) and sells for $16.99 USD from the Amazon website (at the time of this post).
The Amazon listing has over 1,609 ratings with 61% as a five star product, 13% as four star product and the balance just picky people trying to be overly critical. To give you an idea of product feedback and experience, here are some testimonials from the Amazon listing:
The average user inserts a USB stick into their computer from a trusted source. However, there are companies and situations who receive USB flash drives or USB hard drives and they are not certain if the device is infected.
Globotron is a company based in New Zealand who designed the product. The product is called Armadillo and is an open-source USB firewall.
Some research has shown, as many as 29 different types of USB attacks can happen from plugging in mass storage devices (like USB flash drives and USB hard drives) or also HID devices (human input devices like keyboards and mouse).
The USB stack which is the low level code used in the host computer, is very complex and over time researchers and hackers have discovered ways to compromise a computer system through these vulnerabilities.
The Armadillo is an open-source device which is a firewall between a USB device and computer. The firewall isolates the firmware of the USB device so as not to infect your PC if the device has been infected with malicious firmware. You just need to plug in Armadillo between your computer and the USB device using the provided micro-USB cable. Armadillo is an upgrade over USG, the original or first-generation USB hardware firewall device.
The Armadillo has bot detection. This means if the USB firewall device detects malicious codes are being entered via keyboard or mouse (HID devices) the device will block transmission and a red LED indicator light will turn on.
The Armadillo has the ability to temporarily make your USB read only. This is valuable if the computer is infected and you need pull information (recovery software) from the USB stick and want to insure virus’ do not infect the flash drive. The USB is read-only, but it is read/write when not connected to the Armadillo.
Note: If you need a USB stick that is always write protected at the controller level, yet need to temporarily turn off the write protection for data changes, the Lock License drive from Nexcopy is your solution.
This last point about the Armadillo is a bit strange, but we like it. The body is sealed with glitter epoxy so it is easy to identify if the box itself was tampered with. Very creative!
The Armadillo USB Firewall is available from Globotron for $150 USD and ships from New Zealand.
Fuzzing is a method of testing with automated software which provides invalid, unexpected, and random data as inputs to a computer program. The testing program then monitors for crashes, assertions and potential memory leaks.
A research team based from Purdue University came up with USBFuzz, which pushes enormous amounts of random data through the USB bus of a system. Hui Peng and Mathias payer (from the Swiss Federal Institute of Tech) came up with the idea and program.
Please don’t lose any sleep over the bugs found.
Peng and Mathias found one bug in FreeBSD, three in MacOS (two resulting in an unplanned reboot and one freezing the system), four in Windows 8 and Windows 10 (resulting in Blue Screens of Death) and the vast majority of bugs, in Linux — 18 in total.
Of all these bugs, Windows users do not need to worry, they have been fixed. Of the 18 found in Linux, 16 of them have been corrected already. Those correct where major security flaws.
What we like about the USBFuzz is the underlying theme to improve the security of the USB platform and continued improvement. We also like USBFuzz becoming an open source bit of code that everyone may use to strengthen thier USB product. The team will release a version on GitHub later this year, 2020.