Administator for GetUSB.info
GetUSB.info started in 2004 with the concept of providing USB information for everything USB related. At the time, USB was gaining momentum and every day new products, articles and news became published. Today, the site is focused on bringing technical information, tricks and hacks to USB related products. The site does publish off topic information as well, to keep the variety up. Please visit the footer area of any page if you or your company is interested in article or product placement via purchased advertising.
Microsoft Windows has been sending out updates which have created some problems for those cloning mass storage devices like USB flash drives and USB hard drives. This article should help you resolve those issues.
The Disk Signature is a unique ID Windows will assign to a device inside the Master Boot Record or MBR. The disk signature is 6 bytes long and sits in the first sector of the mass storage device. The disk signature becomes a problem for those cloning flash drives or hard drives with either a software utility or a large duplication equipment like a USB duplicator. The disk signature compounds itself if a multi-partition device is being cloned.
Many times a multi-partition device is created in Linux and at the time of create only one disk signature is assigned to the physical device. However, if multiple units of those copies are put in a Windows computer, Windows will try and assign a disk signature to each partition. This will cause a collision.
There are different situations one could have a disk signature collision, so this is only one example.
“The fundamental change towards how our flash drive works should draw attention for those looking for USB write protection for flash drives” says Greg Morris, CEO of Nexcopy Inc.
What is unique about the Lock License approach is whenever power is cut to the device, for example disconnection, the USB is automatically write protected. This is the strongest first line defense against malicious software or virus jumping onto a flash drive without the user knowing. It is impossible to infect a USB drive if the device is write protected.
Lock License flash drives require a password upon first use. This password is used to unlock the write protection and make the USB a read/write device. This feature provides a personalized solution for each business which uses the Lock License technology. There is no need to set the write protection after being unlocked because simply cutting power to the device will put the USB into its default state: A read-only device.
The Nexcopy Lock License USB flash drive has the following features:
Default state of drive is read-only, a.k.a write protected
User assigned password to remove write protection
No password is required to read from the drive, acts as normal WORM device
Graphical User Interface (GUI) to set password and remove write protection
Command line utility for custom integration to remove write protection
No back door password or feature from Nexcopy to unlock the drive
Available in USB 2.0 and 3.0 technology and ranging from 2GB through 128GB capacities
Stan McCrosky, head of Sales, comments, “System Control manufacturers for waterworks, electrical utility and petroleum companies need a solution like this. The ability to load software or firmware to a hardware based USB read-only device gives system control companies an incredible amount of security for in-field deployment via USB. More importantly, the command line utility gives the manufacturers a secure way to unlock the drive and update the content remotely without the worry of the drive remaining read/write. It’s simply impossible for the drive to remain writable.” McCrosky concludes.
The Lock License USB flash drive is simple to implement. Steps include:
Connect USB to a Windows computer
Open either GUI or command line utility to remove write protection
Assign a password to be used when removing the write protection
Data load the drive as needed
Eject drive from computer once copy process is complete
At this point the USB is write protected at the hardware controller level
The Lock License drive can be read (used) by any device on any platform
Password not required to read data from the drive
Password is only used when removing write protection to make the USB read/write
Nexcopy Lock License media is available in USB 2.0 and USB 3.0 technology and range it capacity from 2GB through 128GB. Nexcopy offers six body styles for the Lock License media with a wide range of body colors available for each stye, all available for custom branding. The six body styles include Oxford; a capless swivel style drive. Newport; a classic rectangular shape with cap. Lexington; a classic rectangular style with rounded edges and cap. Augusta; a shorter style drive with large lanyard loop. Huntington and Geneva which uses an aluminum body for more durability and also better suited for laser etch branding.
The Oxford style swivel drive is the in stock media Nexcopy carries for same day printing and shipping. Nexcopy inventories USB 2.0 media of 2GB and 4GB capacity and in stock USB 3.0 media of 8GB, 16GB, 32Gb, 64GB and 128GB capacities. The in stock Oxford media is a black body with white swivel clip with full color printing via the Nexcopy Logo-EZ USB flash drive printer.
The Lock License utility is available for download off the Nexcopy support page. The utility requires a Nexcopy licensed USB flash drive. The Lock License USB write protection is not a universal solution for any thumb drive, a Nexcopy drive is required in order to take advantage of the increased security the technology offers.
Windows: Sound of connected a USB flash drive to Windows…
User: Ah yes… let’s get to work!
Windows: The Windows sound of a disconnected USB device…
User: Oh no, what’s happening?
A quick Google search and here we are… let’s take a look:
Here are five legitimate reasons your USB drive might be disconnecting from your Windows computer.
1. Running on Battery
Windows OS is set at default to power down USB ports when running from a battery. The power down process usually doesn’t happen until 10-15 into a stalled USB port, but maybe your setting is different. So worth checking… but first… plug in your laptop and see if the problem is resolved.
To check your USB power setting do this:
Search for Control Panel and click Enter
In the Control Panel click the Hardware and Sound link
From here (might be slightly different for everyone) click the Change battery settings and further click Change plan settings and then you’ll see an Change advanced power settings option. Click the Change advanced power settings you can scroll around to find the USB devices and adjust your power there.
2. Faulty USB Port
The number one reason for why a USB device doesn’t work is the physical USB port on the host computer. A laptop generally has only 3 or 4 ports and those ports get a lot of action. With a tower PC, the front USB ports on the bezel also get most the action. Question: When you insert the USB device can you wiggle it around? Was there very little tension or pressure when connecting the USB device? If the device wiggles, or extremely easy to insert… you might have a physically bad USB socket.
This article will help you view Linux files on a flash drive when connected to a Windows 10 computer.
This is a more common problem than one would think. As of 2020 the percentage of computers running Linux is 25%. With this in mind, there is a good chance you will receive a USB flash drive (formatted in Linux) which you’ll need to gain access to. This article is a “how to” for a Windows user to read a USB flash drive from Linxu.
Linux will format USB flash drives as ext2, ext3 or ext4. Note: It is possible for a Linux OS to read/write to a FAT32 or exFAT flash drive.
Did you buy one of those ultra-thin laptops and fall in love with the light weight, sleek size and powerful processor? Yet, sit there not be able to use all its power because you don’t have the ports to connect what you want? The 9 in 1 USB-C hub will solve your problems. You can do almost anything with it, just like your desktop.
The USB-C hub allows you to connect a monitor, speakers, headphones, SD card and 10BseT network cable at home (very useful). The hardwired Ethernet cable connection is clutch, but the other thing which is valuable to me is connecting a spare VGA monitor for a second screen.
The 9 in 1 hub is compact, lightweight (like my laptop) and well built. The hub consists of wedged shaped aluminum tube with the taller side featuring the video ports. A circuit board is suspended inside by plastic inserts that also serve to align and cover the gaps in each port. The two end caps are press fitted into the tube without any additional adhesive. I doubt the device will fall apart if dropped, but if it does, easy enough to snap back together.
Understanding the quality of a product requires one to take it apart and see how it’s manufacturer. The hub disassembles easily by popping off the plastic cap over the Ethernet port. The board inside then slides out without effort. The cap on the cable end can be removed to complete disassembly but is not required to full access the board. The USB-C cable is wired to the board through some form of displacement connector and secured with adhesive. The shielding on the cable is also ungrounded thus add minimal functional. Fortunately the cable is short enough it should have minimal effect on signal reliability.
All major components, other than the DAC, are older but from recognized manufacturers. The hub is wired with 2 of the 4 USB-C high speed lanes assigned to USB and the remaining lanes assigned to Display Port. This means USB operates without compromise while DP is limited to 2 lanes. This means higher bandwidth operation such as 4K 60Hz is not possible. The on-board 3A DC converter should supply ample power to all components. There should be no issues operating all ports simultaneously assuming low power USB devices are used.
The USB hub supports 2.4A fast charging; thus charging a single device quickly maybe possible. However, the hub itself is limited to 3A so charging multiple devices at high speeds will not work.
The HDMI output is limited to HDMI 1.4. But all non-3D HDMI display modes within the spec should be supported.
VGA output works in both widescreen (16:9) 1080p and 4:3 UXGA
Card reader functions simultaneously with both Micro SD and full size
2-Ch DAC functions requires output from HDMI. It converts HDMI audio to analog 2-ch output.
Ethernet uses both link detection and EEE to conserve power both when idle and while operating. Shorter Ethernet cables/connection should result in less heat generated. Ethernet also supports various wake functions.
This article will overview how to copy protect PDF files outside of the Adobe ecosystem. A couple of things worth mentioning before getting into the details:
Encryption is different than copy protection. Encryption is a technology solution where the PDF owner assigns a password to the document and after the user enters that password the user can do anything they want with the file. Print, share, screen capture, etc. The idea for encryption is the document being unattainable until a password is entered.
Copy protection does not use a password and anyone can see the file. However; the file cannot be copied, printed, shared or screen captured. The idea behind copy protection is the PDF being viewed by anyone, but nothing can be done with the file. When people are searching for PDF copy protection, this is the solution most likely sought after.
PDF or Portable Document Format is an open standard. What this means is the document format was designed to be used in just about any document reader program. The goal for the PDF specification was to make the format as universal as possible. For this reason, it is a bit more difficult than one would think to copy protect a PDF file.
Windows comes pre-installed with Adobe Reader. In addition, Windows has embedded Adobe API code to read PDF files. Even if Adobe Reader was not installed on your computer, or uninstalled, the underlying code is still there to open a PDF. In additional to Adobe Reader (#1 PDF reader in the market) there are dozens of additional PDF reader programs. Again, the goal for all these readers is to open and read a portable document file.
Adobe copy protection solutions are very well known for being cracked. If you Google “Adobe copy protection crack” you will find pages of ways the Adobe security features are compromised. Here and here are two examples of Google search results with web pages dedicated to hacking.
The fundamental problem with copy protection are the lack of controls when viewing a PDF. Meaning a PDF content owner (you) does not have the control over Adobe Reader, or other programs, to stop the user (your client/customer/student) from printing, screen grabbing, sharing and saving.
The idea behind a PDF copy protection solution is a framework where the PDF can be opened and viewed, while you (the content owner) maintains control of the document.
Of course Adobe Reader, FoxIt Reader and others, will not provide the tools to block a user from printing or saving from within their program. In contrast, we need a “reader” or “viewer” with controls to block those functions.
With this in mind, it is difficult to provide a reader with these security functions. Most users who receive a PDF do not want to download and install another program just to read a PDF file. The ease and beauty of a PDF gets lost in that process. No longer is the PDF a portable document format. In addition, a software program that can be downloaded to view a PDF can also be downloaded by a hacker to be reverse engineered. There needs to be something more than just a secure reader/viewer to control the PDF.
The most secure way to copy protect a PDF file is to associate it with something physical. There are some software (only) solutions, but those are not as secure as a solution with something physical.
The following article will explain how to check your USB flash drive for if it’s bootable. There is no software needed, no download, just a couple of simple commands in your Windows 10 operating system.
A master boot record (MBR) is a special type of boot sector at the very beginning of a partition storage device like a fixed disk (hard drive) or removable drive (USB thumb drive). The MBR contains executable code to function as a loader for the installed operating system. This loader turns over the functions of the hardware (mother board bios) and passes that loading responsibility off to the operating system (Windows).
This is how you check if your USB is bootable, or not:
First, please have only the one USB stick connected which you want to check if it’s bootable. It’s not required to do this, but will my the instructions below a bit easier to follow, that’s all.
Using the Windows search function copy and paste this into the search field and click Enter
compmgmt.msc
The screen shot below will pop up after you click Enter. Using the image as a reference, select “Disk Management” under the “Storage” folder“. In the middle of the dialogue box you will see the drive letter associated with your USB flash drive. In the middle of the box you will probably see the USB listed two different times. The top portion of the box, the USB will be listed along with other devices, like your hard drive and optical drive. The bottom portion of the box, the USB will be shown as “Removable“
Once you’ve determined which drive letter is your USB drive, you may Right Click on the drive letter and select Properties.
A Properties dialogue box appears giving you the option to select any one of the devices show in the previous window (the Disk Management window). From this dialogue box, click the Hardware tab and select the “Mass Storage USB Device” by a single click. Then click the Properties button at the bottom.
The last dialogue box are the Properties of your specific flash drive.
Click the Volumes tab at the top, you then must click “Populate” to get the device information. . The “Partition Style” will read either Master Boot Record (MBR) or the field will be empty.
If the above information isn’t detailed enough for the information you are looking for, the next step is to use a hex editor and check if the boot strap code is actually in the Master Boot Record. This is a bit more detail and the guys at Hakzone did a really good job of summarizing how this would be done using a hex editor program.
The lifespan of a USB flash drive relates to three factors. In general terms, a flash drive will last much longer than you think and here are some details to help you understand the answer.
The three factors related to the life span of a USB flash drive are:
How the drive is made
Wear leveling technology
How the drive is treated
Flash drives are a commodity product and (generally) driven by lowest price. With that in mind there are plenty of shortcuts a manufacturer can use to save time and money. What is important to understand, is knowing the quality of product you are going to use.
How the drive is made
A flash drive is made up of five primary components: The PCB (printed circuit board) the flash memory, the USB controller, the components and the soldering which holds everything together.
Printed Circuit Board (PCB)
Most promotional memory products (flash drives given away at trade shows) will use a two layer printed circuit board. Two layer boards are bad for use with any USB device, including a flash drive. The USB specification requires four layers for a product to be made to specification. A four layer board will include the, much needed, grounding plane of the PCB to insure transmission without interference from the trace lines. A two layer board is at a much greater risk of not performing as it should. If you received a USB at a trade show, don’t consider that device for “long term” or “important” storage options.
This is an image of a four layer USB flash drive by Nexcopy with Micron memory with write speeds of 12MB/s
Flash Memory
Flash memory used in the production of USB drives stems from a sea of unknown factors. Flash drives are the bottom of the barrel when it comes to NAND memory as part of the BOM (bill of material). All the good quality NAND memory is used for more expensive products like phones, set-top boxes, communications hardware, etc… and the manufacturer of USB flash drives, is typically, the last tier of manufacturing consumption. With that in mind, one trick the flash manufacturers use, is down-sizing the memory wafer (NAND chip). Let us provide an example: Toshiba is the world’s largest memory manufacturer, and after production of say a 64GB chip, they test it. If the quality of the silicon cells in the chip are below a certain percentage, the chip gets downgraded to a 32GB chip. They test it. If the memory is still failing QC, it gets downgraded again. The process continues. So if you are dealing with a 512MB USB stick, you are dealing with the worst part of NAND memory chip. Very unreliable. The quickest way to test the quality of flash memory is test the write speed. For USB 2.0 product, if you see a write speed of 9-10MB/second or better… its’ good quality. For USB 3.0 if you see a write speed of 18-20MB/second or better you are dealing with good quality. A slow write speed means the silicon of the chip is having a harder time making the phase change (positive or negative) to save data to the memory chip.
USB Controller
The USB controller is the chip on the flash drive with all the brains. The USB controller is the gate keeper between the host computer and the USB stick. The chip allows the host computer to read or write data to and from the flash memory on the flash drive. Because the USB controller is the brain of the flash drive, it’s important to have a controller that performs well and is reliable. One of the most important features of the USB controller is wear leveling. This is also one of the most important aspects for defining the lifespan of a USB flash drive. More about wear leveling in a bit. For now, the important point is understanding the compatibility of the USB controller to that of the flash memory. The NAND memory market is very fast pasted. New technology is always developing. For this reason, the firmware inside the USB controller is very important. The firmware “marries” the flash memory to the device and creates a usable flash drive. There are many flavors of firmware for a single controller and it all boils down to how often the USB manufacturer updates those firmware tools. It is very possible to load firmware that is not optimized for the NAND memory used in the production of the flash drive. It’s also very possible the firmware is set for a different objective, for example, the firmware was set to be optimized for capacity rather than read/write speeds. The amount of control the USB factory has with these firmware tools is mind-blowing. The firmware tools are used to configure the USB stick to exactly what they want. In summary, there is no real way to test the quality of the USB controller and it’s firmware other than having an intimate knowledge and relationship with the actual manufacturer of the USB flash drive. The point to explaining the function of a USB controller is to show what a large impact it has on the overall performance of the drive.
In general terms the TF card and microSD card are the same. They are the same in physical size and same in most technical terms. The two devices may be used in exchange with each other.
There are some technical differences between the two which will be explained later, for now, the biggest difference between a TF card and microSD card is the history of the name.
The TF card came out first. TF card or T-Flash or TransFlash was first to market from SanDisk in 2004. SanDisk, in partnership with Motorola, created the TF card specification. The TF card was the smallest read/write memory form factor and was designed for mobile devices (thus the small size).
TF cards are based on NAND1 memory. The TF card did not last long. At the end of 2004 the Secure Digital Association, which is the governing body over Secure Digital media, absorbed the TransFlash technology and re-branded as: microSD.
This implies, the life of the TF card ended in late 2004 and the microSD card has been available ever since. This will explain why you cannot find a “TF” branded card today (2020). The other reason you cannot find TF cards today is the maximium size of only 16MBs or 32MBs at the time of production. Today you cannot find any memory device with that small of gigabyte capacity.
Here is the technical difference between the two: Micro SD cards can support SDIO mode, which means they can perform tasks unrelated to memory, such as Bluetooth, GPS, and Near Field Communication. Whereas a TransFlash card cannot perform this kind of task.
SDIO mode stands for Secure Digital Input Output, a type of Secure Digital card interface. It may be used as an interface for input or output devices.
The SD Association devised a way to standardize the speed ratings for different cards. These are defined as ‘Speed Class’ and refer to the absolute minimum sustained write speeds. Cards can be rated as Class 2 (minimum write speed of 2MB/s), Class 4 (4MB/s), Class 6 (6MB/s) or Class 10 (10MB/s). It’s important to note that these are the minimum, so it’s entirely possible a card can achieve faster speeds.
NAND is not an acronym. Instead, the term is short for “NOT AND,” a Boolean operator and logic gate. The NAND operator produces a FALSE value only if both values of its two inputs are TRUE. It may be contrasted with the NOR operator, which only produces a TRUE value if both inputs are FALSE.
In this article we will detail how the Nexcopy USB copy protection solution works. Before we start there are important definitions we must all agree upon. As in today’s market place there are multiple vendors using the wrong definitions to explain copy protection.
Copy protection is different than encryption; although copy protection does use a form of encryption in the overall solution.
Encryption is scrambling up data and requiring a password to piece all the data together and display it. Once the password is entered the data can be viewed. The potential security issue is the user who entered the password can now do anything they wish with the files, print, save, share, etc.
Copy protection is different in two ways. First, there is no password required to view the data. Second, the files cannot be saved, printed, shared, streamed when viewed by even the most trusted user.
The later, copy protection, is what most people want when it comes to multi-media files like PDF, video, audio and HTML pages. Most users want the data to be seen by as many people as possible, yet the data cannot be saved, shared, streamed, printed or screen captured.
So with that in mind, let us review how the Nexcopy solution works for USB copy protection.
Here are six bullet points regarding features Nexcopy provides which others do not:
Copy protected content plays on both Mac and Windows computers
There are no Admin rights required to play the content
There is no installation required on the host computer
The content runs 100% from the flash drive
The USB stick is write protect, so files cannot be deleted or changed
The solution is both hardware and software, ultra-secure
The Nexcopy USB copy protection solution runs with the assumption the content owner does not want to share the data with even duplication service companies. It is assumed the content owner wants total control of the data before, during and after the USB duplication process.
Here are the steps for using the Copy Secure drives as the content owner:
Does the title of this article even make sense? Yes, but not to most.
USB enumeration is the process a host computer goes through to identify the type of USB device connected and what the operating system should do with the newly detected device.
Fingerprint would simply imply the different steps a computer operating system goes through when determine the USB device type.
For 99.7% of the people who visit this site, this information doesn’t matter, but for others it does. The security industry would be the prime candidate for wanting this information. If a security expert, team or programmer knows the exact steps an operating system goes through to mount a USB device, it will help them keep programs secure.
Andrea Barisani, a security expert based out of Italy, put together some open source code which compares the USB enumeration fingerprint for the MacOS, Windows and Linux. The open source code is available on Github.com (here).
This bit of code is probably valuable to software programmers who deal with USB flash drives and portable applications.
Always best to scan a USB flash drive before using it.
Did you know Windows Defender could be configured to scan a USB stick automatically the moment it is plugged in? Below are the steps to configure Microsoft Windows to automatically scan a USB drive↓.
Windows Defender is not configured for automatic scanning when the operating system is installed. Not sure why, as malware spreading via USB flash memory is one of the more prolific tech issues of the day. Our only guess is Microsoft giving us free will to make our own decisions, after all, scanning takes time and why not let the user choose when this is done.
This tutorial will take about three minutes to setup. I would suggest read the rest of this article and when done, go back and perform the few steps required to make the Windows Defender scan for USB flash drives.
We are going to make a Group Policy to scan USB flash drives using Windows Defender.
Let us run the Group Policy editor.
Press the Windows Key + R
Type gpedit.msc and press Enter or OK.
Look for the Administrative Templates under the top Computer Configuration directory, expand this directory (folder)
Scroll down to Windows Components, expand it
In that directory scroll down more and look for Windows Defender Antivirus, expand it
Finally, look for the Scan folder and click that folder.
On the right side of the dialogue box you will see additional settings, search for the Scan removable drives and double click that setting
This setting is disabled by default. Please click the radial enable button to enable this setting for your Windows computer.
Click Apply in the bottom right and then click OK.
That is it. Your Windows computer will now automatically scan USB flash drives using Windows Defender.
Alternatively, you can insert a USB stick and right click the drive letter and select Scan with Windows Defender but the problem here, is the USB could have already done it’s virus work before you had a chance to scan for malicious code.