GetUSB.info Logo

Review: USB Write Protect Switch Verse USB Write Protect Controller

Review with pictures and video

When it comes to making a USB stick read only, or USB write protected, there are two options. The first is the original technology of using a physical switch to toggle on and off the flash drive writing. The more recent technology is a programmatical way to toggle the write protection on and off.

Why write protect a USB anyway?

Great question. There are two main categories of flash drive users;
A) the home computer user and
B) the corporate / business world. The home computer user probably doesn’t care too much about making a USB read only because their environment is trusted. They know who’s had the USB and they know the computers it is being plugged into. However corporate folks definitely care about making a USB read only.

Disclosure: This post contains one affiliate link to Netac products. If you use this link, you may earn a commission at no cost to you.

They have two main reasons why

  1. They don’t want their data changed or manipulated.
  2. They don’t want a virus to spread via their USB; it’s bad publicity and a security risk. Corporations don’t want those headaches.

Surprisingly this review has brought to light the way all flash drives should work.

Continue Reading

Legacy USB Write Protect Switches Are Getting Replaced — Here’s the Tech That’s Taking Over

USB flash drive with no write protect switch

Update [June 13, 2025]: The official press release is now live. Click here to read the full announcement.

Since 2008 when USB flash drives really started getting mainstream most IT folks and systems integrators leaned on USB drives with physical write protect switches to safeguard files from tampering or corruption. But that hardware toggle — while once helpful — is on its way out.

Industry insiders say a major USB technology company based in Southern California is preparing to unveil a new type of flash drive that renders the old switch obsolete. According to early chatter, the device uses firmware at the controller level to lock the drive into a read-only state by default — no manual switch, no end-user slipups, and no chance of getting flipped off accidentally.

More intriguing? Sources say the device is password-controlled, re-locks automatically when unplugged, and supports scripting for mass deployment — making it a potential game-changer for government agencies, hospitals, and manufacturing workflows where USB data security isn’t optional.

From what we’ve heard, this isn’t just an upgrade — it’s a reimagining of what write protection on a USB drive should look like in 2025. Keep an eye out for the official announcement, expected within a week or so.

It’s not just the end of the physical USB write protect switch — this marks a new standard for secure flash storage.

Editor’s note: We’ll update this post with a link once the official announcement is live.

Continue Reading

How To: Fix Windows 11 Update Computer Issues

How To:  Fix Windows 11 Update Computer Issues

A recent update to Windows 11 is causing some significant issues for users, leaving many users frustrated and entire sure what to do. How To: Fix Windows 11 Update Computer Issues is a brief summary of the problem below and link to the solution (a Microsoft Windows utility to fix it all) This update, released on 26th September and labelled KB5043145, has led to major problems like your PC freezing, displaying the dreaded “blue screen of death” or becoming caught in a reboot loop where the computer repeatedly tries to restart itself but fails and thus tries again and again.

In addition to the blue-screens, some users report their USB and/or Bluetooth devices suddenly stopped working after installing the update. This includes a wide variety of peripherals such as keyboards, mice, headphones, microphones, memory sticks, and printers. Essentially, anything connected through USB or Bluetooth seems to be vulnerable to these problems.

One member from our team installed the updated and clearly something was broken in the file system, so they ended up restoring the entire PC. Far cry from an update experience. Our guy wasn’t alone, seems plenty of Windows users are seeing the same or similar issues.

Others have also reported issues with network connections, like their Wi-Fi no longer working, as well as problems with certain software programs like VirtualBox which runs Linux type OS subsystems.

If you found yourself dealing with these problems Microsoft advises that its Automatic Repair tool will help if your PC is stuck in a reboot loop. This tool might automatically pop up, allowing you to resolve the issue. For some users, BitLocker recovery can also be used to fix problems caused by the update, according to Microsoft’s support page.

Microsoft implemented a fix through its Known Issue Rollback (KIR) service, which is designed to undo the effects of problematic updates without requiring a manual uninstall. This tweak might help in automatically resolving these issues for many users. However, if your computer is still not operating correctly, Microsoft suggests attempting a system restart, which could trigger the automatic repair process and potentially get your PC back on track.

We would recomment that until the issues are fully ironed out, it may be worth holding off on installing this particular update, especially if your PC and peripherals are running smoothly as they are. If you’ve already installed it and are experiencing these issues, follow the Microsoft’s troubleshooting steps metioned above about the Automatic Repair Tool might be the best course of action to get everything back to normal.

Godspeed those USB ports and peripherals!

Continue Reading

WHAT IS: DiskPart Clean and/or Clean All Function?

what is, diskpart, clean, clean all

The clean function in DiskPart is a command used to remove all partitions or volumes from a disk, essentially wiping out all existing data on the disk. When you use clean in DiskPart on a particular disk, it performs the following actions:

Removal of Partitions: Deletes all partition or volume structures from the selected disk. This includes removing any partition tables and file systems information – or said another way, removes the format of the drive.

Data Erasure: The clean command deletes the partition table entries and boot code, but does NOT erase any data or overwrite data with random bits. Meaning, after using the clean command a data recovery software package could still recover the data.

Disk Initialization: After executing clean, the disk is left uninitialized. This means that the disk does not have any partitions or volumes, and it appears as raw, unallocated space. In order to use the drive after a DiskPart clean it is required to go into Windows Disk Management tool and assign a new volume to the USB. Once this is done, the device will have a file system (format) and be usable.

The CLEAN function is a nice way to quickly erase the partition and file system to start fresh with a new drive. For example, if an IMG file that is 5GBs large written to a 32GB stick, the problem is that 32GB stick is now only 5GBs large. The remaining space on the USB is unallocated and not usable. To get that unallocated space back, run the DiskPart CLEAN command. You will now have a 32GB drive (after initialization in Disk Management).

The clean all function in DiskPart is similar to the clean function but with an additional step of overwriting the entire disk with zeros. When you use clean all, DiskPart performs the following actions:

Removal of Partitions: Like clean, clean all deletes all partition or volume structures from the selected disk, removing any existing partition tables, file systems, and associated data.

Data Overwriting: In addition to removing the partitions, clean all also writes zeros to every sector of the disk. This process effectively erases all data on the disk by overwriting it with zeros. The purpose of this step is to securely erase the disk’s contents, making data recovery extremely difficult or impossible using standard methods.

Disk Initialization: After executing clean all, the disk is left uninitialized and completely wiped clean. It appears as raw, unallocated space with all previous data erased.

The clean all command is a more secure method of erasing data compared to clean alone, as it ensures that all sectors of the disk are overwritten with zeros. This process takes more time than clean because of the data overwriting step.

TIP: As with clean, it’s crucial to use clean all with care. Verify that you are selecting the correct disk because executing clean all on the wrong disk will result in irreversible data loss.

Ref: DiskPart Wikipedia

Continue Reading

Encrypt a USB Flash Drive, Windows 10, Free Feature!

Encrypt a USB Flash Drive, Windows 10, Free Feature!

Encrypting a USB flash drive is quick and easy in Windows 10. The PRO version of Windows 10 will allow anyone to activate Microsoft’s built in bitlocker technology to encrypt an entire flash drive, or part of a USB flash drive.

Microsoft BitLocker is a disk encryption technology designed to enhance data security by encrypting entire disk volumes on Windows operating systems. Introduced with Windows Vista and included in subsequent versions, BitLocker provides a robust defense against unauthorized access and data breaches.

The primary purpose of BitLocker is to protect sensitive data in case a device is lost, stolen, or accessed by an unauthorized user. It uses full-disk encryption to secure the entire contents of a disk, including the operating system, system files, and user data. Even if someone physically removes the hard drive and attempts to access it on another system, the data remains inaccessible without the proper authentication credentials.

BitLocker employs various encryption methods, with Advanced Encryption Standard (AES) being a commonly used algorithm.

The encryption process is transparent to the user once configured, and access is granted through authentication methods like PINs and passwords.

Below are nine screen shots and simply follow along in your Windows 10 Pro computer and do what you see below. The process is very easy to do. The longest part of this entire setup is the encryption of the USB stick itself. The time required to encrypt the drive will depend on a couple of factors, such as the GB capacity of the USB drive and the processing power of your computer. In the example below, using a USB 2.0 device with a 16GB capacity the encryption time took only 4 minutes.

Continue Reading

IronKey USB Flash Drive – Hacks – $235M of BitCoin

IronKey is the bell-weather for encrypted flash drives. The company, owned by Kingston Digital, a Southern California based private company, uses hardware encryption chips with their USB flash drives which provide the highest level of security known to mass storage devices.

GetUSB.info came across an amazing story by Wired Magazine about how one of the authors at Wired sent an IronKey to a hacking company called Unciphered in Seattle Washington to see if they could access the drive. The did.

This is not an easy task to accomplish. IronKey uses encryption to safeguard important data with FIPS 140-2 Level 3 certified, FIPS 197 certified and XTS-AES 256-bit encryption. The solution allows for 10 tries before the USB controller wipes the device clean of any data. So there is a big risk-reward for using the device and losing the password to the device.

However, Unciphered developed a method to allow more attempts than just 10. It is not entirely clear how many attempts Unciphered is able to apply, but it’s more than 10.

Why is this significant, other than the fact IronKey may now have a security issue on their hands? It is well known in early 2021, a report of just over 7,000 Bitcoin were stranded in an IronKey flash drive due to a forgotten password. The owner, Programmer Stefan Thomas, did not utilize the Enterprise Management Service for password recovery. The 7000 bitcoin is currently (as of Oct 2023) worth over $235 million dollars.

To give Wired Magazine their due credit, read the full story by Andy Greenberg.

Continue Reading

How To: Hide Files on a USB Flash Drive

How To: Hide Files on a USB Flash Drive

close up picture of flash drive

This article, “How To: Hide Files on a USB Flash Drive,” explains two free methods to conceal files on a USB drive using built-in Windows features. One method is quick and basic; the other is more advanced and harder to detect.

Overview of the Two Methods

Method 1: Standard Hidden Attribute

This method is the easiest. Anyone can right-click a file or folder, go to Properties, and select the Hidden checkbox. This will hide the file unless a user has Windows configured to show hidden files.

Pros: Easy and fast
Cons: Easily bypassed

Method 2: System Hidden Attribute

This method hides a file using both the system and hidden attributes. Windows will not show these files—even if “Show hidden files and folders” is enabled—unless the user also disables “Hide protected operating system files.”

Pros: Harder to detect
Cons: Slightly more technical

How to Hide a File Using the Hidden Attribute

Right-click the file or folder ? Properties ? check the Hidden box ? click OK.

properties of hidden file on USB flash drive

If Windows is set to not show hidden files, it disappears from File Explorer. However, it still shows in the Command Prompt:

command line of hidden file on USB flash drive

If the user has “View hidden files and folders” enabled, the file is visible again:

show hidden files on USB flash drive

How to Use the System Hidden Attribute

Let’s take it a step further and apply the system attribute in addition to the hidden flag.

Step 1: Prepare the File

Place the file (e.g., text.txt) onto the USB flash drive.

Step 2: Open Command Prompt on the USB Drive

Click in the File Explorer address bar, type cmd, and hit Enter.

use command line to hide files on flash drive

Step 3: Apply the System Hidden Flags

At the prompt, type:

attrib +s +h D:\text.txt

Replace D:\ with your actual USB drive letter.

system hidden file property to hide file on a USB stick

Type exit to close the prompt. Then unplug and reconnect the USB drive. The file will now be invisible—even with hidden files shown—unless the system file setting is also disabled.

Confirming the Hidden File

Open Command Prompt and type:

dir /a:h

You’ll see hidden files listed—even the system hidden ones—but they won’t appear in File Explorer.

view system hidden file on USB drive

How to Open or Restore the Hidden File

Option 1: Show Protected Files (Not Recommended)

Enable “Hide protected operating system files” in Windows Explorer. This reveals system-hidden files but also exposes critical OS files to potential deletion.

Option 2: Remove Attributes

In Command Prompt, type:

attrib -s -h D:\text.txt

Option 3: Open Without Changing Attributes

To open the file without unhiding it, use:

notepad D:\text.txt

open hidden file on USB flash drive from command line

Need Stronger File Protection?

If you require stronger security, consider a Secure Disk solution. These USB flash drives hide entire partitions until a password is entered. They’re hardware-based, making them immune to software workarounds or hacks.

For more info, check out Nexcopy’s Secure Flash Drives.

Continue Reading

How To: Copy Protect Digital Photo on USB Flash Drive

I want to copy protect a digital photo on a USB flash drive. The answer wasn’t as obvious as I had hoped, but I did find it.

Below is the process I used to get what I needed.

The first thing I want to emphasize is that I want to protect a digital copy of a photo rather than a physical copy of a photo.

So, how to prevent a digital photo from being copied from a USB flash drive is a difficult question to answer. My first thought is about the medium I intend to use to send a digital photo to someone.

  • Do I offer a download link?
  • Do I send them a digital copy on a storage device like a portable hard drive or USB flash drive?
  • Do I provide them a weblink to view the file from a hosted server?

The more I considered a delivery method, the more questions I had.

My first thought was to host the photo on a private webpage. Only users with access to the page could view the photo.

This isn’t going to work. I realized that once the viewer is on the page and viewing the photo, they can save it or screen capture it. After that, they could share the digital photo with whoever they wanted. There isn’t much protection here.

My next thought was to put the digital photo in a password-protected zip file. That is a good idea. The photo can only be viewed by someone who knows the password.

Oh wait, that doesn’t work either. I end up with the same problem as the hosted webpage. Once the file is accessed, the user can do anything they want.

So it occurs to me… I keep returning to an encryption solution rather than a copy protection solution. Encryption is useful because only those with the correct password can access the photo; however, it is not the same as my ultimate goal, which is to copy protect a digital photo and prevent it from being copied.

I guess you can say encryption is a way of keeping the honest people… well, honest.

I need a way to protect my photo regardless of the recipient’s intent. I realized I needed a solution in which everyone can see the photo but no one can do anything with it. Is it even possible to find such a solution?

When I was talking with a neighbor who is an IT guy, he mentioned a concept that I’d heard of before but didn’t apply to my thinking. Rather than a digital method of sending the photo, he proposed a type of physical dongle that held the photo. He explained that without the physical device, viewing the photo is impossible.

The lightbulb went on!

Continue Reading

Review Rufus The Big Misconception With ISO Files

If anyone searches for “burn ISO to USB” they will get pages and pages of Rufus links. However, there is a big misconception with Rufus… it doesn’t create USB CD-ROM drives! Review Rufus with us now:

The only thing Rufus does is take a bootable ISO file and write the data to a USB stick. Basically Rufus will extra the data on an ISO file and write it to the flash drive. You can do the same thing with WinRAR.

There is nothing magical about Rufus when it comes to “making a CD” because Rufus doesn’t make a “CD.”

If you need to make a USB CD-ROM flash drive the best solution found so far, is the Disc License drive. The Disc License drive is a blank USB CD-ROM flash drive. Using their Drive Wizard software (free), easily write ISO files to USB. The resultant drive will be a USB CD-ROM flash drive.

Before we get into Disc License technology, we do need to clear up some points about WinRAR and Rufus software. WinRAR will extract all the files contained in an ISO file and write them to your USB flash drive; however, if the ISO is bootable, WinRAR won’t write the boot code. This is where Rufus does shine. The Rufus software will write all the files contained in an ISO file along with the boot code to make your device bootable. With that said, there is a clear advantage for using Rufus over WinRAR.

Does Rufus burn any ISO file to USB? NO.

Does Rufus make your USB flash drive read-only, like a CD? NO.

If the ISO file isn’t bootable, there isn’t much [more] Rufus can offer. A non-bootable image will display an error message saying “This image is either non-bootable, or it uses a boot or compression method that is not supported by Rufus.”

rufus does not support iso file

Rufus is truly designed for one thing:

Continue Reading

Vaccinate Yourself From Ransomware — For Free

We all know what ransomware is. A type of malware which threatens to publish the victim’s data or perpetually block access to the data until a ransom is paid. Specifically, the ransomware encrypts the users data and only after the ransom has been paid will a keycode be provided to free the files.

One solution to avoid paying a ransom is restoring the computer data from a recent backup. If a company configures it’s backup software to perform a backup each night, this is a great solution to restore the original data.

However, an easier solution to avoid a ransomware attack, is make a friendly PC. A “friendly” PC means the ransomware will identify the computer as a system it should not infect. To create a friendly PC use the Windows language feature and install the Russian keyboard. When this is done (pretty much all ransomware software) will identify the computer as a friendly system and not infect it.

This language feature is available in Windows 10 and 10 Pro. We don’t believe the language option is available for Windows 10 Home edition.

More about Ransomware from Wikipedia.

Continue Reading

A USB Flash Drive Which Cannot Get a Virus

A computer virus is something we all strive to avoid because we understand the consequences and the amount of time and energy required to restore a computer to its original condition. In a recent poll by GetUSB.info when asking users to name the top three ways a computer can get a virus, they responded with:

  • Link from an email
  • Link from an unsecure website
  • USB flash drive

However, if Nexcopy has anything to do with the last answer, a computer virus which spreads by USB flash drive will be a thing of the past.

Nexcopy is a US company based in Southern California who specializes in flash memory duplication equipment, printers, FDA compliant flash drives, copy protection and now a road-blocking malware on flash drives.

USB drive cannot get a virus

A virus will spread via a USB stick because the device is writable. In fact, any device that is connected to a computer which is writeable could spread a virus; other devices such as external hard drives, SD cards, microSD cards, etc. all have the same potential for harm.

But what happens when you turn these storage devices on their head and not allow them to be writable in the first place? This simple yet obvious solution is a gigantic step in the right direction for controlling the spread of a virus via USB.

The Lock License flash drive designed and manufactured by Nexcopy is exactly that. The Lock License drive is a USB stick which is always write protected. The device doesn’t care what it’s plugged into, or when, or how, the Lock License drive will always be read-only.

A virus will spread in a very specific way. A virus is designed to scan newly connected devices and ping them to see if they can spread (if the device is writable). A new device is defined by any computer system when “power” is assigned upon connection, which, coincidentally is the same time the virus will try and spread.

Continue Reading

How To Copy Protect PDF Files

How to Copy Protect PDF Files Outside Adobe Ecosystem

This article will overview how to copy protect PDF files outside of the Adobe ecosystem. A couple of things worth mentioning before getting into the details:

  • Encryption is different than copy protection. Encryption is a technology solution where the PDF owner assigns a password to the document and after the user enters that password the user can do anything they want with the file. Print, share, screen capture, etc. The idea for encryption is the document being unattainable until a password is entered.
  • Copy protection does not use a password and anyone can see the file. However, the file cannot be copied, printed, shared or screen captured. The idea behind copy protection is the PDF being viewed by anyone, but nothing can be done with the file. When people are searching for PDF copy protection, this is the solution most likely sought after.

Challenges with PDF Security and Copy Protection

PDF or Portable Document Format is an open standard. What this means is the document format was designed to be used in just about any document reader program. The goal for the PDF specification was to make the format as universal as possible. For this reason, it is a bit more difficult than one would think to copy protect a PDF file.

Windows comes pre-installed with Adobe Reader. In addition, Windows has embedded Adobe API code to read PDF files. Even if Adobe Reader was not installed on your computer, or uninstalled, the underlying code is still there to open a PDF. In additional to Adobe Reader (#1 PDF reader in the market) there are dozens of additional PDF reader programs. Again, the goal for all these readers is to open and read a portable document file.

Adobe copy protection solutions are very well known for being cracked. If you Google “Adobe copy protection crack” you will find pages of ways the Adobe security features are compromised. Here and here are two examples of Google search results with web pages dedicated to hacking.

The fundamental problem with copy protection are the lack of controls when viewing a PDF. Meaning a PDF content owner (you) does not have the control over Adobe Reader, or other programs, to stop the user (your client/customer/student) from printing, screen grabbing, sharing and saving.

The idea behind a PDF copy protection solution is a framework where the PDF can be opened and viewed, while you (the content owner) maintains control of the document.

Of course Adobe Reader, FoxIt Reader and others, will not provide the tools to block a user from printing or saving from within their program. In contrast, we need a “reader” or “viewer” with controls to block those functions.

With this in mind, it is difficult to provide a reader with these security functions. Most users who receive a PDF do not want to download and install another program just to read a PDF file. The ease and beauty of a PDF gets lost in that process. No longer is the PDF a portable document format. In addition, a software program that can be downloaded to view a PDF can also be downloaded by a hacker to be reverse engineered. There needs to be something more than just a secure reader/viewer to control the PDF.

The most secure way to copy protect a PDF file is to associate it with something physical. There are some software (only) solutions, but those are not as secure as a solution with something physical.

Continue Reading

Copyright

Copyright © 2006 +

USB Powered Gadgets and more...

All Rights Reserved

Advertise with us

GetUSB Advertising

This is a high value website providing great exposure to your product and brand. Visit our advertising page to learn specifics.

For more information
Visit our advertising page.

Nexcopy Ad

Nexcopy Provides

USB copy protection with digital rights management for data loaded on USB flash drives.

Contact us learn more

Resources and References Page

Resources and References Page