As anyone who has ever gone to a LAN party knows, you need to watch your stuff or else something is just as likely to go missing! It really is a sad state of affairs, but the truth of the matter is you don’t bring any expensive peripherals to a LAN party unless you are willing to keep them on your person at ALL times.Too funny. The NZXT Bunker sells for $25 and can be purchased right off their site. Continue Reading
Consider some of the following – would they help you?
- Never forget a username or password again – ever
- Secure and backup your passwords, credit card numbers, registration codes, PINs, and more
- Generate truly random passwords hackers cannot guess
- Protect yourself from identity theft, keyloggers, and phishing
What I particularly like about this USB hack, is the physical requirement to have the key in order to work the USB port.Â This type of security [more fun then practical] for USB devices in general is much better than a Truecrypt type solution as that only protects the device, not the system. So what you need includes: Small USB thumb drive USB extension cable or USB socket and plug with cable Locking switch DPST Plastic box The rest is just elbow grease to get it working, for the specific details and tutorial, jump here.
So here’s the obvious spin about the USB Chat Stick.Â You can search a computers history for children IM conversations to make sure they aren’t sexting or worse, talking to on-line predators.Â Or, for the paranoid spouse, a great tool to finally put your curiosity to rest – are they cheating on me? But from a business perspective, I think this has a lot of value.Â For example, we spend many hours talking to suppliers overseas about flash drives, MP3 players etc and there are many conversation which get deleted away.Â Import business transaction information that, one day, you may need to recover.Â The USB Chat Stick can help. Here are the company’s talking points: Continue Reading
What is great about the USB secure product is that a hacker could not cloak a transaction via the web and show the user a transaction of one amount, while robbing them blind with a different amount as the “actual” transaction. What is funny about the UBS press release is the following:
If the transaction has been hacked and the account number is different, the customer can abort the payment by hitting a red “x,” or a green check if it’s fineWell…if they knew the transaction was hacked, wouldn’t they stop it anyway? Another nice feature of the UBS secure USB device is that a keylogger could not record keystrokes because the sync process between the user and bank happens through the UBS device, no account numbers are used or typed. Continue Reading
I don’t think the typical user who keeps their personal information secure with this drive [in the event it’s lost] has much to worry about, but the government has purchased plenty of units and that’s clearly a concern.Â The list of drives include Data Traveler BlackBox, the Data Traveler Secure – Privacy Edition, and the Data Traveler Elite – Privacy Edition.Â Again, a typical computer user probably doesn’t have the tools or skills to unlock the device, but a professional would. My guess is the IC controller chip which runs the AES 256 encryption is at fault here and someone has figured out how to hack the machine code and disable the encryption, but that’s just my educated guess being in the industry. PC World did a good write up about the statement and interesting perspective on the whole situation. Continue Reading
Object behind this project is taking the biometric finger reading technology one step further, and using vein structure as the authentication code [after all we have all seen movies where a fake silicon finger gets the burglars in]. So now the biometric technology is all buttoned up, Sony developed a USB vein reader that users could implement in the field. Continue Reading
Robert Cary the CIO for the Navy states. “In the future, we expect that a government-owned and procured USB flash media that is uniquely and electronically identifiable for use in support of mission-essential functions on DoD networks will be permitted for use by authorized individuals,” Cary said in his blog. “The bottom line is, the days of using personally owned flash media or using flash media collected at conferences or trade shows are long gone. What we connect to our home PCs is very different from what is and will be allowed to occur on DON [Department of Navy] networks.”This policy is more in line with what I’d expect from the military and devices like the Encryptakey I would think become a staple at locations like the Pentagon. Source:Â DarkReading. Continue Reading
The USB Windows IceBox includes recovery software for your hard drive and has the ability to block virus software or malware programs from getting into your computer. From my perspective, it’s a nice little tool, but if you have the smarts to partition up your hard drive, you probably have the smarts to create multiple users as well.Â See the USB Windows IceBox will lock down your partitions when you walk away [certain amount of idle time] but you can do the same thing with User Login priveleges.Â Just don’t give your kids Continue Reading