Consider some of the following – would they help you?
- Never forget a username or password again – ever
- Secure and backup your passwords, credit card numbers, registration codes, PINs, and more
- Generate truly random passwords hackers cannot guess
- Protect yourself from identity theft, keyloggers, and phishing
A simple example of an app would be syncing your smartphone with the car [via USB] and run Pandora music or Stitcher internet radio.The new SDK from Ford includes access to the voice recognition utilities to help developers integrate voice command applications.Â An example here would be syncing the voice command functions of your phone through the speaker system of your car stereo.Â Developers could also design apps where you ask the car Continue Reading
So if you’re like me, this project would be in the advanced level of Instructables for DIY mods, but thanks to Sven’s recording skills, we have a video to tell us how. The best part of all this? Heâ€™s got the whole thing demonstrated for you on video, but not only that, you can hit up the down-loadable binaries from his website. And while he tried all of this on Android 2.2, which means its the only version of Android itâ€™s been successfully tested on (at the moment), Sven believes that it will work on Android 2.1, too. Source: SlashGear.com. Continue Reading
So here’s the obvious spin about the USB Chat Stick.Â You can search a computers history for children IM conversations to make sure they aren’t sexting or worse, talking to on-line predators.Â Or, for the paranoid spouse, a great tool to finally put your curiosity to rest – are they cheating on me? But from a business perspective, I think this has a lot of value.Â For example, we spend many hours talking to suppliers overseas about flash drives, MP3 players etc and there are many conversation which get deleted away.Â Import business transaction information that, one day, you may need to recover.Â The USB Chat Stick can help. Here are the company’s talking points: Continue Reading
Review:Â USB Benchmark software by USB Performance.USB Performance has a nice USB benchmark testing program with lots of features besides read / write tests. The USB performance testing software gives you the option to test at a File Copy level or a Bit for Bit copy level.Â The difference with the File Copy is the process includes reading from the File Allocation Table [FAT] and thus slows down the process.Â The bit for bit read/write tests will show the best possible performance your device will be able to obtain.
Included in the USB benchmark software are some bonus features such as file recovery. We all know with flash memory once you click delete, it’s gone forever.Â Well the USB Performance software will recover those deleted files.Â OR maybe you’ve lost data with a system Blue Screen or hardware crash, again the USB recovery feature should be able to restore those lost files. Another nice feature is the backup function.Â The backup function will create a single image file on your PC.Â You can restore or backup the image file at any time.Â This nice thing about a single image file [rather than copying all the Continue Reading
UPDATE: USB Scrub by Nexcopy now supports Win7 32/64bit
Did you know Windows will make over 260 registry entries with a single enumeration of a USB stick? This means for those with multiple flash drives your registry will get extremely cluttered and bogged down.
With flash drives dirt cheap these days, you’ll find at least a couple dozen going into your computer through the year. That would be over 6,240 registry entries.
USB Scrub is a free utility which performs a deep cleaning of those unused drivers and registry edits.
We gave USB Scrub a try, and it worked great. We went from enumerating a single USB stick in 45 seconds to enumerating that stick in less that 12 seconds.
In addition, if you have a USB stick that doesn’t perform correctly or the Windows OS doesn’t see it, chances are the USB Scrub will clear up those problems and your drive will work once again. This is because a registry entry can become corrupt and simply clearing it out will resolve your issue.
So lets take a closer look.
Using RegShot [a free application which takes a snap shot before and after an event and compares only the changed registry values] I took a snap shot before and after a USB stick was connected and ejected. The result was this:
- 78 Registry Keys where created
- 183 Registry Values where added
- 261 Registry edits in total!
Here is a snap shop. Click the image to get the full text file.Continue Reading
Windows 7 is addressing this process with the option to burn a bootable USB stick with your on-line purchase.Â Well, at least that’s the rumor.
“The ‘Windows 7 USB/DVD Download Tool’ is used when you buy a down-loadable version of the software from Microsoft’s online store. During the download process, buyers are given the option of creating a bootable USB stick or burning a DVD.”So now the question becomes, should a user be required to Continue Reading
Does this mean you can set a USB stick as a shared device, maybe there is a default USB wireless support built in, I’m not sure, but maybe the following information will help. The information I have is simply a download link to try out the “release candidate” for Windows 7.Â Here it is.Â If you have time, give it a download and try…see what the USB sharing is all about.Â I’d do it myself, but honestly…I’m too knee deep in other projects at the moment. As a quick highlight, the Windows 7 requires an additional 1GB of RAM and 15GBs of disk space.Â We’ve also learned that XP virutal desktop will be preloaded on most new PCs and clearly an option for those who upgrade.Â Meaning, any software package built around .NET and XP will have full support under Windows 7.Â Microsoft did this so that large corporations don’t have to worry about software updates with an OS update.Â Just focus on the OS update and the software will still work.Â BUT – Windows 7 is built on Vista code [scary] so only time will tell. Source:Â ARN. Continue Reading
Encryption is the process of scrambling files and data so they cannot be accessed unless a password or key is supplied to reassemble the content and put everything back together.Â This process is known as decryption. The fundamental use for USB encryption is to protect files and data in the event the USB stick is lost or stolen. Where encryption and USB copy protection differ is with “encryption” once you have the password you can Continue Reading
The drive is a prototype design whereby the internal workings include a processor and battery and after a certain amount of time, the data on the stick will erase itself.Â Or self destruct. But just incase this method is a bit too hard-core, Fujitsu has an alternate method for data protection.Â The second method includes an auto erase feature if the USB flash drive is used to copy files to an unauthorized workstation or server.Â Using the Fujitsu re-direct software as the backbone, it can prevent data fromÂ being uploaded to file-sharing networks, sent as e-mail attachments, or printed, according to Fujitsu. Since this is just a prototype you’ll need to wait a bit longer, but for those who are impatient, GetUSB.info knows of one flash drive which already offers USB Copy Protection.Â The drive will also Copy Protect PDF files, flash, MPG and a host more multimedia files. Continue Reading