Update: This post has been amazing and generated a lot of interest. To make things easier, I have compiled a USB Super Stick for you. If you are interested in a 1GB drive with all the apps [below] for $20 – shoot me an email: gmo<at>
getusb.info and I’ll send you more details.
USB flash is not (yet) a portable PC whereby any USB KVM monitor is your work station – but it will get there. In the mean time, making the most of your USB stick and creating a portable software suite isn’t hard – you just need a little guidance. So… for you road-warriors or super geeks the following list of 55 portable applications are worth taking note. With 2GB, 4GB and 8GB drives readily available at extremely cheap prices making a portable software suite and creating a Super Stick is quite easy.
When building your Super Stick there are numerous programs designed to run specifically from a USB drive. Best of all, almost all these programs are free, so put that Amex back in your wallet and lets start downloading. Here’s a list of 55 of the most useful USB programs around.Continue Reading
You sell your solution to your client. They pass it around the office and email it to their friends. Suddenly you hard work is being passed around for free. You are losing money since they are only buying single copies of your software.USB Sentry is a USB security technology that allows you to distribute your database on UFD and ties your custom application to that UFD device. Your software is bound to that specific drive. Now they can no longer use multiple copies of your software since it will not open without the correct USB stick. Continue Reading
“The U3 platform was established with the vision of giving customers a consistent and portable computing experience. The existing 20,000 U3 software developers that joined us show the potential for smart flash memory devices,â€ said Yoram Cedar, executive vice president of the mobile business unit and corporate engineering at SanDisk.
â€œWe expect this relationship with Microsoft will raise the overall experience for consumers given Microsoftâ€™s unique software expertise, and grow the momentum given the large community of 3rd party companies capable of utilizing Microsoftâ€™s technologies.â€The migration process for the 20,000 U3 developers is a straight forward and simple one – Microsoft puts the pressure back on you to make the migration. Microsoft did say there will be tools to ad in the process, but the bottom line is U3 developers better get cracking if they want to see the light-of-day come mid 2008. Continue Reading
Computer owners should tread very carefully when plugging an unknown device into their PC as it could have malicious code planted on it.The best way to prevent a worm or virus from entering your system is disabling the autorun file on your Operating System before connecting the USB thumb drive. Since memory prices have dropped the USB stick is a hot item for tradeshows, give-aways and direct mailers. For this reason, it’s important to protect yourself from unwanted viruses. In addition, these flash drives could become a big threat to companies as the financial motivation to obtain secure information has big payoffs. Continue Reading
- Level 1: Hidden volumes. This is where a volume is created within another volume by TrueCrypt. The upper level (the one seen by a person forcing you to get the content) is filled with random data, so you can show them “Look man, there’s nothing there!”
- Level 2: A volume appears to consist of nothing more than random data, no signature or typology what-so-ever. Therefore, it is impossible to prove that a file, a partition or a device has been encrypted.
I lost my wife because of this game. Thank you DerbrillNot sure who to feel sorry for… Continue Reading