Update: This post has been amazing and generated a lot of interest. To make things easier, I have compiled a USB Super Stick for you. If you are interested in a 1GB drive with all the apps [below] for $20 – shoot me an email: gmo<at>USB flash is not (yet) a portable PC whereby any USB KVM monitor is your work station – but it will get there. In the mean time, making the most of your USB stick and creating a portable software suite isn’t hard – you just need a little guidance. So… for you road-warriors or super geeks the following list of 55 portable applications are worth taking note. With 2GB, 4GB and 8GB drives readily available at extremely cheap prices making a portable software suite and creating a Super Stick is quite easy. When building your Super Stick there are numerous programs designed to run specifically from a USB drive. Best of all, almost all these programs are free, so put that Amex back in your wallet and lets start downloading. Here’s a list of 55 of the most useful USB programs around. Continue Reading
getusb.info and I’ll send you more details.
Computer owners should tread very carefully when plugging an unknown device into their PC as it could have malicious code planted on it.The best way to prevent a worm or virus from entering your system is disabling the autorun file on your Operating System before connecting the USB thumb drive. Since memory prices have dropped the USB stick is a hot item for tradeshows, give-aways and direct mailers. For this reason, it’s important to protect yourself from unwanted viruses. In addition, these flash drives could become a big threat to companies as the financial motivation to obtain secure information has big payoffs. Continue Reading
Using this home-brew WiFi extender will help pick up dozens more hot-spots in your area; don’t believe it – we’ll you’ll just have to try it – this really works. The premise of this solution is taking a parabolic dish and bouncing all possible waves into the focal point of the “dish” or in this case, the WiFi USB stick. Continue Reading
- Level 1: Hidden volumes. This is where a volume is created within another volume by TrueCrypt. The upper level (the one seen by a person forcing you to get the content) is filled with random data, so you can show them “Look man, there’s nothing there!”
- Level 2: A volume appears to consist of nothing more than random data, no signature or typology what-so-ever. Therefore, it is impossible to prove that a file, a partition or a device has been encrypted.