A USB drive that stores encrypted data. The encryption may be performed by third-party encryption software or the software that comes usb protect with the drive. In either case, the software is configured to encrypt the data before writing to the drive and decrypt after reading.
You’ll then see the BitLocker To Go Reader dialog box, which will prompt you to enter your password, as shown in Figure K. Notice that the Automatically Unlock on This Computer from Now On check box is missing from this dialog box. However, the Show Password Characters check box is still available. None of this will make your USB stick waterproof, shockproof or lock usb many of the other IronKey-unique features – but you will be able to securely store data, run apps, and even boot computers. URL scanner: There are also some nice Web security features included in this program. One of these is the URL Scanner, which lets you enter any URL to see if it’s a safe one to visit, so you don’t endanger your computer while browsing.
Predator is one of the most popular tools for turning a USB drive into an access control device. It’s completely free with no limitations or missing features for personal and non-commercial use, but for professional and commercial environments, it costs $30 USD per computer. Not a bad price usb lock at all, considering what it does. If I had a guess about the future, I’d say the next easy design for all these issues will leverage OpenFlow. You can easily build almost anything networking with all kinds of policies in that. Still too young to recommend for security purposes, though.