Lock Down Your Dropbox Account With A USB Security Key
Are you concerned about losing account information by password theft, phishing, hacking, or key logging scams? Now there is less to worry about.
Lumension® Device Control is an award-winning leader in preventing data loss / theft via removable devices / media, and is available as a modular offering on the Lumension® Endpoint Management and Security Suite With Lumension® Device Control, usb security organizations can quickly identify all endpoint-connected devices in their environment and flexibly enforce a comprehensive security policy that prevents unauthorized use, limits malware intrusion, and forces encryption of sensitive data. A good starter tutorial, but Step 4 in your article is not always correct. I'm purely writing this to be informative, not to insult you. Flash drives use flash memory to store data, which tends to wear down after a prolonged usage. To prevent it from wearing down as quick, a technique called 'wear leveling' was implemented. Instead of a physical sector of the drive being overwritten like a normal disk, new data gets written to unused sectors of memory, while the 'overwritten data' just becomes free to use. Basically, there's two problems you'll have. The first is you won't actually be overwriting the old data, it will just write off to unused sectors to prevent wearing. Second is you're using the Gutmann method to make 35 passes across unused sectors that may never overwrite the old data, also causing wearing to your flash drive. The only reasons I uninstalled was because it is just too much. I just wanted something smaller and simpler. It is also a pain when it flags everything infected or not. I will stick with my McShield. Unfortunately CNET doesn't offer it. You can read about and download MCShield from That said USB Disk Security is pretty nice and I'm sure will serve many people well. Keep home, office devices separate. Don't use the same flash drives for home and work to avoid accidentally introducing a virus you picked up from an infected device into your company's office network. Most businesses have policies about what can be plugged into the company network, so if you ever do work from home, it's advisable to acquaint yourself with your company's rules, says Scudder, the New York security consultant. |