Solved

Is there a software can delete the whole data in Thumb Drive or External HDD if anyone else access?

Posted on 2008-10-03
3
387 Views
Last Modified: 2013-12-09
I would like to have a software that can automatically delete the whole data in an external HDD or Thumb drive should other ppl access into it?

Or is there any software that can detect and inform me if other person accessed into my External HDD or Thumb drive should the person stolen it and access into it from different location but with an internet connection?

Thanks in advance
0
Comment
Question by:hallhill
3 Comments
 
LVL 6

Assisted Solution

by:guydemarco
guydemarco earned 90 total points
ID: 22637572
Instead of that, consider drive encryption, such as Truecrypt.

http://www.truecrypt.org/

Free and works with thumb drives.
0
 
LVL 18

Accepted Solution

by:
sk_raja_raja earned 300 total points
ID: 22637602
yeah you can go for disk encryption tools or also you can search for some self destruction programs

http://www.experts-exchange.com/Other/Miscellaneous/Q_20790168.html
0
 

Author Comment

by:hallhill
ID: 22639984
I will try both first..and will award the points after I choose which one to use.

Thanks
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The question appears often enough, how do I transfer my data from my old server to the new server while preserving file shares, share permissions, and NTFS permisions.  Here are my tips for handling such a transfer.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question