?
Solved

U3 Protection / Password Protection

Posted on 2009-05-11
2
Medium Priority
?
638 Views
Last Modified: 2013-11-14
Hi,

Does anyone know of a way to protect a USB key really simply and without installing any programs on our PC's.

I like the U3 software but I don't want to allow our users to install things and then run them on our computers from thier flash drives.

Is there a way of preventing our users from installing U3 applications but still allowing them to use the password feature.

Alternativley, is there a way of protecting USB keys that's simple to use and doesn't require installing anything on the PC?



Thanks in advance,

Andrew
0
Comment
Question by:spen_lang
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 1500 total points
ID: 24361847
If the users are local admins then you can use truecrypt in portable mode. That's the only one I know of. Because of its nature, all encryption software either needs to be run as admin (which for other reasons is not a good idea) or be preinstalled.
The other solutions is using USB key which have encryption built in and don't require software installation. E.g. IronKey.

kr, J.
0
 

Author Closing Comment

by:spen_lang
ID: 31580085
I think the long and short of this is that the answer is no!

I'm finding very quickly that what I want to do needs to be sorted with hardware rather than software.

As you're the only person who replied - and what you have put was true I will let you have the points.

Thanks
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the rising number of cyber attacks in recent years, keeping your personal data safe has become more important than ever. The tips outlined in this article will help you keep your identitfy safe.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question