Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

U3 Protection / Password Protection

Posted on 2009-05-11
2
633 Views
Last Modified: 2013-11-14
Hi,

Does anyone know of a way to protect a USB key really simply and without installing any programs on our PC's.

I like the U3 software but I don't want to allow our users to install things and then run them on our computers from thier flash drives.

Is there a way of preventing our users from installing U3 applications but still allowing them to use the password feature.

Alternativley, is there a way of protecting USB keys that's simple to use and doesn't require installing anything on the PC?



Thanks in advance,

Andrew
0
Comment
Question by:spen_lang
2 Comments
 
LVL 18

Accepted Solution

by:
PowerIT earned 500 total points
ID: 24361847
If the users are local admins then you can use truecrypt in portable mode. That's the only one I know of. Because of its nature, all encryption software either needs to be run as admin (which for other reasons is not a good idea) or be preinstalled.
The other solutions is using USB key which have encryption built in and don't require software installation. E.g. IronKey.

kr, J.
0
 

Author Closing Comment

by:spen_lang
ID: 31580085
I think the long and short of this is that the answer is no!

I'm finding very quickly that what I want to do needs to be sorted with hardware rather than software.

As you're the only person who replied - and what you have put was true I will let you have the points.

Thanks
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question