How to Password Protect and Encrypt a Flash Drive: 5 Easy Methods (MakeUseOf)

MakeUseOf: How to Password Protect and Encrypt a Flash Drive: 5 Easy Methods. “Unfortunately, you cannot password protect your entire USB flash drive, like you can password protect your PC or phone. Secure tools all work with encryption. Unless you want to invest in an encrypted flash drive with hardware encryption, you can use freeware applications to achieve a similar level of USB protection. This article summarizes the easiest ways to password protect or encrypt files and folders on a USB flash drive.”

MakeUseOf: 10 Tools to Make a Bootable USB From an ISO File

MakeUseOf: 10 Tools to Make a Bootable USB From an ISO File . “Installations from a USB flash drive have become one of the easiest ways to update your computer with a new operating system. A USB installation is quick, extremely portable, and has the bonus of reverting to a storage device following the install. You’ll find a fair few ISO to USB tools out there, and they feature a range of tools for beginners and advanced users.”

ZDNet: Schneider Electric may have shipped USB drives infested with malware

ZDNet: Schneider Electric may have shipped USB drives infested with malware. WARNING: Loud auto-playing video. “USB flash drivers sent with Conext Combox and Conext Battery Monitor products, part of Schneider Electric’s solar power range, were “contaminated” during the manufacturing process, according to a security advisory released by the industrial equipment manufacturer.”

Hongkiat: 40 Best Free Thumb Drive Applications (2018)

Hongkiat: 40 Best Free Thumb Drive Applications (2018). “Thumb drives are one of the most important and useful computer accessories you’ll ever find. These small devices are not just used to carry your data, you can use them for a lot of other functions and that includes running portable apps, and even an entire operating system. So in this post, I am listing down 40 free and useful thumb drive applications. These apps range from portable web browsers, computer games, cybersecurity, and data back up and sync solutions apart from many others.” Long list, decently annotated.