This document provides user instructions for setting up and using a security application called Total Lock on a USB flash drive with AES 256-bit encryption. It includes steps for initializing the drive by setting a password and personal information, locking and unlocking the encrypted drive with the password, restoring the drive to factory settings if the password is forgotten, and answers to frequently asked questions. The summary is intended to provide a high-level overview of the document's content in 3 sentences or less.
This document provides a user manual for the Memorex LOCK security application program. The program allows users to set passwords and partition USB flash drives into public and private areas. It describes how to set and change passwords, disable passwords, manage passwords if forgotten, unlock private partitions, and configure partition sizes. The manual also includes an introduction, feature overview, and frequently asked questions section about using the program and troubleshooting issues.
The document provides instructions for using a security application program called LOCK that encrypts and password protects partitions on a USB flash drive. It includes:
- An overview of LOCK's features like customizable passwords, password hints, and resizing partitions.
- Step-by-step guides to setting and changing passwords, unlocking partitions, and resizing partition sizes.
- Answers to frequently asked questions about installing drivers and running LOCK with proper privileges.
This document provides a user manual for the Imation LOCK security application program version 2.0. It describes the features and functions of the Imation LOCK program, which allows users to set and change passwords to lock access to partitions on Imation secure USB flash drives. The manual covers how to set/change passwords, disable passwords, unlock partitions, and configure partition sizes using the Imation LOCK software interface. It also addresses frequently asked questions about using the software and detecting the drive in different Windows operating systems.
JungleFlasher is a Windows application that provides functions for modifying and flashing firmware on various DVD drive models used in the Xbox 360 console. It has tabs for working with firmware files, extracting identification data from LiteOn drives, unlocking and flashing Samsung and BenQ drives using MTK chips, and flashing Hitachi drives. The application aims to combine various flashing functions into one easy to use tool and provide relevant information to users. It supports both x86 and x64 Windows environments.
This document provides technical solutions and instructions for password recovery, data retrieval, and fixing common computer issues. It includes steps to recover passwords for Windows and smartphones, retrieve data when a Windows system fails to start, and remove shortcut virus from removable disks. The solutions utilize bootable disks, command prompts, and tools like Hiren's BootCD to troubleshoot without starting the full operating system.
The document provides a guide to unlock the bootloader, install a custom recovery, and root a Moto G 4.4.2 (or GP Edition) phone. It involves using ADB and fastboot commands from a Windows command prompt to (1) unlock the bootloader by obtaining an unlock code, (2) flash a custom recovery like CWM or TWRP, and (3) flash SuperSU to root the phone. The guide notes several steps need to be repeated to re-enable USB debugging each time the phone reboots.
This document provides instructions for ordering, installing, and configuring an RSA SecurID soft token on a personal desktop or laptop computer. The key steps are to:
1. Order a soft token while connected to the company network, then receive installation files via email.
2. Download and install the RSA SecurID software on your personal computer.
3. Import the soft token file and enter the password provided in a separate email.
4. Set a PIN for the soft token and verify that it authenticates properly when entering the tokencode on the company authentication website.
This document provides a user manual for the Memorex LOCK security application program. The program allows users to set passwords and partition USB flash drives into public and private areas. It describes how to set and change passwords, disable passwords, manage passwords if forgotten, unlock private partitions, and configure partition sizes. The manual also includes an introduction, feature overview, and frequently asked questions section about using the program and troubleshooting issues.
The document provides instructions for using a security application program called LOCK that encrypts and password protects partitions on a USB flash drive. It includes:
- An overview of LOCK's features like customizable passwords, password hints, and resizing partitions.
- Step-by-step guides to setting and changing passwords, unlocking partitions, and resizing partition sizes.
- Answers to frequently asked questions about installing drivers and running LOCK with proper privileges.
This document provides a user manual for the Imation LOCK security application program version 2.0. It describes the features and functions of the Imation LOCK program, which allows users to set and change passwords to lock access to partitions on Imation secure USB flash drives. The manual covers how to set/change passwords, disable passwords, unlock partitions, and configure partition sizes using the Imation LOCK software interface. It also addresses frequently asked questions about using the software and detecting the drive in different Windows operating systems.
JungleFlasher is a Windows application that provides functions for modifying and flashing firmware on various DVD drive models used in the Xbox 360 console. It has tabs for working with firmware files, extracting identification data from LiteOn drives, unlocking and flashing Samsung and BenQ drives using MTK chips, and flashing Hitachi drives. The application aims to combine various flashing functions into one easy to use tool and provide relevant information to users. It supports both x86 and x64 Windows environments.
This document provides technical solutions and instructions for password recovery, data retrieval, and fixing common computer issues. It includes steps to recover passwords for Windows and smartphones, retrieve data when a Windows system fails to start, and remove shortcut virus from removable disks. The solutions utilize bootable disks, command prompts, and tools like Hiren's BootCD to troubleshoot without starting the full operating system.
The document provides a guide to unlock the bootloader, install a custom recovery, and root a Moto G 4.4.2 (or GP Edition) phone. It involves using ADB and fastboot commands from a Windows command prompt to (1) unlock the bootloader by obtaining an unlock code, (2) flash a custom recovery like CWM or TWRP, and (3) flash SuperSU to root the phone. The guide notes several steps need to be repeated to re-enable USB debugging each time the phone reboots.
This document provides instructions for ordering, installing, and configuring an RSA SecurID soft token on a personal desktop or laptop computer. The key steps are to:
1. Order a soft token while connected to the company network, then receive installation files via email.
2. Download and install the RSA SecurID software on your personal computer.
3. Import the soft token file and enter the password provided in a separate email.
4. Set a PIN for the soft token and verify that it authenticates properly when entering the tokencode on the company authentication website.
1) The document discusses how involving stakeholders across an organization in the UC implementation process from the beginning can help ease adoption and overcome resistance to change. This includes gathering user requirements, developing solutions focused on user needs, training users, and providing support.
2) It recommends forming a cross-functional team, understanding user needs through interviews, developing a roadmap aligned with those needs, leveraging some existing solutions, creating a communications plan, and offering various training options.
3) The goal is to gain users' trust and encourage them to embrace changes by making users feel involved and demonstrating how UC can improve their work, rather than forcing changes upon them.
El documento proporciona instrucciones para descargar e instalar el programa Any Video Converter desde Softonic.com. Instruye al usuario a buscar el programa en el sitio web, hacer clic en "Descargar gratis", esperar la descarga e instalar el programa siguiendo las indicaciones. Luego guía al usuario a agregar un video para convertirlo a otro formato seleccionado y hacer clic en "Convertir" para completar el proceso.
The document summarizes the opening credits sequence of the film "The Breakfast Club". It lists the various credits in alphabetical order by type/purpose over a period of 6 minutes. This includes distributor, production company, film production, title of film, main and supporting actors, costume designer, producers, music composer, editor, production designer, director of photography, co-producer, and writer/director. The credits are not in order of importance to the film. The text stands out against a black background with different fonts and sizes used to call attention to specific credits.
Bandura was born in Canada and received his PhD from the University of Iowa. He is known for pioneering social learning theory and the concept of observational learning through experiments like the Bobo doll studies. The studies showed that children will imitate and replicate aggressive behaviors they observe in others without consequences, highlighting the importance of observational learning. Bandura's work challenged behaviorism by demonstrating that behavior is influenced both by environmental factors and psychological processes like imagery and language.
This document summarizes Rudolf Husar's presentation on exceptional event analysis and decision support systems. It discusses using diverse data like satellites, models, and real-time monitoring to evaluate exceptional events like wildfires, dust storms, and their impact on air quality measurements. Specific examples are presented of exceptional events from dust from Asia and Africa impacting North America, as well as wildfires in Georgia impacting ozone and PM2.5 levels. Tools like the Navy Aerosol Analysis and Prediction System model and satellite data are highlighted for their ability to analyze the transport and impact of these aerosol plumes to support regulatory decisions. The goal of reconciliation of emissions, observations, and models is discussed to improve the evaluation of exceptional events
Pronouns are words that take the place of nouns. There are two types of pronouns: subject pronouns that are used as the subject of a sentence like "she" and "it", and object pronouns that are used as the direct or indirect object of a verb like "me", "her", and "them". Object pronouns will never be the subject of a sentence.
El documento presenta el horario de clases de la tarde para los diferentes grados de la escuela San Martín de Porres. Se detalla la asignatura que se imparte cada día de la semana para cada grado en los cinco períodos de la tarde, así como los profesores a cargo de cada asignatura.
El sector secundario materias primas parte 2blogsociales
Este documento discute varios temas relacionados con la energía, incluyendo las formas convencionales de generar electricidad, los problemas medioambientales asociados, el uso del agua y la minería en España. Señala que la quema de combustibles fósiles y el uranio son contaminantes, mientras que la energía hidroeléctrica requiere presas que afectan los ecosistemas. También explica que la agricultura es el mayor consumidor de agua y que es necesario reducir el consumo y aumentar la disponibilidad a través de
Este documento contiene varios pasajes inspiradores sobre temas como la amistad, la vida, la muerte y la felicidad. Alienta a las personas a sonreír y vivir sin miedo, a valorar a los amigos cercanos y a encontrar significado en los pequeños momentos diarios en lugar de enfocarse sólo en las tormentas. También sugiere que la felicidad viene de adentro más que de afuera y que el alma es eterna.
Anvis Inc. is hosting an event called "Doggies Day Out: Paw Splash" for dogs and their owners. The event will take place at a resort with an exclusive swimming pool for dogs, and will include activities like swimming, socializing, agility competitions, counseling, and games with prizes. The itinerary includes arrival, welcome drinks, pool time, lunch, more activities, a vet talk, agility, and departure. Anvis will promote the event through posters, mailers, online ads, and media coverage. Sponsorship opportunities are available at different levels, including title sponsor, platinum sponsor, and associate sponsor. Anvis has previously organized successful dog events at farms and resorts around Bangalore
This document provides a user manual for the Imation LOCK security application program version 2.0. It describes the features and functions of the program, which allows users to set and change passwords to lock and unlock partitions on Imation secure USB flash drives. Key features include setting custom passwords up to 16 characters, a password hint function, fixed password retry attempts before reformatting, and support for multiple languages. The document provides step-by-step instructions for setting/changing passwords, disabling passwords, and unlocking partitions locked by the password protection.
This document provides instructions for using the Imation LOCK security application program. It allows users to set a password to lock the secure partition of an Imation USB flash drive. Key features include setting a custom password up to 16 characters, getting 5 attempts to enter the correct password before reformatting, and using a password hint in case the password is forgotten. The document outlines how to set, change, or disable a password and unlock the secure partition by entering the correct password. It also describes configuring the sizes of the public and secure partitions.
1) The document discusses how involving stakeholders across an organization in the UC implementation process from the beginning can help ease adoption and overcome resistance to change. This includes gathering user requirements, developing solutions focused on user needs, training users, and providing support.
2) It recommends forming a cross-functional team, understanding user needs through interviews, developing a roadmap aligned with those needs, leveraging some existing solutions, creating a communications plan, and offering various training options.
3) The goal is to gain users' trust and encourage them to embrace changes by making users feel involved and demonstrating how UC can improve their work, rather than forcing changes upon them.
El documento proporciona instrucciones para descargar e instalar el programa Any Video Converter desde Softonic.com. Instruye al usuario a buscar el programa en el sitio web, hacer clic en "Descargar gratis", esperar la descarga e instalar el programa siguiendo las indicaciones. Luego guía al usuario a agregar un video para convertirlo a otro formato seleccionado y hacer clic en "Convertir" para completar el proceso.
The document summarizes the opening credits sequence of the film "The Breakfast Club". It lists the various credits in alphabetical order by type/purpose over a period of 6 minutes. This includes distributor, production company, film production, title of film, main and supporting actors, costume designer, producers, music composer, editor, production designer, director of photography, co-producer, and writer/director. The credits are not in order of importance to the film. The text stands out against a black background with different fonts and sizes used to call attention to specific credits.
Bandura was born in Canada and received his PhD from the University of Iowa. He is known for pioneering social learning theory and the concept of observational learning through experiments like the Bobo doll studies. The studies showed that children will imitate and replicate aggressive behaviors they observe in others without consequences, highlighting the importance of observational learning. Bandura's work challenged behaviorism by demonstrating that behavior is influenced both by environmental factors and psychological processes like imagery and language.
This document summarizes Rudolf Husar's presentation on exceptional event analysis and decision support systems. It discusses using diverse data like satellites, models, and real-time monitoring to evaluate exceptional events like wildfires, dust storms, and their impact on air quality measurements. Specific examples are presented of exceptional events from dust from Asia and Africa impacting North America, as well as wildfires in Georgia impacting ozone and PM2.5 levels. Tools like the Navy Aerosol Analysis and Prediction System model and satellite data are highlighted for their ability to analyze the transport and impact of these aerosol plumes to support regulatory decisions. The goal of reconciliation of emissions, observations, and models is discussed to improve the evaluation of exceptional events
Pronouns are words that take the place of nouns. There are two types of pronouns: subject pronouns that are used as the subject of a sentence like "she" and "it", and object pronouns that are used as the direct or indirect object of a verb like "me", "her", and "them". Object pronouns will never be the subject of a sentence.
El documento presenta el horario de clases de la tarde para los diferentes grados de la escuela San Martín de Porres. Se detalla la asignatura que se imparte cada día de la semana para cada grado en los cinco períodos de la tarde, así como los profesores a cargo de cada asignatura.
El sector secundario materias primas parte 2blogsociales
Este documento discute varios temas relacionados con la energía, incluyendo las formas convencionales de generar electricidad, los problemas medioambientales asociados, el uso del agua y la minería en España. Señala que la quema de combustibles fósiles y el uranio son contaminantes, mientras que la energía hidroeléctrica requiere presas que afectan los ecosistemas. También explica que la agricultura es el mayor consumidor de agua y que es necesario reducir el consumo y aumentar la disponibilidad a través de
Este documento contiene varios pasajes inspiradores sobre temas como la amistad, la vida, la muerte y la felicidad. Alienta a las personas a sonreír y vivir sin miedo, a valorar a los amigos cercanos y a encontrar significado en los pequeños momentos diarios en lugar de enfocarse sólo en las tormentas. También sugiere que la felicidad viene de adentro más que de afuera y que el alma es eterna.
Anvis Inc. is hosting an event called "Doggies Day Out: Paw Splash" for dogs and their owners. The event will take place at a resort with an exclusive swimming pool for dogs, and will include activities like swimming, socializing, agility competitions, counseling, and games with prizes. The itinerary includes arrival, welcome drinks, pool time, lunch, more activities, a vet talk, agility, and departure. Anvis will promote the event through posters, mailers, online ads, and media coverage. Sponsorship opportunities are available at different levels, including title sponsor, platinum sponsor, and associate sponsor. Anvis has previously organized successful dog events at farms and resorts around Bangalore
This document provides a user manual for the Imation LOCK security application program version 2.0. It describes the features and functions of the program, which allows users to set and change passwords to lock and unlock partitions on Imation secure USB flash drives. Key features include setting custom passwords up to 16 characters, a password hint function, fixed password retry attempts before reformatting, and support for multiple languages. The document provides step-by-step instructions for setting/changing passwords, disabling passwords, and unlocking partitions locked by the password protection.
This document provides instructions for using the Imation LOCK security application program. It allows users to set a password to lock the secure partition of an Imation USB flash drive. Key features include setting a custom password up to 16 characters, getting 5 attempts to enter the correct password before reformatting, and using a password hint in case the password is forgotten. The document outlines how to set, change, or disable a password and unlock the secure partition by entering the correct password. It also describes configuring the sizes of the public and secure partitions.
(About) button to check the version information.
This document provides instructions for using a security application program called LOCK that protects data on a USB flash drive. It allows setting and changing a password of up to 16 characters to lock a secure partition. The password can be disabled to remove protection. Partitions sizes can be configured. With the password, the secure partition is locked when the drive is disconnected. Six attempts are allowed before the drive is formatted if an incorrect password is entered.
The document provides a user manual for the LOCK security application program. It summarizes the program's features and provides instructions for setting and changing passwords, disabling passwords, unlocking devices, and configuring partition sizes on secure USB flash drives. The manual explains that the program allows custom passwords up to 16 characters, formatting after 6 incorrect password attempts, and supports English, Japanese, Chinese and other languages.
This document provides a user manual for the Memorex LOCK security application program. It describes the features and functions of the program, which allow users to set and change passwords to encrypt a secure partition on a USB flash drive. Users can create public and secure partitions of variable sizes, set custom passwords of 1-16 characters, and receive password hints. The program supports multiple languages and runs on Windows operating systems.
This document is the user manual for the Imation LOCK security application program version 1.08-B. It provides instructions on how to use the various features of the Imation LOCK program to set, change, and disable passwords on Imation secure USB flash drives. The manual describes the main screen interface and guides users through setting passwords, unlocking partitions, and resizing partition sizes on the drives. It also provides information on checking the program version and addresses some frequently asked questions about using the program.
This document provides instructions for using the Imation LOCK security application program. It describes the main features and functions of the program including setting and changing passwords, disabling passwords, unlocking devices, and configuring partition sizes. It also addresses some frequently asked questions about using the program and troubleshooting issues like devices not being detected.
Lenovo Ideapad 700 (17") user manual PDF (english) / User Guidemanualsheet
The document provides safety instructions and important information for using a Lenovo computer. It instructs the user to read manuals before using the computer to see safety notices and tips. It then describes the various parts of the computer and provides instructions for operating the keyboard, touchpad, and other components. It also explains how to perform basic tasks like connecting to a wireless network or putting the computer to sleep.
How to Password Protect USB Drive in Windows 10 & 11Muhammad Arsalan
In today’s digital age, privacy and security are more important than ever. One way to ensure the safety of your sensitive data is to password protect your USB drive. By doing so, you can prevent unauthorized access to your files in case your USB drive is lost or stolen. In this article, we will guide you through the process of password protecting your USB drive in Windows 10/11.
The document provides instructions for using the SecureTraveler software to configure Kingston DataTraveler USB flash drives. It allows the creation of private, password-protected partitions alongside public partitions. The software walks through installing requirements, connecting the drive, formatting it to add a privacy zone of a selected size up to 90% of total space, and setting a password to access files in the privacy zone. Losing the password means losing access to files in the private partition.
The document provides instructions for using the SecureTraveler software to configure Kingston DataTraveler USB flash drives. It allows the creation of private, password-protected partitions alongside public partitions. The software walks through installing requirements, connecting the drive, formatting it to add a privacy zone of a selected size up to 90% of total space, and setting a password to access files in the privacy zone. Losing the password means losing access to files in the private partition.
The document provides instructions for using the SecureTraveler software to configure Kingston DataTraveler USB flash drives. It allows the creation of private, password-protected partitions alongside public partitions. The software walks through installing requirements, connecting the drive, formatting it to add a privacy zone of a selected size up to 90% of total space, and setting a password to access files in the privacy zone. Losing the password means losing access to files in the private partition.
This document provides instructions for completing a computer basics worksheet. It includes 12 sections covering topics like input/output devices, computer components, storage, programs, operating systems, and the Windows desktop. Learners are asked to review powerpoint presentations for each section and answer accompanying questions that test their understanding. The goal is to help students learn foundational computer concepts in a hands-on way through interactive study and assessment.
The document provides an overview of several emerging cybersecurity threats and technology news stories, including:
- Signal Private Messenger now allows desktop messaging by syncing with mobile devices, but full disk encryption is still recommended for computer and strong passcodes for mobile devices.
- The SCILock hard drive allows an operating system to be reset after each reboot, purging all files and activity, but has limitations around updates, file storage, and usability that reduce its practicality for most users.
- A vulnerability was discovered allowing faster cracking of iTunes backup encryption passwords, reinforcing the importance of long, unique passwords and full disk encryption even for programs assumed to be secure.
Cyber security tips for journalists include:
1. Use encrypted communication tools like PGP for email and Cryptocat for chat to securely contact sources.
2. Browse anonymously using Tor or a VPN to protect your location and online activity.
3. Use strong, unique passwords and two-factor authentication on accounts to prevent hacking.
4. Encrypt sensitive files and back them up securely offsite for protection.
- This document provides instructions for using an LG external hard disk drive, including how to connect it to Windows and Mac computers, safely remove it, partition and format the drive, and use the included Nero Backup software.
- It explains that the drive comes pre-formatted in NTFS format but can be repartitioned and formatted as FAT32 or Mac OS Extended if needed.
- Step-by-step instructions are given for installing the Nero Backup software and setting up automatic or manual backups of important files and folders.
Integral Memory plc is one of the largest digital memory producers in Europe with over 26 years of experience. They produce a range of hardware encrypted solid state drives and USB flash drives that provide 256-bit AES encryption. Their products include a cutting-edge SSD and USB flash drives that are FIPS 140-2 validated, ensuring sensitive data stored is protected from compromise. Hardware encryption performed by a dedicated processor makes encryption much faster and more secure than software encryption.
The document provides instructions for installing and using the Lenten Reborn Card, which allows multiple operating systems to be installed on a single computer and enables system restoration. It describes four installation methods: Express Installation to instantly restore Windows; Keep C Only to preserve the Windows C drive; Custom Installation for advanced users to partition the disk; and SNCOPY to clone partitions and deploy software across networks. The document provides step-by-step guides for each installation method and explains the card's features and settings.
The document provides sample questions and answers related to PC maintenance and repair. It includes guidelines for preventive maintenance, definitions of technical terms like jumper pins and CMOS batteries, instructions for configuring hard disks and optical drives, and steps for installing Windows XP Service Pack 2 and activating unlicensed Windows 7. The key points covered are procedures for disassembling, cleaning, and checking hardware and software, definitions of components and interfaces, how to set jumper pins for multiple storage devices, and a detailed process for installing each operating system from start to finish.
install k+dcan cable standard tools 2.12 on windows 10 64bitWORLD OBD2
This document provides step-by-step instructions for installing INPA 5.0.2 and BMW Standard Tools 2.12 on Windows 10 64-bit. It involves downloading necessary files from various sources, extracting and copying files and folders to specific locations, and running installation programs. The goal is to get the latest version of INPA (5.0.6) and other BMW diagnostic tools functioning on Windows 10 for use with a K+DCAN cable. The process requires manually registering Windows components, modifying port settings, and copying additional files to complete the installation.
3. LOCK v3.21
Page 1 of 18
Security Application
Program
TOTAL LOCK
Crypto Drive
User Manual
V3.22
4. LOCK v3.21
Page 2 of 18
Table of Contents
A. Introduction........................................................................................................................ 3
B. General Description............................................................................................................ 4
C. Features.............................................................................................................................. 5
D. Before using the Security Application Program – TOTAL LOCK.......................................... 6
E. Introduction to the Security Application Program – TOTAL LOCK...................................... 7
E1. Main Screen ............................................................................................................. 8
E2. Terms & Conditions………..………………………………………………………7
E3. Language Setup........................................................................................................ 8
E4. Personal Information ............................................................................................. 8
E5. Password Setup...................................................................................................9-10
F. USB Flash Drive Usage...................................................................................................... 13
F1. Locking the Device................................................................................................. 11
F2. Unlocking the Device ............................................................................................. 12
F3. Forgotten Password ............................................................................................... 14
G. Restoring to Factory Settings ........................................................................................... 17
G1. Factory Restore .................................................................................................15-16
H. FAQ – Frequently Asked Questions.............................................................................19-18
5. LOCK v3.21
Page 3 of 18
A. Introduction
Plug in only ONE device at a time. DO NOT plug in two or more secure devices at
the same time when running this security application program – Total Lock.
Windows 2000 users, please upgrade to Service Pack 4 (SP4) first before using this
security product and application program.
This security application program - Total Lock - is only designed for Windows®
based operating systems.
6. LOCK v3.21
Page 4 of 18
B. General Description
The product you have is an Integral USB Crypto Drive with a 256 bit AES high security
function. The AES Encryption program has a user interface called “Total Lock”. Using the
application you can set up your personal private password (with a maximum of 8 - 16
characters set as upper and lower case letter and numbers).
7. LOCK v3.21
Page 5 of 18
C. Features
(a) Military Level Security – AES 256 bit hardware encryption. Mandatory encryption
of all files (100% privacy).
(b) Easy to Operate – program is pictorial with easy to understand icons and friendly
descriptions.
(c) Customized Password – users can choose a password of their own from 8 to 16
characters long of upper and lower case letters and numbers.
(d) Fixed Password Retry – users are only allowed to type in the password 6 times,
when typing in the wrong password for the sixth time; the drive will be formatted
to protect the data from being exposed to others.
(e) Friendly Reminder – there is a password hint function available, in case user
forgets his/her password. A password hint message can be setup, with messages up
to 32 characters in length.
(f) Multi Lingual Support – supports 22 languages
(g) Personal ID Function – Contact details can be added so that the drive can be
returned, whilst confidential data remains secure.
(h) Zero Footprint – No software installation required.
8. LOCK v3.21
Page 6 of 18
D. Before Using the Security Application Program – TOTAL LOCK
When you plug in your Crypto Drive to a USB port, the Windows® operating system should
recognise the device and show an extra “CD-ROM” and a “Removable Disk” icon. The
security application program – TOTAL LOCK - will be stored in the CD-ROM partition with
auto-run function, so when you plug in your Crypto Drive to the USB port, the security
program will pop up on screen automatically.
Partition 1 – Secure Area
This secure area is protected by password and can only be accessed by typing in the correct
password. There is no PUBLIC partition on this. All data will be protected.
Partition 2 – CD-ROM Area
This area is a “Read-Only” area. Users can read data from this partition, but is unable to write
or delete data stored in this partition. The security application program – TOTAL LOCK will be
stored in this partition with auto-run function. Password security will only apply to the
secure partition and will not affect this partition.
Secure
Partition
9. LOCK v3.21
Page 7 of 18
E. Introduction to the Security Application Program – TOTAL LOCK
E1. Main Screen
E2. Terms & Conditions.
After the splash screen shows up you will be asked to accept the terms and conditions
once you have agreed you will be then passed on to the language setup screen.
10. LOCK v3.21
Page 8 of 18
E3. Language Setup
There are 22 different languages to choose from. Select the language you require from the
drop-down menu. Click icon.
11. LOCK v3.21
Page 9 of 18
E4. Personal Information
On the next screen you can chose to enter your personal contact information and then click
icon. Adding your name and address details is optional.
12. LOCK v3.21
Page 10 of 18
E5. Password Setup
This screen allows the setup of a complex password. The password must consist of between
8 – 16 characters in length and a mixture of uppercase and lowercase letters, numbers and
special characters. If you meet the password requirements you will see a green O if you do
not meet the password requirements there will be a red X till you do. The program will not
let you go forward till you have meet all password requirements.
DO NOT FORGET TO ENTER A PASSWORD HINT. THIS SHOULD HELP IF YOU FORGET YOUR
PASSWORD.
When you have entered all the details, click icon. This will initialize the USB Flash Drive
by reformatting it and setting all parameters that were entered.
13. LOCK v3.21
Page 11 of 18
When it has completed you will see the message on screen below:
When you have clicked on the icon this will launch the secure partition of the USB Flash
Drive and the software interface will change. You will see the information about the security
applied to the USB Flash Drive (i.e. Password and Device Status).
14. LOCK v3.21
Page 12 of 18
You are now ready to use the Crypto Drive. All data that is put in the secure partition will be
fully encrypted automatically as soon as you remove the USB Flash Drive from the socket or if
there is a suspension of power. Access to this is only granted with the correct password.
15. LOCK v3.21
Page 13 of 18
F. USB Flash Drive Usage
F1. Locking the Device
When you have your data on the USB Flash Drive, click on the button. This will
encrypt the data and log you out of the USB Flash Drive.
16. LOCK v3.21
Page 14 of 18
F2. Unlocking the Device
If you have setup a password, when you remove your Crypto Drive from the USB socket (or if
there is a suspension in power), the secure partition of your Drive will be locked
automatically. You will not be able to access this partition, nor read or write data to this
partition.
17. LOCK v3.21
Page 15 of 18
To get back into the secure partition you will need to launch the TOTAL LOCK software.
Click on the button.
Input the password that was used to set up the Crypto Drive. If you have forgotten your
password, click on the icon. This will display your Password Hint (providing you have
entered one). When you have completed this, click the icon. This now unlocks the
secure partition. You now have access to your data.
18. LOCK v3.21
Page 16 of 18
F3. Forgotten password
What happens if you forget your password? Hopefully, you would have entered a Password
Hint, which will help you remember the password. Click on the icon to display your
Password Hint.
What happens if your Password Hint doesn’t help you remember your password or you
haven’t entered a Password Hint?
The TOTAL LOCK software will allow a maximum of 6 password attempts to be entered
before it formats the Crypto Drive resulting in the permanent loss of your data.
19. LOCK v3.21
Page 17 of 18
At this point the Crypto Drive is not usable until the TOTAL LOCK application has formatted it.
At this stage the Drive will be set back to factory settings and you will see a confirmation
message when it is done.
G. Restoring to Factory Settings
G1. Factory Restore
The TOTAL LOCK software allows the user to restore the Crypto Drive back to factory settings.
For this to be done the USB Flash Drive needs to be in the Locked status.
By restoring the Crypto Drive back to factory settings, this will format the device; data will
be lost permanently and the Drive reset.
20. LOCK v3.21
Page 18 of 18
To restore the Crypto Drive back to factory settings, click on the icon.
Click icon. You will then see a confirmation message. Click icon again.
After restoring to factory settings has been successfully completed, you will see the
confirmation message.
Your USB Flash Drive is now ready to be used again.
21. LOCK v3.21
Page 19 of 18
H. FAQ – Frequently Asked Questions
Q1 My Windows / 2000 / XP cannot detect my device, what can I do?
A1 Since there is no driver required for these operating systems, the device uses the
built-in driver (USB Mass Storage Class Driver) from these operating systems. If your
operating system cannot find the device, then it is very likely that the built-in driver
files were missing or corrupted; please try to recover these files from other computer
or from the original Windows operating system CD.
NB : Windows 2000 users, please upgrade to service pack 3 or later.
Q2 When I run the LOCK program, it displayed “Please insert the device or run this utility
as privileged user” ?
A2 This problem may occur in Windows 2000 or Windows XP, under the following two
situations. Situation 1 : You have forgotten to insert your device.
Situation 2 : The security application program – LOCK requires some
security privileges in these Windows operating systems. If
you are not the administrator of the computer, these
privileges may be restricted by administrator. Please check
with your MIS or administrator of the computer to open
up the privileges for you. (See following method)
When logged into the account affected, run GPEDIT.MSC from the run menu (If there
is not enough access use the 'Run As' option). We now need to find the security policy
"Devices: Allowed to eject removable NTFS media". It is located in Local Computer
Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local
Policy >> Security Options. You need to change the access from "Administrators and
Power Users" over to "Administrators and Inter Active Users".
Q3 I am having Permission problems with my Integral Crypto Drive is there a fix for this?
A3 There can be several reasons for this to be happening:
1. Your system is not patched
2. Your User Permissions level
3. Your Registry
22. LOCK v3.21
Page 20 of 18
Windows 2000 Services Pack 4 should be installed and the system then fully updated.
Windows XP Service Pack 3 should be installed and the system then fully updated.
If you are still using Windows XP Service Pack 2, the following hot fix will also need to
be installed.
http://support.microsoft.com/kb/297694/
When computers are imaged they sometime get there permissions striped out which
will make your AES Drive to fail. The following registry entrees need to be set to
Domain User Read:
HKEY_LOCAL_MACHINESYSTEMMountedDevices
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesDisk