Rohos Disk for Android

Registering multiple 2FA users with Google Authenticator configuration delivered by Email

Rohos Management Tools provides a secure way to setup multiple users or authentication devices. Now it is easy to setup a list users with Google Authenticator 2FA. It is also possible to automatically send an email message to each user that includes Google Authentication setup instructions. The most secure way is to use corporate email.

New ways to register multiple user or 2FA tokens: by using CSV file or PowerShell script.

 

 

Read more

How to setup 2-factor authentication with One-Time-Passwords delivered by Email

Rohos Logon Key allows to protect Windows Terminal Server by using 2-factor authentication with One-Time-Passwords. Using Google authenticator as OTP generator requires to deliver and store OTP secret key on the mobile device of end-user in mobile email, SMS or Google Authenticator application.

In order to improve security you can setup your Server to generate and deliver One-Time-Password to the end-user by using SMS messages or Email which is reliable and free. With this feature there is no need to send OTP secret key and setup Google Authenticator on mobile device of end user.
Read more

Data leaks prevention system StaffCounter DLP is available now

We are glad to present you a new product designed to prevent the leakage of information: StaffCounter DLP. This cloud-based solution allows you to protect your business from insiders and possible leakage of commercial information to competitors.

StaffCounter DLP includes:

  • Monitoring of USB drives with three types of permits: a ban on entry, read-only, full access by the serial number.
  • Control of MTP devices connection via the USB port.
  • A ban on the recording CD / DVD.
  • Control of data recording to network resources.
  • Data ban via Bluetooth.
  • Control of leakage of information through Outlook or Thunderbird: filtering data, sending via browser or email client.
  • Control of downloading and installing of applications.
  • Control of all actions of the employees at the PC.

Install StaffCounter DLP now and get effective protection of data from unauthorized copying and distribution. StaffCounter DLP can be purchased at a reasonable price – just $ 2 per computer per month + a month of free use.

  • Windows 7, 8, 10 2012Server are supported.

Protecting your computer and data with ruToken

Authenticating for Windows and accessing a secret disk with a ruToken key.

User authentication and identification on Windows with USB keys.In short: now the popular ruToken identification device can be used in Rohos Logon Key and Rohos Disk as the one key needed to log in to Windows and your protected data. Rohos Logon Key works fully on Windows Vista/7 and also supports authorization for remote desktops using a ruToken. User authentication and identification with USB keys.

The ruToken device has been developed by the Russian company Aktiv, which produces a family of identification devices for user device-based authorization when accessing IT resources and protected electronic data. Read more

Automatically logon in Windows 8

Sometimes is necessary to provide a user the automatically logon in Windows without using of any key and password. Administrator’s account, however, must be protected with a password and hardware key.

Windows 8 allows you to login without writing a password, although it was assigned.

For example, we’ve created a user account User321, and assigned a password for it. For administrative purposes we have got an Admin with his own password on the same machine.

Run please Rohos Logon Key application and create a key for Admin:

Read more

How to securely disconnect encrypted disk after defined timeout

Rohos Disk program creates hidden and password protected encrypted partitions on your PC or USB flash drive. You can lock access to you applications, to hide folders. It is strong on-fly disk encryption tool.
Today we would like to announce Rohos Disk new feature automatically lock Rohos disk after defined timeout. You can enable this security option to protect your sensitive data on Rohos Disk. Enforce password security after grace period. If you often use Sleep or Hibernate mode to save power of your computer or laptop this feature is very useful. After awaking up from Sleep or Hibernate Rohos Disk will ask you to enter the password or to plug in the USB key with password. Auto lock/unlock solution for unattended computers. Sometimes you cannot manage to keep an eye on everything that’s why we add Timeout option.
Assists compliance with federal regulations such as HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, and FISMA.

Read more

How to access your encrypted partition on a guest PC in Windows 7

Rohos Disk Encryption and Rohos Mini Drive software presents tools that encrypt and hide your private, confidential data on the USB flash drive or HDD. Both programs include Rohos Disk Browser utility that gives possibility to access your encrypted disk even as a guest or user with no Administrative Rights. You can open and look through encrypted disk, add new information, even if you do not have administrative rights. It is also possible to view content of the encrypted disk on computer where Rohos Disk was never been installed.

Read more

How to create password protected and encrypted CD\DVD disk

Many users keep important personal information on HDD and did not realize they need to create a safety copy of the files – BackUp. It is necessary to make personal archive on the CD/DVD periodically. And more important is to protect data medium. You can transport private data on CD without been stressed about data security. Even if you lost the CD with confidential information nobody will have access to this secret information (documents, private photos, music, video). To provide good privacy protection on the CD the data should be password protected and encrypted.

Rohos Disk Encryption is a perfect tool to encrypt CD\DVD. This requires a blank CD\DVD, Rohos Disk Encryption already installed on computer, and an application for CD burning (e.g. Nero, Roxio Creator, Express Burn, Windows 7 CD\DVD disk burning feature).

Read more

Encrypted Firefox profile. Troubleshooting.

How to restore your Firefox profile?

Rohos Disk Encryption creates encrypted partition on computers or USB flash drives.  “Hide folder” option in Rohos Disk Encryption brings affordable and AES 256 strength encryption solution to improve security issues by preventing unauthorized access to your Internet apps, such as Google Chrome, Firefox, Skype on your PC by local or network users. Your encrypted Firefox profile save all passwords, bookmarks, history after web surfing into Rohos disk. We have tested this feature for more then four months. During our testing it was determined the only bag. Although it is not so essential but we want to share with you how to fix this bag.

Read more

How to setup iPhone as a wireless key to your Mac

Rohos Logon Key for Mac allows to use any mobile phone as a key to your PC or Mac. This is possible thanks to bluetooth technology. Each mobile phone with a bluetooth module has it is own unique ID. Rohos Logon monitor all bluetooth devices that is discoverable near your Mac and authenticate user as soon as your iPhone is detected. Here we post a few screenshots on how to setup this feature.

Read more

Rohos Logon Key with easyident FS-2044, pcProx, KCY RFID readers support

Updated 10 Oct 2017.

Rohos encourages new technologies. Now Rohos Logon Key allows to use a various of RFID tags for Windows logon: Indala, Emarine, Legic and Hitag . Thanks to Awinta.de We have got a sample of easyident FS-2044 RFID reader, produced by Easyident.de FS Fertigungsservice (Germany).  Also we have added support for the following RFID readers: KCY 125 Khz , Addimat and pcProx Plus by RFIDeas.

This RFID can read and write a few types of Tags produced by the company, including one handy Hitag bracelet EM4100. RFID tag EM4100 is a read-only RFID tag with a 40 bit unique ID which is read automatically by RFID reader FS-2044.

This space-saving device with dimensions 91 x 91 x 14 mm is very compact. Easy to install, you only need to setup the drivers for Windows from the official web site. We have successfully integrated this device with Rohos Logon Key v.2.8. The easyident FS-2044 is one in a multiple devices that can be use in Rohos Logon Key for secure login your Windows computer.

Read more

How to lock Skype and encrypt Skype profile folder

Today Skype offers cool features like chatting, file sharing, video calls and even calls to landlines. However your instant message history, contacts list, phone numbers etc, are stored in an open form. Anyone who is using your PC could read this information with special tool. Also children are exposed to on-line dangers such as bullying, viruses and obscene material.

Here is the solution on how to lock your Skype application from Kids and encrypt your Skype profile folder with your IM history and other private data. This solution is also applied for such applications like Google Chrome, Mozilla Firefox and Opera.


So why do you need to lock Skype Application?

Your Skype profile contains a lot of confidential data like contact list, IM-history, calls history etc. This data  is not encrypted by default. It means anyone who uses your PC can use this information easily. If you have one computer to use for all 5 members of your family or live with a roommate then you’d probably like to have a higher level of privacy for you Skype chat logs, received files and many other.

Read more

How to password protect Google Chrome profile with encryption

Google Chrome is one of the most popular web browsers for Windows. However it doesn’t have a master password feature. It means all of your passwords, credit card number, web logins are open for anybody who uses your PC.
Here you will find out how to protect your Google Chrome profile including history  with a master password and strong encryption. This solution is also applied for Mozilla Firefox, Opera, Skype.

Read more

Rohos Logon Key v.2.8 with MiFare smart cards provides safeguard physical and network access.

Chisinau, Moldova (08/04/10)  Tesline-Service today announced that now its two-factor authentication solution Rohos Logon Key v.2.8 supports MiFare S50/S70 smart cards to provide the most secure physical and network access to Windows systems.

The use of Smart Cards for user authentication is considered to be the strongest form of authentication and combines something physical (Smart Card) with confidential information (PIN) to provide what is known as “two-factor authentication.” Rohos Logon Key along with MiFare is a perfect solution for companies with environment that requires many employees to log into just one or only a few PCs. It will help thousands of organizations balance user convenience with strong security to create a competitive advantage and maintain trust within the enterprise.

The solution provides one of the most advanced authentication solutions available, using RFID smart card technology with the following benefits:

  • Avoid constant friction wears away the interface between token and PC
  • Possibility to use Mifare token with Rohos Logon Key as an Access Card used in the community, company
  • Supports Remote Desktop login using Microsoft Remote Desktop Control utility

Read more

KeyLess mode. When you need to unplug USB key for a while.

One of Rohos customers gave us an interesting tip for the program, Rohos Logon Key

Сitation:

“In our office the CPUs are under the tables, but USB cords are out on the tables for USB plugging convenience. When you need to plug in another USB device (for example your camera) the USB key should be temporarily unplugged (there is such option in Natural Login, it’s called keyless mode). It helps to prevent immediate access lock but in return it locks the machine let’s say after 3 minutes”


Now Rohos Logon Key has the same option – for the time being it’s available only through registry (USB_Key_remove_behaviour, see UserGuide).

How it works:

  • Upon USB key removal nothing happens.
  • In ## seconds (see USB_Key_remove_behaviour) the program locks computer and right away tries to unlock it with USB key.
  • If there is no key plugged in, the computer stays locked.

Most wanted portable data encryption tool

We always care what people say about Rohos in their blogs and across forums. As a result we spent much time also surfing the web reading security news, talks about Rohos and other encryption products in many languages. This gives us important feedback about what people expect from data security products in order to protect sensitive information.

Here are the features of the most wanted data security tool for usb flash drives …

Read more

Review of Hardware Encryption vulnerability of Kingston and SanDisk USB flash drives

The Kingston Technology company, a leader in the production of safe USB drives, and one of the first ones that started producing USB flash drive with hardware encryption (Kingston DataTraveler Secure) announced that some of its models of USB flash drives with hardware protection feature are vulnerable. The announcement was posted on the company’s web site saying that with the help of some tools you can access this USB drive (i.e. hack it without a password). News regarding some models of Kingston being prone to cracking is very surprising because these flash drives have been certified in compliance with FIPS 140-2.

Everything started with the fact that the German company SySS published a document entitled “Companies SySS hacked USB flash drive with hardware encryption Kingston certified FIPS 104-2”. In this document they describe in details the authentication protocol between the drive and the program (the user), which they found on the basis of intercepted USB traffic + vulnerability that was discovered. And also some screenshots of the utility, which is embedded in the process of authentication program for USB drives, and as a result – we may enter any password and access will be granted.
Read more