How to set up and use Rohos Logon Key Emergency Logon

Properly setup Emergency Logon will maintain the high degree of security that Rohos Logon Key provides, remember if it is easy for you to access it may be too easy for Bad Guys.

To Define Emergency Logon in Windows from Start > [> = go to] Rohos Logon Key Center > Set up USB Flash Drive > look just above the row of three buttons at the bottom of the window for “Setup Emergency Logon” in blue.

Read more

Pulling USB drive out of the computer with Rohos Logon…

We always wanted to tell you that in order to use the program Rohos Logon Key, you have to set up the option “Optimize USB drive for quick removal” (read farther).
And our user Patrick reminded us about that:

“I am trying Rohos Logon Key . I have two questions. If you pull USB drives out of the computer, you risk losing data or killing the drive. Couldn\’t this cause a problem if using Rohos in this manner? …”

Patrick meant that before pulling the USB drive out you should use the dialog Safe hardaware removal:

Safe USB drive removal dialog.

But when you use Rohos Logon Key it’s useless to use this Safe Removal dialog (though you may do it if you use PIN code and lock the system by hotkey Win+L), because the quick computer lock-out by using USB key becomes senseless. In this case in Windows you should set up the option To optimize USB drive for quick removal:

Optimize USB flash drive for quick removal to prevent data loss

The red lines show the actions that go one after another: My computerUSB disk properties – Hardware page – double click on the name of the USB diskPolicyOptimize USB drive for quick removal check box.

More than 20 USB flash drives were at our disposal, and only 1 of 3 “has died” suddenly (stopped recognized by Windows on the next day).

Native language characters disappears in Linux’ net drive.

Not long ago, one of our users in Forum has suggested an interesting idea how to use Rohos disk. Actually, it concerns all the similar programs virtual-disks, but it seemed, we are the first.

So, here’s the issue. If users have the Linux samba server, they have access to the network folders on that Linux server for storing their files there. Thus, very often during working with the files that contains specific (native) letters of your mother tongue(ä, ü, Б, ц), the letters get lost.

Here’s what our user has written (translated from german):

… the program can solve the problem by creating on the network shared folders big-sized virtual disks. Cause files which contain the characters of your language in file names get lost, because the network folder is on the Linux server with Japanese BIOS.

This is how it looks:

Thus, if you keep Rohos disk on Linux computer in the network folder, and use (mounting) it in on your computer or in Windows server,  these letters in files names will be unaltered (the file system NTFS accomplishes it cause it is UNICODE enabled).


USB flash drive encryption softwares

In Internet one can easily find a lot of programs on the subjects like “USB flash drive security”, “Set up password on USB flash drive”, or “Encrypt USB flash drive”. Each of them has its pros and cons. Let’s take up the issue in detail.
Programs for USB flash drive encryption are divided into 2 groups:

  1. The programs that encrypt the separate files on the USB flash drive. The secure files are stored in the special (hidden) folder on USB disk. Certainly, the files names are modified, and the contents are encrypted. You can open the file only in the program, at the same time the file is decoded on the USB disk and then opens in the associated application. At the end it is required to give a command “to update protected file”.

    Such programs are “Remora USB guard”, “USB Vault” “Folder Lock”. If you wish you might replace these programs by usual password archive RAR, ZIP (with built-in encryption feature). It automatically renews the archive file, if you have opened it in the archive and changed it.

  2. The programs that create virtual encrypted disk, where all the files are automatically coded/ decoded without direct user command. The disk is fully contained in the USB flash drive.
    These programs have a number of advantages:
  • A user works with the protected files directly. It is not necessary to indicate what file should be decoded
  • The files are being automatically coded/ decoded as required
  • Temporary files are also kept as encrypted ones
  • It is possible to work with a virtual disk from any program

    The main disadvantage is that you should have Administrative privileges to open this virtual disk, because the program loads the disk driver, i.e. if you want to open the disk in Internet cafe, you will not manage it by 99%. However, such kind of program is right for secure carrying over the files from home and work and vice versa.

There are also the programs that are usually included in the stand of some USB flash drives (for example Transcend Jet Flash). They divide the USB flash drive memory into 2 partitions. 2 Removable disks are showing up in the system while connecting. The first disk is open, the second one is entirely
encrypted. If you want to open it for reading/recording, you should enter password in the special program.