The USB key is the most popular exchange medium and recognized by many devices on the market. It is used in particular as audio and video storage and is even used to update certain firmware (video projectors for example). If you have chosen a new key to better manage your file system, now is the time to select the right one ...

If you are experiencing difficulties with your USB drive, such as impossible detection by your PC, write protection or impossible formatting, don't despair! We have the perfect solution to help you repair and flash your damaged USB drive. Problems with USB drives can have different causes, such as malware, capacity ...

When you try to open a USB key, Windows warns you that this USB key is write protected? Impossible to access the files and even less to delete their contents. The most common cause: a write error modified data in the partition table of the key, making it protected ...

Everyone has watched a spy movie where a technician uses a USB drive to connect to a computer to access a top-secret database. We think of “Mission Impossible” for example, between stunts and deployment of high-tech gadgets. Brilliant isn't it? The interest in connecting with a USB key also exists on a daily basis, ...

While you were in front of your computer and had just inserted your USB key, you had a very unpleasant surprise, that of discovering that it was simply not recognized. From then on, you only have one idea in mind, repairing an undetected USB key and you might as well tell yourself that we completely understand you on this. ...

Today, we store a lot of information in computer hardware and to avoid data loss, we often advise you to make these backups on different media in case one of them fails. So in general it's best to store it on a computer, on the cloud, as well as on a USB key. ...

In previous articles, we saw how to create a rootkit USB key that recovers passwords from a Windows computer. Today we will see how to create a USB drive that opens a backdoor on a Windows machine. This rootkit runs automatically, creates a backdoor on Windows PC and allows you to take control remotely. ...

Want to know if someone tried to insert a USB drive into your home computer or laptop? Want to check if someone tried to copy something from your work PC while you were away? Be aware that Windows keeps a history of all connected USB devices not for digital forensic purposes, ...

Today we will see how to create a USB drive that recovers passwords from a computer. This USB stick runs automatically and recovers most passwords stored on a computer. It is really very useful especially when you have lost your passwords. To create a rootkit USB, follow the steps below: Step 1 ...

BitLocker is data protection software developed by Microsoft that provides partition encryption. It is present in the professional and full versions of Windows 7 and Windows 10. However, it is not available on the Windows 10 Home edition. BitLocker software allows you to encrypt a USB drive or an entire hard drive. Their content does not ...

This tutorial explains how to put Windows 10 on a bootable USB drive from any computer. Indeed, a USB key is much faster than a DVD player, use will be smooth and fast. To put Windows 10 on a USB key, you will need to equip yourself with a USB key with at least 16 GB of USB 3.0 storage space and ...

Do you need more RAM? Is your computer very slow? Would you like to have more RAM but can't afford to buy a memory stick? This tip will surely improve the performance of your computer and increase the operating speed. It consists of using a USB key to increase your computer's memory and boost ...

For several years now, the USB key has become an essential accessory in everyday life. These storage units are vectors of malware and infections of all kinds. Here, the risk is to have your data stolen. Yes, vacuuming the contents of a USB key without its owner's knowledge is possible and very easy. In this tutorial, ...

Is your USB key faulty? Have you been scammed by a seller of falsified USB keys indicating a larger capacity than it really is? Obviously by filling this defective USB key, you will be faced with data loss, the new files erasing the old ones. Because Windows will rewrite parts already used ...

The majority of people know very well that the USB key is a removable storage medium, this is what makes them think that a USB key only allows you to store files from any system that has USB ports or to transfer files. data between computer. However, the USB key can be used in several different ways. Today I will show you that there are other functions more ...

Portable software is an application that does not require any prior installation on your Windows operating system that you can easily carry around using your removable devices such as USB keys. To avoid cluttering up your memory space or to prevent the installation of unnecessary updates, portable software represents an effective, fast and nearby solution that does not cause any ...

You probably know Tor browser, this web browser that allows you to surf anonymously on the Darknet. If you want to be able to surf anonymously wherever you are (Cyber ​​café, work, travel, etc.) or introduce Tor to a friend, the solution is to install Tor Browser on your USB key. First of all download the Tor browser. For ...

A keylogger is a program that allows you to recover everything you type on the keyboard: your passwords, your banking information, etc. A malicious person can then find and explore the various logins and passwords on your computer. In this article, I will show you a trick that allows you to set a Keylogger ...

The lack of security is the weak point of USB keys which go from computer to computer without more supervision than a quick scan via the host machine's antivirus. Now, who has never plugged a key into a Noob (who confuses a firewall and a fire extinguisher)? BitDefender USB Immunizer will help you avoid pitfalls... BitDefender USB Immunizer will help you ...

Did you know that when you connect a USB key in Windows, it leaves traces? Date and time of connection, identifier, type of USB device are therefore clearly visible to malicious people. View your USB drive history USB History Viewer allows you to easily access your session history as it relates to drive connections ...

Do you often use live CDs to repair Windows, launch a Linux system or to test network security? The problem is that you have to burn new CDs with each update and transport all these CDs without knowing if they will really be useful. In this article, I will show you a trick that will allow you to create a key ...