Encrypt USB Flash Drive on Mac and Windows

Encrypt USB Flash Drive For Both Mac and Windows

This article explains how to encrypt data which can be decrypted on both a Mac and Windows computer.

Microsoft Windows accounts for nearly 80% of desktop computers, with Apple OS accounting for about 18% of the market share; (as of Q3, 2021) with this in mind, it is very common for users to want encrypted data to be shared on both Mac and Windows computers. For example, at work, Microsoft Windows is used, while at home, the employee uses a Mac computer. It is not easy to share encrypted data between these two operating systems. There is no installed solution from Microsoft or Apple that provides cross-platform encryption and decryption.

There are two options for those who want to decrypt files on both a Microsoft Windows and an Apple Mac computer.

Individual users can purchase software that encrypts and decrypts software for both Mac and Windows computers as one solution.

The other solution is buying a physical drive which supports decryption on either operating system.

The second option is better suited to a business. This is true because the employee or individual is not required to purchase software.

This article explains how to encrypt data which can be decrypted on both a Mac and Windows computer by using a specific USB flash drive.

The only known solution that has the following three characteristics in a product by Nexcopy. This is a company which provides feature rich flash drive duplicator solutions, but also provides advanced functions to flash drive, such as cross-platform encryption.

This is how the Nexcopy USB flash drive encryption solution works:

  • PC based software is used to encrypt the data
  • Included with the encrypted data are two software utilities loaded onto the flash drive
  • The utilities run from the flash drive and decrypt the data when the correct password is entered
  • The applications do not require installation, they run directly from the flash drive
  • The PCViewer.exe is the Windows based utility – no admin rights required
  • The MacViewer.app is the mac based utility – no admin rights required
  • By launching the correct utility and entering correct password the files will be decrypted and displayed on the associated operating system

Please keep in mind there is a difference between the term “encryption” and the term “copy protection.” There is a difference.

The process of encoding information is known as encryption. This process converts the original representation of the information, for example, plaintext, into ciphertext. Only the authorized party who knows how to decipher the ciphertext back into plaintext can reorganize and piece it back together. The important thing to remember is that once the decipher is complete, the user can do whatever they want with the plaintext. That content can be copied, duplicated, shared, streamed, and screen captured by the user.

Copy protection includes the process of encoding; however, it adds an additional layer of security by prohibiting the user from doing anything other than viewing the content, such as copying, duplicating, sharing, streaming, and screen capture. To put it another way, the files can only be viewed and not modified.

Encryption is a valuable technology in situations where the content owner trusts the person with the password; however, security is required in the event that the USB flash drive is dropped, stolen, or misplaced. By encrypting the content, unauthorized users are prevented from accessing it.

Copy protection is a valuable technology for protecting content while allowing multiple users to view it. For example, a teacher may have valuable lessons that they want all students to see, but they do not want the lessons saved or shared with other classes. This is an excellent application for copy protection.

The company offers USB duplicator solutions for mass production of USB encrypted flash drives. Nexcopy also offers large-scale USB duplicators for copy-protected flash drives. So, depending on the individual or company’s needs, there is a solution for those who require encryption for both Windows and Mac computers.

Continue Reading

NAND Memory Continues High Demand

Micron memory

Micron plans to close Shanghai DRAM operations and focus more on NAND memory market.

Micron Memory, a USB semiconductor company based out of Boise ID, is reportedly planning to close their Shanghai operations which uses technology resources to develop DRAM technology. I source not willing to comment indicates a lack of talent or “loss of technical know-how” is a primary reason for the closure.

Micron expects the Shanghai Design Center to be operational until December of 2022 at which time the facility will be close and employees will be redistributed to either a US or India Micron location. The Shanghai location employees nearly 150 engineers and technicians.

Although reluctant news for the DRAM market segment, this does point to increased demand and interest for NAND memory. The NAND memory market continues to grow as storage demands increase and storage capacities increase. A primary NAND memory market is the USB flash drive market with the highest volume of commodity products, a number which capsulates the mobile phone market.

Micron was founded in Boise, Idaho, in 1978 as a semiconductor design firm. In 1981, the company moved from consulting to manufacturing with the completion of its first wafer fabrication unit (“Fab 1”), producing 64K DRAM chips. Micron went public in 1984 under the ticker symbol MU.

Other articles from this website which mention Micron products and technology.
Continue Reading

Eject USB Flash Drive From Windows Command Line

Microsoft does not provide ways to eject USB flash drives with a single click, or automatically. Universal Serial Bus (USB) is the #1 method for expanding storage in Windows, yet Microsoft makes ejecting a storage device such a manual process! Frustrating to many, like you, because you are here. {wink}

Today we cover how to eject a USB flash drive in Windows in the command prompt. In addition, this article also provides a software way to eject a USB flash drive with the single click of a button. Yes, that is right, a single click!

Let us start by covering how to eject a USB drive using the command prompt.

Like mentioned above, Microsoft does not make this easy. The user must get into DiskPart, List the volumes (drives) connected, select the specific volume (drive) then eject by typing “release.”

The above commands may be performed via the command prompt, but honestly it’s a pain in the a$$ because all the typing involved and manually selecting the device. This process needs to be automated. {hint}

If you are reading this article you want to make things quick, easy and simple.

Nexcopy solved this problem with a free utility that doesn’t require installation, doesn’t require Admin rights, and doesn’t require you to select the drive. The tool is ultra-quick and ultra-easy. In addition, anyone can bundle the free exe file into their own software to automate the process.

The free software tool is called USB Eject Button

Here is the download link to eject USB flash drives from Windows command prompt

Below is the command prompt using a single word to eject a USB flash drive. The command is “release”

However, what if multiple USB flash drives are connected? Is it still just as easy to eject all the USB flash drives? The answer is yes. The USB Eject Button tool works by automatically selecting the last USB flash drive connected to be the first USB flash drive ejected.

Below is an example. We connected “Drive One” first, then “Drive Two” and finally “Drive Three”

Continue Reading

Check for Bad Sectors on USB Flash Drive

This how to tutorial describes a simple way to check for bad sectors on a USB flash drive. The instructions below will also fix any bad sectors, if possible, during the scanning process.

A bad sector on a flash drive is a portion of memory on the flash drive which cannot be accessed, written to, or read from and therefore cannot be used. A bad sector on a flash drive sounds easy enough to diagnose, but it’s important to know there are two types of bad sectors: hard and soft.

Physical damage to a USB flash drive will create a hard bad sector. A hard bad sector cannot be repaired or fixed and is typically induced from physical abuse. A good example: leaving a flash drive in your pocket and it went through the wash, or the device was dropped and hit the ground is such a way, physical damage happened to the memory.

A soft bad sector on a flash drive are memory logic problems. A soft bad sector can occur from a software or data error during the write process. In lower quality flash drives, it is possible the incorrect firmware was written into the USB controller ROM and thus creates instability via soft bad sectors.

Bad sectors cannot be repaired; however soft bad sectors can be repaired.

The soft bad sectors can be fixed by using the CHKDSK utility in the Windows operating system. This same utility will also flag any hard bad sectors not to be used again, and of course not repaired.

Some signs of a bad sector on a flash drive include:

  • Cannot read a file on the flash drive
  • A file location is no longer available
  • Unable to format the USB flash drive
  • A disk read error occurs during operation

In our opinion, run the check disk one time to see if your issue is resolved, but if subsequent scans are required, we recommend discarding the flash drive to avoid further issues.

Running the chkdsk scan is really easy:

Insert flash drive to computer

Using Windows Explorer navigate to the drive letter

In the Explorer window type cmd and press enter

access usb flash drive cmd command

Once inside the command line utility type chkdsk d: /f /r /x and click Enter. NOTE: *The letter d represents the drive letter of the flash drive.

chkdsk commands for usb flash drive

  • The /f parameter tells CHKDSK to fix any errors it finds.
  • The /r parameter tells Windows to repair/restore bad sectors (if possible).
  • The /x parameter unmounts any “handles” to the drive or said another way, this step will not allow any other resource to access the flash drive during the scan.
Continue Reading

Silicon Motion (SMI) Gains Over 580% In Valuation

silicon motion website logo

Silicon Motion, or SMI, is a publicly traded company under the ticker symbol SIMO

Founded in 1995, Silicon Motion Technology Corporation is a leading developer of microcontroller ICs for NAND flash storage devices. The semiconductor company also designs, develops and markets high-performance, low-power semiconductor solutions for original equipment manufacturers (“OEM”) such as Nexcopy Incorporated, a Southern California technology company focused on flash memory storage products.

Silicon Motion currently holds 1,522 patents, with 1,302 of those patents pending for final approval. The company has a revenue of $540 million dollars, annually.

A $1000 investment made in August 2011 would be worth $6,831.87, or a gain of 583.19%, as of August 23, 2021, according to NASDAQ calculations. This return excludes dividends but includes price appreciation.

Source: NASDAQ

Continue Reading

Does Rufus Make USB CD-ROM Drive?

With in a few minutes of downloading Rufus one can determine the software does not make a USB CD-ROM flash drive.

We confirmed this with another article we found on the web from GetUSB.info and they explained how to burn ISO to USB. What they concluded, and so did we, is that Rufus will extract the content of an ISO file and copy those files to the USB flash drive, but the Rufus software doesn’t change the configuration of the device, to that of a CD-ROM.

What started this quest was not wanting to make a bootable Windows flash drive, but rather, find a way to make a USB read-only so the data on the flash drive would not be removed or deleted.

In addition to having the USB read-only for the content, it also makes things impossible for a virus to jump onto the flash drive and spread. Given (my day job) my company doesn’t want a flash drive with our content and logo to be able to spread a virus, so the only solution we found was making sure the USB stick was read-only in the first place.

GetUSB.info article explains what Rufus does and also how to make a USB CD-ROM flash drive, the right way.

Continue Reading

USB Flash Drive for Industrial Control Systems

Honeywell recently released a cybersecurity report claiming that 37% of threats were specifically designed to utilize removable media, such as USB flash drives, which almost doubled from 19% in 2020. This number could be drastically reduced when the proper media and solution are used.

The report by Honeywell is an attempt to redirect attention to their “Honeywell Forge” product which is a software based solution which monitors connected devices and reports back cyber-security risks detected. Ref:1

Isn’t there a difference between monitoring devices and actually preventing security breaches?

EverythingUSB.com posted an article today about a USB drive that is ideally suited for Industrial Control Systems and solves the problem which Honeywell reports.

Industrial Control Systems are (most often) air-gapped solutions. Meaning the computer systems which run them have never been on the internet. With that in mind, the only way to update such a system is through portable storage media, like a USB flash drive. Taking this a step further, if one can guarantee a USB drive which has system updates is clean and write protected (locked as a read-only drive) then malware is unlikely to be introduced to the control system through removeable media.

As the EverythingUSB article points out, there are “basic” ways to make a USB read-only, but don’t let that fool you because cyber-criminals can easily get around them. Basic methods such as changing read-only attribute with DISKPART through command utility as well as manually setting drive security rights from Windows registry values.

The Lock License flash drive by Nexcopy is a device which is always write protected. The write protection is controlled at the hardware level of the chip, so it’s more durable against hacking because machine code of a chip is way more difficult to hack than software running from an operating system.

The Lock License drive can become writable. The user enters some code to temporarily remove the write protection and allow the device to become writable. This gives the creator of the content 100% control on the computer environment to determine if things are safe before putting data on the drive. Said another way, it gives the content owner a guaranteed way to securely create a flash drive with data which is then locked as a read-only device so no further manipulation of the device can happen.

It’s like… why didn’t flash drives simply be created this way in the first place? Source link above in article.

Reference 1

Continue Reading

USB Flash Drive Name Not Changing – 3 Possible Reasons Why

With my Windows 10 computer whenever a USB flash drive is connected the Windows Explorer / My Computer displays the wrong drive label for my device. The name is correct in Disk Management, but Explorer is incorrect, as well any program which uses Explorer to parse the device and read the volume name.

I’ve also seen where any USB device connected displays a specific label name, but not the correct label name as seen in Disk Management.

When the above situation occurs there are three possible reasons why the USB drive name displays the incorrect label. Starting with the most common and easiest to fix, let us take a look at the three solutions to resolve this problem:

Reason #1

Check the device connected for an .inf file. An .info file is a Setup Information file and tells the host computer what to do [Wikipedia]. Many times this is a hidden file, so you may need to turn on “Show hidden files, folders and drives.” If you don’t know how to do this, jump to the bottom of this article and GetUSB.info shows you how.

In the screen shot below you can see the drive letter D, which is a flash drive, having a very long label (or Volume) name of “How To Make a CD ROM Partition” The image also shows the autorun.inf file open with the instructions to rename the drive label to be “How To Make a CD ROM Partition”

To resolve the problem of the label name being different than what you expect, or see is Disk Management, you will need to delete this file. Once the file is deleted you must power cycle, or reconnect, the USB drive to see the changed affects.

If you want to learn more about using inf files with USB drives, we did a post on this many moons ago, back in April of 2009. Here is the link on how to use inf files to rename your flash drive.

Reason #2

The second most common reason would be a rogue registry entry that is somehow sticking around. The registry of a computer system is like a huge log file, or registry, of things changed on your PC, connected to your PC, software installed on your PC and drives on your PC. It is very likely the Windows operating system has, some how, locked in the volume name to the drive letter… so whether one USB device or another is connected, the registry pitches out the locked volume name. A quick way to resolve this issue is clean out the rogue registry entries.

GetUSB.info wrote a blog post about this a long time ago, but in summary, a Windows registry will make over 200 entries or edits for each USB stick connected. That is a lot of information! Once the drive is disconnected, the registry information is still there. These “historical” entries are what must be cleaned out. It’s a good article if you have a few extra minutes [found here].

Continue Reading

Harnessing the Power of Write Protect USB Flash Drives

Data protection and cyber-security: Harnessing the power of write protected USB drives, Greg Morris, CEO of Nexcopy Incorporated based in Southern California, looks at the opportunities for enterprises surrounding read-only USB technology.

November 18, 2020

The world is a global digital economy more than ever before and that move includes the digitization of intellectual property and assets which are shared between customers and clients. The cases of sophisticated data breaches, hacking and cyber crimes target individuals, government entities and private corporations. These attacks have grown by leaps and bounds in the last ten years. According to one report published from a securities website, an enterprise may suffer an average loss of $3.92 million as a result of data intrusion and hacking.

Cyber threats and risks are becoming more severe as IP is increasingly stored in digital format. As such, keeping the digital data, especially confidential data, away from cyber criminals is imperative and should be a primary concern for IT managers and professionals. Without a data protection strategy, an enterprise is unwittingly providing an entry point for cyber criminals to obtain valuable information, which could be worth millions of dollars.

Cyber-security and endpoint data loss protection are key strategies in keeping digital attacks at bay. Strategies which encompass all aspects of data entry points is critical, from the mass storage physical devices like USB flash drives, to network connectivity with cloud storage and network communications.

With this in mind, having efficient and easy to use storage and memory devices is key to enterprise employees adhering to security protocols and at the same time have an ease-of-use through execution of such protocols. Empowering employees on deciding for themselves when, where and which devices to work with is an underrated component of an overall security strategy, yet incredibly important. With the empowerment given to employees, a management team must still account for, and eliminate, user error or forgetfulness even in the most cautions of protocols and procedures.

The USB flash drive was first introduced to the United States via IBM in the year 2000. Today, twenty years later, the flash drive is still a primary storage device used when sharing information. This is true for government, healthcare, finance, automotive, telecommunication and manufacturing, who still rely heavily on USB storage devices, which, if not secure, can inadvertently lead to leaked personal and private information. Employees use USB drives for faster exchange of information and better collaboration between departments or job positions. Employers should be able to provide the needed data storage devices while also ensuring a no-fault security system is in place to protect the company’s intellectual property and the company’s network infrastructure.

For example, in the healthcare sector, it is common practice among doctors to use mobile data storage devices to transfer data easily from a doctor’s office to say that of a hospital. Each location holds sensitive data with patient records and it’s equally important those locations are safe from hacker intrusion. When transferring data between one location and another via a USB flash drive, it is important that device remains secure. The responsibility of digital security falls on the IT professional who manages these digital networks, but also responsibility is held by the user of those technologies.

In order for a virus to spread between locations via a storage device, like a USB flash drive, implys the USB must carry the virus or malicious code from one location to the next. However; these devices cannot get infected if the USB is a read-only device. Meaning the device cannot add new digital content, digital files or malicious code if the USB is not allowed to write data into memory. After the drive is connected and the network scans the device for malicious code the user has access to the drive, at which point a secure password can be entered to unlock the read-only flash drive and make it read/write. The USB drive is always write protected when first connected to any digital device, it is impossible for a virus to jump onto the drive without the user knowing. Only when the user knows the device and environment is safe from hacking, can the password be entered to access the USB drive as a read/write device to transfer files from one location to another.

This type of USB flash drive is called a Lock License drive.

write protected USB drive

The unique thing about this Lock License flash drive, is the write protection is always enabled whenever the USB is disconnected from the computer. Meaning, the default status of the drive is read-only when connected to any device. When the storage device is reconnected to any computer, it is read-only and files cannot get onto the drive until a password is entered. However, the user experience is very nice and easy because files can always be copied off the drive, without a password. The user gets the full benefit of ease-of-use which a USB flash drive is so well known for, without the hassle and worry of the storage device being exposed to malicious software for data breaches or hacking.

The same caution must be observed with systems-control applications. System Control products are hardware based products which use firmware to run the mechanical product. The hardware are things such as turbine controls for water and power facilities, large pumps for water work facilities or motors to capture wind generated energy. These products are the back-bone of American infrastructure and must be secure at all times. A typical encrypted flash drive doesn’t work to update the firmware of these types of products because the system-control products do not have a user interface to enter passwords. However; a read-only USB device is valuable because it is secure from spreading a virus to the system control units and at the same time the systems control unit can pull firmware or updates from the USB drive without fear of also getting malicious code. The device is not writable, so malicious software or hacking code cannot embed itself into memory on such update devices.

Investing in data protection and cyber security solutions is the primary function of IT professionals and multiple systems and layers of security steps are required to keep a corporation or enterprise safe and secure. By locking down the most common entry point, a USB port, with read-only USB flash memory products from Nexcopy is a key ingredient to the overall success of a cyber security strategy. When correctly combined with endpoint software management, hardware-based write protected USB storage devices can empower public and private sector enterprises and allow them to gain control of their organization’s devices

Learn more about Nexcopy’s USB write protection for flash memory.

Continue Reading

Phison Sells Share to Kingston Technology

Kingston Technology, based in Fountain Valley California, will become the majority shareholder in a joint venture set up with Phison Electronics, one of its Taiwanese suppliers.

Phison Electronics will sell its shares in the joint venture called Kingston Solutions, Inc. (KSI) to the Fountain Valley company, which announced the transaction earlier today, August 11, 2020. The deal is worth nearly $60.3 million US.

Kingston, a maker of memory products for computers and consumer electronics, is Orange County’s largest private company. The firm, led by co-founder and chief executive John Tu, had revenue of $12.8 billion last year.

Kingston corporate office

Continue Reading

Copyright ©

Copyright © 2011-2019 by
USB Powered Gadgets and more…
All rights reserved.

SD Card Duplicator Equipment

GetFlashMemory.info has reviewed SD Card Duplicators by Nexcopy.  Our results found the product to be reliable, fast and accurate.

They manufacture both PC connected and standalone systems to fit any type application

Custom Shape USB Media

Turn your product into a custom USB shape. Right down to the last detail. Click to see over 30 examples of custom shape USB drives.