473,396 Members | 2,002 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How to set read protection for USB Drive

Hi,
I created Write Protection for USB Drive by changing Registry value. Same as I want to create Read Protection for USB Drive, Is it possbile....


Note:

Without Using Any External Software.....
Feb 10 '10 #1
3 2508
AmberJain
884 Expert 512MB
There are a few ways to do this:

1. Make files on device unreadable recursively using -r option of 'attrib' command.
2. TweakUI allows to hide a storage device from Mycomputer an all places. I expect that if modifies some registry value for this (although this is a per computer setting and doesnot actually makes pendrive unreadable).
3. Encrypt all data on your pendrive using some symmetric cipher based program. But this will need an application because afaik, there's no encryption program shipped with OS upto windows XP (Vista/7 have Bitlocker? right?). Try Toucan Portable if un-abilty to install apps on other computers is making you find no-application way to perform this task.

There could be other possibilities too.
Feb 16 '10 #2
AmberJain
884 Expert 512MB
Encrypt all data on your pendrive using some symmetric cipher based program. But this will need an application because afaik, there's no encryption program shipped with OS upto windows XP (Vista/7 have Bitlocker? right?).
I was wrong here. Windows XP has a command to encrypt/decrypt user data. It is called 'cipher'. 'cipher /?' at cmd to read more.
Feb 20 '10 #3
"I want to create Read Protection for USB Drive, Is it possbile...." Do you mean anyone just can read your files in the USB? if so, you can use kakasoft USB copy protection to protect files stored in your USB. After encripted by this program, you can set different users and passwords with different permissions, like: reading, writing, full permissions and others... for example: user1+password1: after log user1, he just can reading your files and nothing else can do; user2 +password2: after log user2, he just can reading and copying your files; user3 +password3: after log user3, he just can reading, copying, writing, printing... your files...
Dec 4 '13 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

21
by: Gavin | last post by:
Hi, I'm a newbie to programming of any kind. I have posted this to other groups in a hope to get a response from anyone. Can any one tell me how to make my VB program read the Bios serial number...
2
by: Jim Richards | last post by:
I have been told by a local PC club technician that 98SE cannot read NTFS drives in a network. Is this true? TIA, Jim.
4
by: GiladP1 | last post by:
Hi, I want to copy protect my application. I want to limit its use for a given period of time, say 30 days, after which a license key will be needed. There are various issues to consider here...
10
by: Jose Jimenez | last post by:
Hi Folks I wonder if somebody can help me to copy protect a C program that runs under ms-dos compilated with djgpp... and gcc I have seen www.sofpro.com for references but the software has...
1
by: TaeHo Yoo | last post by:
The file I would like to access in located in C drive and the application which reads the file is located in E drive. When it trys to read the file, it generates an error Error: Request for the...
2
by: Michal Valent | last post by:
Hello, if I try to read a file on the mapped network drive, this error apears: Logon failure: unknown user name or bad password. How to set up permissions for IUSR_MACHINENAME on the mapped...
5
by: Sumana | last post by:
Hi All, We developed our project on VC++.Net console application to create image of disk and to write the image We are having problem with reading and writing the sector beyond 6GB Disk or...
19
by: John | last post by:
I would like to use some third party software for copy protection, software that prevents from copy paste program to another computer (not obfuscator). I am looking for some good solution (hardware...
20
by: Paul Bromley | last post by:
Not sure if I can ask the question in this forum - please let me know if it is better elsewhere. Does anyone know of a reasonably priced good copy protection program that will protect software on...
5
by: Earl Anderson | last post by:
In WinXP & A2002, whenever I attempt to open some 'mbd' files that I've unzipped, downloaded or received as an email attachment, Access opens with a blank screen and a message stating: "Microsoft...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.