SlideShare a Scribd company logo
1 of 7
Download to read offline
Rohos Mini Drive is a FREE USB flash drive encryption application that creates hidden and protected
partition and password protects data on any removable storage device. This portable encryption tool
offers “on-the-fly” encryption even in traveler mode. The installation requires administrative rights.

Set up USB key
          After installation of Rohos Mini Drive, insert your USB pen drive to the computer and run the
           Rohos Mini Drive application.




screen shot 1
          Click on “Setup USB Key”
          The program automatically determines the best options for Rohos disk for your system. It will
           create a partition namely G: with 499 Mb space. You can customize the partition size, disk letter
           and file system by clicking [Change…].




screen shot 2

© Tesline-Service S.R.L. All rights reserved. 2010                                                         1
screen shot 3

Remember Rohos Mini encrypted disk size limit is 2 GB. Also file system may be changed. By default,
Rohos Mini creates disk in NTFS but it may be changed to FAT/FAT32.

          After all disk settings are adjusted you may insert a password to Rohos disk and click on “Create
           disk”.




screen shot 4
It should take a few seconds to create an encrypted volume on your USB device.




screen shot 5




© Tesline-Service S.R.L. All rights reserved. 2010                                                         2
After the process of creating Rohos disk is completed you’ll see your disk details on Rohos Mini main
window.




screen shot 6
Portable Application allows working with a password protected partition on any PC, you just click on
“Rohos Mini” icon on the USB flash drive root folder




screen shot 7

© Tesline-Service S.R.L. All rights reserved. 2010                                                      3
and enter disk password.




screen shot 8

Virtual Keyboard will help you to protect your encrypted disk password from a key-logger.




screen shot 9




© Tesline-Service S.R.L. All rights reserved. 2010                                          4
Now your Rohos disk is accessible from Windows Explorer. And double-clicking on it you have access
to your encrypted files to edit and save files, listen to music and look through your pictures.




screen shot 10


After you finished working with your encrypted files you may disconnect Rohos disk using Rohos icon
in the system tray.




screen shot 11




© Tesline-Service S.R.L. All rights reserved. 2010                                                    5
Access your portable partition on a PC without Admin rights
On a computer without administrative rights Rohos Disk Browser will automatically be launched and
you will be able to work with your encrypted partition, which is seen as Windows Explorer.




screen shot 12


You can run any application and work with your hidden volume as usual (open, copy, edit, etc. files).




.
screen shot 13




© Tesline-Service S.R.L. All rights reserved. 2010                                                      6
Rohos Disk Browser utility uses “on the fly” encryption principle, thus the program doesn’t save
    files in temporary folder and doesn’t leave unencrypted data on a PC or unprotected part of USB
    flash drive. When you open a file such as MS Word document, MS Word application will read and
    write changes to the file using Rohos Disk Browser. When you run the program, the *. exe will be
    decrypted and run in the program memory.




© Tesline-Service S.R.L. All rights reserved. 2010                                                      7

More Related Content

Similar to Rohos Mini Drive Tutorial

Similar to Rohos Mini Drive Tutorial (20)

8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systems
 
Secure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon KeySecure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon Key
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryption
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11
 
Windows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha ShahWindows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha Shah
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
5 utilities of windows 10
5 utilities of windows 105 utilities of windows 10
5 utilities of windows 10
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Portable OS & Portable Application
Portable OS & Portable ApplicationPortable OS & Portable Application
Portable OS & Portable Application
 
Deft v7
Deft v7Deft v7
Deft v7
 
System software 1ppt(udated)
System software 1ppt(udated)System software 1ppt(udated)
System software 1ppt(udated)
 
Open Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsOpen Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystems
 
3uTools Crack 2022
3uTools Crack 20223uTools Crack 2022
3uTools Crack 2022
 
ANDROID ROOTING
ANDROID ROOTINGANDROID ROOTING
ANDROID ROOTING
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Operating system Tutorial.
Operating system Tutorial.Operating system Tutorial.
Operating system Tutorial.
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Open_suse
Open_suseOpen_suse
Open_suse
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Rohos Mini Drive Tutorial

  • 1. Rohos Mini Drive is a FREE USB flash drive encryption application that creates hidden and protected partition and password protects data on any removable storage device. This portable encryption tool offers “on-the-fly” encryption even in traveler mode. The installation requires administrative rights. Set up USB key  After installation of Rohos Mini Drive, insert your USB pen drive to the computer and run the Rohos Mini Drive application. screen shot 1  Click on “Setup USB Key”  The program automatically determines the best options for Rohos disk for your system. It will create a partition namely G: with 499 Mb space. You can customize the partition size, disk letter and file system by clicking [Change…]. screen shot 2 © Tesline-Service S.R.L. All rights reserved. 2010 1
  • 2. screen shot 3 Remember Rohos Mini encrypted disk size limit is 2 GB. Also file system may be changed. By default, Rohos Mini creates disk in NTFS but it may be changed to FAT/FAT32.  After all disk settings are adjusted you may insert a password to Rohos disk and click on “Create disk”. screen shot 4 It should take a few seconds to create an encrypted volume on your USB device. screen shot 5 © Tesline-Service S.R.L. All rights reserved. 2010 2
  • 3. After the process of creating Rohos disk is completed you’ll see your disk details on Rohos Mini main window. screen shot 6 Portable Application allows working with a password protected partition on any PC, you just click on “Rohos Mini” icon on the USB flash drive root folder screen shot 7 © Tesline-Service S.R.L. All rights reserved. 2010 3
  • 4. and enter disk password. screen shot 8 Virtual Keyboard will help you to protect your encrypted disk password from a key-logger. screen shot 9 © Tesline-Service S.R.L. All rights reserved. 2010 4
  • 5. Now your Rohos disk is accessible from Windows Explorer. And double-clicking on it you have access to your encrypted files to edit and save files, listen to music and look through your pictures. screen shot 10 After you finished working with your encrypted files you may disconnect Rohos disk using Rohos icon in the system tray. screen shot 11 © Tesline-Service S.R.L. All rights reserved. 2010 5
  • 6. Access your portable partition on a PC without Admin rights On a computer without administrative rights Rohos Disk Browser will automatically be launched and you will be able to work with your encrypted partition, which is seen as Windows Explorer. screen shot 12 You can run any application and work with your hidden volume as usual (open, copy, edit, etc. files). . screen shot 13 © Tesline-Service S.R.L. All rights reserved. 2010 6
  • 7. Rohos Disk Browser utility uses “on the fly” encryption principle, thus the program doesn’t save files in temporary folder and doesn’t leave unencrypted data on a PC or unprotected part of USB flash drive. When you open a file such as MS Word document, MS Word application will read and write changes to the file using Rohos Disk Browser. When you run the program, the *. exe will be decrypted and run in the program memory. © Tesline-Service S.R.L. All rights reserved. 2010 7