SlideShare a Scribd company logo
1 of 7
Download to read offline
Rohos Mini Drive is a FREE USB flash drive encryption application that creates hidden and protected
partition and password protects data on any removable storage device. This portable encryption tool
offers “on-the-fly” encryption even in traveler mode. The installation requires administrative rights.

Set up USB key
          After installation of Rohos Mini Drive, insert your USB pen drive to the computer and run the
           Rohos Mini Drive application.




screen shot 1
          Click on “Setup USB Key”
          The program automatically determines the best options for Rohos disk for your system. It will
           create a partition namely G: with 499 Mb space. You can customize the partition size, disk letter
           and file system by clicking [Change…].




screen shot 2

© Tesline-Service S.R.L. All rights reserved. 2010                                                         1
screen shot 3

Remember Rohos Mini encrypted disk size limit is 2 GB. Also file system may be changed. By default,
Rohos Mini creates disk in NTFS but it may be changed to FAT/FAT32.

          After all disk settings are adjusted you may insert a password to Rohos disk and click on “Create
           disk”.




screen shot 4
It should take a few seconds to create an encrypted volume on your USB device.




screen shot 5




© Tesline-Service S.R.L. All rights reserved. 2010                                                         2
After the process of creating Rohos disk is completed you’ll see your disk details on Rohos Mini main
window.




screen shot 6
Portable Application allows working with a password protected partition on any PC, you just click on
“Rohos Mini” icon on the USB flash drive root folder




screen shot 7

© Tesline-Service S.R.L. All rights reserved. 2010                                                      3
and enter disk password.




screen shot 8

Virtual Keyboard will help you to protect your encrypted disk password from a key-logger.




screen shot 9




© Tesline-Service S.R.L. All rights reserved. 2010                                          4
Now your Rohos disk is accessible from Windows Explorer. And double-clicking on it you have access
to your encrypted files to edit and save files, listen to music and look through your pictures.




screen shot 10


After you finished working with your encrypted files you may disconnect Rohos disk using Rohos icon
in the system tray.




screen shot 11




© Tesline-Service S.R.L. All rights reserved. 2010                                                    5
Access your portable partition on a PC without Admin rights
On a computer without administrative rights Rohos Disk Browser will automatically be launched and
you will be able to work with your encrypted partition, which is seen as Windows Explorer.




screen shot 12


You can run any application and work with your hidden volume as usual (open, copy, edit, etc. files).




.
screen shot 13




© Tesline-Service S.R.L. All rights reserved. 2010                                                      6
Rohos Disk Browser utility uses “on the fly” encryption principle, thus the program doesn’t save
    files in temporary folder and doesn’t leave unencrypted data on a PC or unprotected part of USB
    flash drive. When you open a file such as MS Word document, MS Word application will read and
    write changes to the file using Rohos Disk Browser. When you run the program, the *. exe will be
    decrypted and run in the program memory.




© Tesline-Service S.R.L. All rights reserved. 2010                                                      7

More Related Content

Similar to Rohos Mini Drive Tutorial

Similar to Rohos Mini Drive Tutorial (20)

8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systems
 
Secure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon KeySecure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon Key
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryption
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11
 
Windows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha ShahWindows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha Shah
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
5 utilities of windows 10
5 utilities of windows 105 utilities of windows 10
5 utilities of windows 10
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Portable OS & Portable Application
Portable OS & Portable ApplicationPortable OS & Portable Application
Portable OS & Portable Application
 
Deft v7
Deft v7Deft v7
Deft v7
 
System software 1ppt(udated)
System software 1ppt(udated)System software 1ppt(udated)
System software 1ppt(udated)
 
Open Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsOpen Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystems
 
3uTools Crack 2022
3uTools Crack 20223uTools Crack 2022
3uTools Crack 2022
 
ANDROID ROOTING
ANDROID ROOTINGANDROID ROOTING
ANDROID ROOTING
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Operating system Tutorial.
Operating system Tutorial.Operating system Tutorial.
Operating system Tutorial.
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Open_suse
Open_suseOpen_suse
Open_suse
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Rohos Mini Drive Tutorial

  • 1. Rohos Mini Drive is a FREE USB flash drive encryption application that creates hidden and protected partition and password protects data on any removable storage device. This portable encryption tool offers “on-the-fly” encryption even in traveler mode. The installation requires administrative rights. Set up USB key  After installation of Rohos Mini Drive, insert your USB pen drive to the computer and run the Rohos Mini Drive application. screen shot 1  Click on “Setup USB Key”  The program automatically determines the best options for Rohos disk for your system. It will create a partition namely G: with 499 Mb space. You can customize the partition size, disk letter and file system by clicking [Change…]. screen shot 2 © Tesline-Service S.R.L. All rights reserved. 2010 1
  • 2. screen shot 3 Remember Rohos Mini encrypted disk size limit is 2 GB. Also file system may be changed. By default, Rohos Mini creates disk in NTFS but it may be changed to FAT/FAT32.  After all disk settings are adjusted you may insert a password to Rohos disk and click on “Create disk”. screen shot 4 It should take a few seconds to create an encrypted volume on your USB device. screen shot 5 © Tesline-Service S.R.L. All rights reserved. 2010 2
  • 3. After the process of creating Rohos disk is completed you’ll see your disk details on Rohos Mini main window. screen shot 6 Portable Application allows working with a password protected partition on any PC, you just click on “Rohos Mini” icon on the USB flash drive root folder screen shot 7 © Tesline-Service S.R.L. All rights reserved. 2010 3
  • 4. and enter disk password. screen shot 8 Virtual Keyboard will help you to protect your encrypted disk password from a key-logger. screen shot 9 © Tesline-Service S.R.L. All rights reserved. 2010 4
  • 5. Now your Rohos disk is accessible from Windows Explorer. And double-clicking on it you have access to your encrypted files to edit and save files, listen to music and look through your pictures. screen shot 10 After you finished working with your encrypted files you may disconnect Rohos disk using Rohos icon in the system tray. screen shot 11 © Tesline-Service S.R.L. All rights reserved. 2010 5
  • 6. Access your portable partition on a PC without Admin rights On a computer without administrative rights Rohos Disk Browser will automatically be launched and you will be able to work with your encrypted partition, which is seen as Windows Explorer. screen shot 12 You can run any application and work with your hidden volume as usual (open, copy, edit, etc. files). . screen shot 13 © Tesline-Service S.R.L. All rights reserved. 2010 6
  • 7. Rohos Disk Browser utility uses “on the fly” encryption principle, thus the program doesn’t save files in temporary folder and doesn’t leave unencrypted data on a PC or unprotected part of USB flash drive. When you open a file such as MS Word document, MS Word application will read and write changes to the file using Rohos Disk Browser. When you run the program, the *. exe will be decrypted and run in the program memory. © Tesline-Service S.R.L. All rights reserved. 2010 7