SlideShare a Scribd company logo
1 of 19
Download to read offline
v1.00
LOCKv100

Table of Contents
A. Introduction.................................................................................................. 2
B. General Description ..................................................................................... 2
C. Features......................................................................................................... 3
D. Before Using the Security Application Program – LOCK ....................... 4
E. Introduction to the Security Application Program – LOCK ................... 5
E1. Main Screen ......................................................................................... 5
E2. Set Password / Change Password ........................................................ 5
E3. Disable Password................................................................................. 8
E4. Unlock Device ................................................................................... 10
E5. Configure Partition Sizes................................................................... 13
F. Checking the Security Application Program – LOCK’s Version .......... 17
G. Running the Program As Privilege User ?! ............................................. 17
H. FAQ – Frequently Asked Questions ......................................................... 18

page 1
LOCKv100

A. Introduction
Ø

This LOCK security application program applies to only secure series of products
only. Usage of this AP on other products was prohibited.

Ø

Plug in only ONE device at a time. DO NOT plug in two or more secure device at
the same time when running this security application program - LOCK.

Ø

Windows 98 users, please install driver first before plug in your device and run this
application program.

Ø

Windows 2000 users, please upgrade to Service Pack 3 (SP3) or Service Pack 4
(SP4) first before using this security product and application program.

Ø

This security application program – LOCK is only designed for Windows base
operating system.

B. General Description
The product you have is a USB Flash Memory Storage Device with security function.
This security function provides you with high privacy to your personal data. It lets you to
set up your own password with a maximum of 16 characters and adjustable public and
secure area.
Securing your data had never been easier with the LOCK security application program.
The LOCK provides user with convenience and privacy, as well as the high security to
data stored on you USB flash memory storage device. Feel safe with the LOCK security
function.

page 2
LOCKv100

C. Features
(a) Disk Free - program stored on device, so you don’t have to carry the program with
extra CD-ROM disc or floppy disk.
(b) Easy to Operate – program is pictorial with easy to understand icons and friendly
descriptions.
(c) Customized Password – users can choose a password of their own from 1
character to a maximum of 16 characters.
(d) Fixed Password Retry – users are only allow to type in the password 5 times,
when typing in the wrong password for the sixth time, the drive will be formatted to
protect the data of been exposed to others.
(e) Friendly Reminder – there is a password hint function available, in case user
forget his/her password. User can set up their own password hint with message no
longer than 32 characters.
(f) Multi Language Support – support English, Japanese, Simplify Chinese,
Traditional Chinese language interface, will auto detect the language used by
operating system. Default interface set to English

page 3
LOCKv100

D. Before Using the Security Application Program – LOCK
When you plug in your device to a USB port, your operating system should recognised
the device and showed a “Removable Disk” icon. This is the “Public” partition and the
security application program - LOCK will be stored in this partition.

Public
Partition

Partition 1 – Secure Area
This secure area is protected by password and can only be accessed by typing in the
correct password. If NO password exists, then you cannot use this partition.
Partition 2 – Public Area
This area is “Always Open” to all users using the device. Users can read / write
data to this area any time. The security application program – LOCK will be stored
in this partition. Password security will only apply to the secure partition and will
not affect this partition.

page 4
LOCKv100

E. Introduction to the Security Application Program – LOCK
E1. Main Screen

Move mouse cursor to the icons, and the friendly description of the button will
appear within second.

E2. Set Password / Change Password

Press the top right hand button to setup or change your password.

page 5
LOCKv100

Setup Password : If there is no password exist, simply enter a password of your
choice within 16 characters; you may also enter a password hint (maximum 32
characters including spaces) of your choice to remind you of your password, in
case you forget your password.

NB : You can only type in English letters and numbers.
Tick the “Show Password” box, if you want to see what you are typing.

When ready, press
(apply) to save the password and password hint. You will
see the following messages telling you that the password had been changed and
device will be locked automatically when you remove it from the USB port or if
there is a suspension in power.

Press
(cancel) to cancel the set up procedure, if you do not wish to save the
password and password hint.

page 6
LOCKv100

Change Password : If there exist a password, before you make any changes, you
will need to enter the current password. Enter the current password and new
password of your choice; you may also edit the password hint at the same time.

Tick the “Show Password” box, if you want to see what you are typing.

Press
(apply) to save changes to the password and password hint. You will see
the following messages telling you that the password had been changed and device
will be locked automatically when you remove it from the USB port or if there is a
suspension in power.

Press
(cancel) to cancel the change password procedure, if you want to keep
current password and password hint.

page 7
LOCKv100

E3. Disable Password

Press the second button on the right to “Disable” (remove) the password.
You will be prompted to enter your password. Press
(cancel) to cancel, if you
do not want remove your current password and password hint.

You have six chances to enter the password correctly, before your device gets
formatted.

page 8
LOCKv100

You will be reminded with the following message if you have typed in the wrong
password for the fifth time.

If you typed in the wrong password for the sixth time, your device gets formatted
automatically.

If you have forgotten your password, click on the password hint and see if it
reminds you with your password.

Enter the correct password and your password will be disabled (removed).

page 9
LOCKv100

E4. Unlock Device
If you have setup a password, when you removed your device from USB port (or if
there is a suspension in power), partition 1 of your device gets locked
automatically. You will not be able to access this partition 1, nor read or write data
to this partition 1.

Press the third button on the right to “Unlock” the partition temporarily.

page 10
LOCKv100

You will be prompted to enter your password. Press
do not want unlock partition 1.

(cancel) to cancel, if you

You have six chances to enter the password correctly, before your device gets
formatted.

You will be reminded with the following message if you have typed in the wrong
password for the fifth time.

page 11
LOCKv100

If you typed in the wrong password for the sixth time, your device gets formatted
automatically.

If you have forgotten your password, click on the password hint and see if it
reminds you with your password.

Once you have entered the correct password, partition 1 will available temporarily
until you remove your device from USB port or if there is a suspension in power.
When partition 1 is unlocked, you can read or write data to the partition.

page 12
LOCKv100

E5. Configure Partition Sizes
You can change the sizes of the two partitions (public and secure).

Public
Partition

page 13
LOCKv100

Press the middle button on the bottom of the LOCK application program to resize
public and secure partition areas.

You need to “Disable” you password first, before you can use this “Configure
Size” (resizing) function, if you have already setup a password. Follow section E3
of this manual to disable your password.

A warning message will show, telling you that data will be destroyed. If you have
not yet backed up your data, press
(cancel) to cancel the operation and back up
your data first; otherwise, press
(apply) to continue.

page 14
LOCKv100

Move the pointer to the left or right to change the size of the public and secure
area. (minimum capacity can be set for public area is 2MB)

Press
(cancel) to cancel the operation if you do not want to change the current
public and secure area; otherwise, press
(apply) to continue.
Formatting will then take place, please wait till the “Formatting Completed”
message appear.

After configuring (resizing & formatting) your USB device, please remember to
remove from USB port and re-plug in again, before start using it again.

page 15
LOCKv100

You can see the change in capacity sizes of each partition.
Before Configure Size

After Configure Size

NB :

After configuring (resizing) is completed, all data will get erased, but the
security application program will be restored in public area automatically.

page 16
LOCKv100

F. Checking the Security Application Program – LOCK’s Version
In some situation it is necessary to know this information. Situation like whether you
need to upgrade to newer version of the software or if you having trouble when using
this software, and is seeking help from our technical staff, our technical staff may ask
you which version you are using…etc.
Simply press the top left hand button and the version will displayed.

G. Running the Program As Privilege User ?!
Some user may see this following screen.

Check and make sure that you have plugged in your device and your Windows operating
system did recognise your device. Otherwise, please check FAQ Q3 for more detail.

page 17
LOCKv100

H. FAQ – Frequently Asked Questions
Q1
A1

My Windows 98 cannot detect my device, what can I do ?
Make sure you have installed the latest device driver for your device. If you have
already done so, but Windows still cannot detect your device, please try the following.
(1) Go to "Safe Mode" => "Device Manager"
(2) Remove any devices that's related to USB
(3) Remove any "Unknown devices"
(4) Remove any device which are not present
(5) Remove any devices that's related to your device
(6) Restart machine
(7) Install driver if necessary (download latest driver from website)
(8) Restart machine as requested and then plug in your device

Q2
A2

My Windows ME / 2000 / XP cannot detect my device, what can I do ?
Since there is no driver required for these operating systems, the device uses the built-in
driver (USB Mass Storage Class Driver) from these operating systems. If your
operating system cannot find the device, then it is very likely that the built-in driver
files were missing or corrupted; please try to recover these files from other computer or
from the original Windows operating system CD.
NB : Windows 2000 users, please upgrade to service pack 3 or later.

Q3

When I run the LOCK program, it displayed “Please insert the device or run this
utility as privileged user” ?
This problem may occur in Windows 2000 or Windows XP, under the following two
situations. Situation 1 : You have forgotten to insert your device.
Situation 2 : The security application program – LOCK requires some
security privileges in these Windows operating systems. If
you are not the administrator of the computer, these
privileges may be restricted by administrator. Please check
with your MIS or administrator of the computer to open up
the privileges for you. (see following method)

A3

When logged into the account affected, run GPEDIT.MSC from the run menu (If there
is not enough access use the 'Run As' option). We now need to find the security policy
"Devices: Allowed to eject removable NTFS media". It is located in Local Computer
Policy >> Computer Configuration >> Windows Settings >> Security Settings >>
Local Policy >> Security Options. You need to change the access from
"Administrators and Power Users" over to "Administrators and Inter Active Users".

page 18

More Related Content

What's hot

toilet cleaner bathroom spy camera 409 hd camera user guide
toilet cleaner bathroom spy camera 409 hd camera user guidetoilet cleaner bathroom spy camera 409 hd camera user guide
toilet cleaner bathroom spy camera 409 hd camera user guidegeorge david
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networksRociocmf
 
shampoo Bathroom Shower gel hd camera user guide
shampoo Bathroom Shower gel hd camera user guideshampoo Bathroom Shower gel hd camera user guide
shampoo Bathroom Shower gel hd camera user guidegeorge david
 
bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...
bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...
bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...george david
 
Toothbrush hd camera user guide
Toothbrush hd camera user guideToothbrush hd camera user guide
Toothbrush hd camera user guidegeorge david
 
HD spy camera bathroom 409 hd spy camera user guide
HD spy camera bathroom 409 hd spy camera user guideHD spy camera bathroom 409 hd spy camera user guide
HD spy camera bathroom 409 hd spy camera user guidegeorge david
 
Men tholatum shower gel hd camera user guide
Men tholatum shower gel hd camera user guideMen tholatum shower gel hd camera user guide
Men tholatum shower gel hd camera user guidegeorge david
 
Lcd radio hd camera user guide
Lcd radio hd camera user guideLcd radio hd camera user guide
Lcd radio hd camera user guidegeorge david
 
Povos trimmer hd camera user guide
Povos trimmer hd camera user guidePovos trimmer hd camera user guide
Povos trimmer hd camera user guidegeorge david
 
hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)
hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)
hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)george david
 
shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)
shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)
shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)george david
 

What's hot (11)

toilet cleaner bathroom spy camera 409 hd camera user guide
toilet cleaner bathroom spy camera 409 hd camera user guidetoilet cleaner bathroom spy camera 409 hd camera user guide
toilet cleaner bathroom spy camera 409 hd camera user guide
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
 
shampoo Bathroom Shower gel hd camera user guide
shampoo Bathroom Shower gel hd camera user guideshampoo Bathroom Shower gel hd camera user guide
shampoo Bathroom Shower gel hd camera user guide
 
bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...
bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...
bathroom hidden camera Lynx hd camera user guide how to use a bathroom spy ca...
 
Toothbrush hd camera user guide
Toothbrush hd camera user guideToothbrush hd camera user guide
Toothbrush hd camera user guide
 
HD spy camera bathroom 409 hd spy camera user guide
HD spy camera bathroom 409 hd spy camera user guideHD spy camera bathroom 409 hd spy camera user guide
HD spy camera bathroom 409 hd spy camera user guide
 
Men tholatum shower gel hd camera user guide
Men tholatum shower gel hd camera user guideMen tholatum shower gel hd camera user guide
Men tholatum shower gel hd camera user guide
 
Lcd radio hd camera user guide
Lcd radio hd camera user guideLcd radio hd camera user guide
Lcd radio hd camera user guide
 
Povos trimmer hd camera user guide
Povos trimmer hd camera user guidePovos trimmer hd camera user guide
Povos trimmer hd camera user guide
 
hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)
hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)
hidden camera hair gel hidden camera bathroom Syoss hd camera user guide(nrg)
 
shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)
shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)
shower spy camera toilet spy camera Adidas pulse hd camera user guide (rc)
 

Similar to Loc kv100 (mode 8)

Loc kv101 mode 8
Loc kv101  mode 8Loc kv101  mode 8
Loc kv101 mode 8angga_uht
 
Imation loc kv20-e manual
Imation loc kv20-e manualImation loc kv20-e manual
Imation loc kv20-e manualJaui Puma
 
Memorex lock usermanual v224 d
Memorex lock usermanual v224 dMemorex lock usermanual v224 d
Memorex lock usermanual v224 dTeresalp
 
Memorex lock usermanual v224 d
Memorex lock usermanual v224 dMemorex lock usermanual v224 d
Memorex lock usermanual v224 dJuan Pullupaxi
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalIdris Ahmed
 
Imation Loc Kv108 B Manual
Imation Loc Kv108 B ManualImation Loc Kv108 B Manual
Imation Loc Kv108 B Manualanarcasado
 
Plum Gator 3 Manual / User Guide
Plum Gator 3 Manual / User GuidePlum Gator 3 Manual / User Guide
Plum Gator 3 Manual / User Guidemanualsheet
 
Alcatel Onetouch Evo 7 Manual / User Guide
Alcatel Onetouch Evo 7 Manual / User GuideAlcatel Onetouch Evo 7 Manual / User Guide
Alcatel Onetouch Evo 7 Manual / User Guidemanualsheet
 
Lenovo Flex 3 manual PDF and Troubleshooting / User Guide
Lenovo Flex 3 manual PDF and Troubleshooting / User GuideLenovo Flex 3 manual PDF and Troubleshooting / User Guide
Lenovo Flex 3 manual PDF and Troubleshooting / User Guidemanualsheet
 
Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide
  Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide  Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide
Lenovo Ideapad 700 (17") user manual PDF (english) / User Guidemanualsheet
 
Pt lg-phoenix3
Pt lg-phoenix3Pt lg-phoenix3
Pt lg-phoenix3Hugo Loja
 
Lenovo Flex 4 (14") user guide manual PDF (English) / User Guide
Lenovo Flex 4 (14") user guide manual PDF (English) / User GuideLenovo Flex 4 (14") user guide manual PDF (English) / User Guide
Lenovo Flex 4 (14") user guide manual PDF (English) / User Guidemanualsheet
 
ProteMac LogonKey UserGuide
ProteMac LogonKey UserGuideProteMac LogonKey UserGuide
ProteMac LogonKey UserGuideProteMac
 
Secubio Black and white/Blue LCD Fingerprint Machine hardware Manual
Secubio Black and white/Blue LCD Fingerprint Machine hardware ManualSecubio Black and white/Blue LCD Fingerprint Machine hardware Manual
Secubio Black and white/Blue LCD Fingerprint Machine hardware Manualsecubio Secubio
 
The Lenovo Ideapad 100s user guide manual PDF (English)
The Lenovo Ideapad 100s user guide manual PDF (English)The Lenovo Ideapad 100s user guide manual PDF (English)
The Lenovo Ideapad 100s user guide manual PDF (English)manualsheet
 

Similar to Loc kv100 (mode 8) (20)

Loc kv101 mode 8
Loc kv101  mode 8Loc kv101  mode 8
Loc kv101 mode 8
 
Imation loc kv20-e manual
Imation loc kv20-e manualImation loc kv20-e manual
Imation loc kv20-e manual
 
The secret
The secretThe secret
The secret
 
Memorex lock usermanual v224 d
Memorex lock usermanual v224 dMemorex lock usermanual v224 d
Memorex lock usermanual v224 d
 
Memorex lock usermanual v224 d
Memorex lock usermanual v224 dMemorex lock usermanual v224 d
Memorex lock usermanual v224 d
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 final
 
Imation Loc Kv108 B Manual
Imation Loc Kv108 B ManualImation Loc Kv108 B Manual
Imation Loc Kv108 B Manual
 
Imation loc kv20-d manual
Imation loc kv20-d manualImation loc kv20-d manual
Imation loc kv20-d manual
 
Plum Gator 3 Manual / User Guide
Plum Gator 3 Manual / User GuidePlum Gator 3 Manual / User Guide
Plum Gator 3 Manual / User Guide
 
Alcatel Onetouch Evo 7 Manual / User Guide
Alcatel Onetouch Evo 7 Manual / User GuideAlcatel Onetouch Evo 7 Manual / User Guide
Alcatel Onetouch Evo 7 Manual / User Guide
 
Windows 7
Windows 7Windows 7
Windows 7
 
Lenovo Flex 3 manual PDF and Troubleshooting / User Guide
Lenovo Flex 3 manual PDF and Troubleshooting / User GuideLenovo Flex 3 manual PDF and Troubleshooting / User Guide
Lenovo Flex 3 manual PDF and Troubleshooting / User Guide
 
Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide
  Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide  Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide
Lenovo Ideapad 700 (17") user manual PDF (english) / User Guide
 
Pt lg-phoenix3
Pt lg-phoenix3Pt lg-phoenix3
Pt lg-phoenix3
 
Lenovo Flex 4 (14") user guide manual PDF (English) / User Guide
Lenovo Flex 4 (14") user guide manual PDF (English) / User GuideLenovo Flex 4 (14") user guide manual PDF (English) / User Guide
Lenovo Flex 4 (14") user guide manual PDF (English) / User Guide
 
Family Tree Explorer 9 Premium Manual
Family Tree Explorer 9 Premium ManualFamily Tree Explorer 9 Premium Manual
Family Tree Explorer 9 Premium Manual
 
Ds708 manual
Ds708 manualDs708 manual
Ds708 manual
 
ProteMac LogonKey UserGuide
ProteMac LogonKey UserGuideProteMac LogonKey UserGuide
ProteMac LogonKey UserGuide
 
Secubio Black and white/Blue LCD Fingerprint Machine hardware Manual
Secubio Black and white/Blue LCD Fingerprint Machine hardware ManualSecubio Black and white/Blue LCD Fingerprint Machine hardware Manual
Secubio Black and white/Blue LCD Fingerprint Machine hardware Manual
 
The Lenovo Ideapad 100s user guide manual PDF (English)
The Lenovo Ideapad 100s user guide manual PDF (English)The Lenovo Ideapad 100s user guide manual PDF (English)
The Lenovo Ideapad 100s user guide manual PDF (English)
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Loc kv100 (mode 8)

  • 2. LOCKv100 Table of Contents A. Introduction.................................................................................................. 2 B. General Description ..................................................................................... 2 C. Features......................................................................................................... 3 D. Before Using the Security Application Program – LOCK ....................... 4 E. Introduction to the Security Application Program – LOCK ................... 5 E1. Main Screen ......................................................................................... 5 E2. Set Password / Change Password ........................................................ 5 E3. Disable Password................................................................................. 8 E4. Unlock Device ................................................................................... 10 E5. Configure Partition Sizes................................................................... 13 F. Checking the Security Application Program – LOCK’s Version .......... 17 G. Running the Program As Privilege User ?! ............................................. 17 H. FAQ – Frequently Asked Questions ......................................................... 18 page 1
  • 3. LOCKv100 A. Introduction Ø This LOCK security application program applies to only secure series of products only. Usage of this AP on other products was prohibited. Ø Plug in only ONE device at a time. DO NOT plug in two or more secure device at the same time when running this security application program - LOCK. Ø Windows 98 users, please install driver first before plug in your device and run this application program. Ø Windows 2000 users, please upgrade to Service Pack 3 (SP3) or Service Pack 4 (SP4) first before using this security product and application program. Ø This security application program – LOCK is only designed for Windows base operating system. B. General Description The product you have is a USB Flash Memory Storage Device with security function. This security function provides you with high privacy to your personal data. It lets you to set up your own password with a maximum of 16 characters and adjustable public and secure area. Securing your data had never been easier with the LOCK security application program. The LOCK provides user with convenience and privacy, as well as the high security to data stored on you USB flash memory storage device. Feel safe with the LOCK security function. page 2
  • 4. LOCKv100 C. Features (a) Disk Free - program stored on device, so you don’t have to carry the program with extra CD-ROM disc or floppy disk. (b) Easy to Operate – program is pictorial with easy to understand icons and friendly descriptions. (c) Customized Password – users can choose a password of their own from 1 character to a maximum of 16 characters. (d) Fixed Password Retry – users are only allow to type in the password 5 times, when typing in the wrong password for the sixth time, the drive will be formatted to protect the data of been exposed to others. (e) Friendly Reminder – there is a password hint function available, in case user forget his/her password. User can set up their own password hint with message no longer than 32 characters. (f) Multi Language Support – support English, Japanese, Simplify Chinese, Traditional Chinese language interface, will auto detect the language used by operating system. Default interface set to English page 3
  • 5. LOCKv100 D. Before Using the Security Application Program – LOCK When you plug in your device to a USB port, your operating system should recognised the device and showed a “Removable Disk” icon. This is the “Public” partition and the security application program - LOCK will be stored in this partition. Public Partition Partition 1 – Secure Area This secure area is protected by password and can only be accessed by typing in the correct password. If NO password exists, then you cannot use this partition. Partition 2 – Public Area This area is “Always Open” to all users using the device. Users can read / write data to this area any time. The security application program – LOCK will be stored in this partition. Password security will only apply to the secure partition and will not affect this partition. page 4
  • 6. LOCKv100 E. Introduction to the Security Application Program – LOCK E1. Main Screen Move mouse cursor to the icons, and the friendly description of the button will appear within second. E2. Set Password / Change Password Press the top right hand button to setup or change your password. page 5
  • 7. LOCKv100 Setup Password : If there is no password exist, simply enter a password of your choice within 16 characters; you may also enter a password hint (maximum 32 characters including spaces) of your choice to remind you of your password, in case you forget your password. NB : You can only type in English letters and numbers. Tick the “Show Password” box, if you want to see what you are typing. When ready, press (apply) to save the password and password hint. You will see the following messages telling you that the password had been changed and device will be locked automatically when you remove it from the USB port or if there is a suspension in power. Press (cancel) to cancel the set up procedure, if you do not wish to save the password and password hint. page 6
  • 8. LOCKv100 Change Password : If there exist a password, before you make any changes, you will need to enter the current password. Enter the current password and new password of your choice; you may also edit the password hint at the same time. Tick the “Show Password” box, if you want to see what you are typing. Press (apply) to save changes to the password and password hint. You will see the following messages telling you that the password had been changed and device will be locked automatically when you remove it from the USB port or if there is a suspension in power. Press (cancel) to cancel the change password procedure, if you want to keep current password and password hint. page 7
  • 9. LOCKv100 E3. Disable Password Press the second button on the right to “Disable” (remove) the password. You will be prompted to enter your password. Press (cancel) to cancel, if you do not want remove your current password and password hint. You have six chances to enter the password correctly, before your device gets formatted. page 8
  • 10. LOCKv100 You will be reminded with the following message if you have typed in the wrong password for the fifth time. If you typed in the wrong password for the sixth time, your device gets formatted automatically. If you have forgotten your password, click on the password hint and see if it reminds you with your password. Enter the correct password and your password will be disabled (removed). page 9
  • 11. LOCKv100 E4. Unlock Device If you have setup a password, when you removed your device from USB port (or if there is a suspension in power), partition 1 of your device gets locked automatically. You will not be able to access this partition 1, nor read or write data to this partition 1. Press the third button on the right to “Unlock” the partition temporarily. page 10
  • 12. LOCKv100 You will be prompted to enter your password. Press do not want unlock partition 1. (cancel) to cancel, if you You have six chances to enter the password correctly, before your device gets formatted. You will be reminded with the following message if you have typed in the wrong password for the fifth time. page 11
  • 13. LOCKv100 If you typed in the wrong password for the sixth time, your device gets formatted automatically. If you have forgotten your password, click on the password hint and see if it reminds you with your password. Once you have entered the correct password, partition 1 will available temporarily until you remove your device from USB port or if there is a suspension in power. When partition 1 is unlocked, you can read or write data to the partition. page 12
  • 14. LOCKv100 E5. Configure Partition Sizes You can change the sizes of the two partitions (public and secure). Public Partition page 13
  • 15. LOCKv100 Press the middle button on the bottom of the LOCK application program to resize public and secure partition areas. You need to “Disable” you password first, before you can use this “Configure Size” (resizing) function, if you have already setup a password. Follow section E3 of this manual to disable your password. A warning message will show, telling you that data will be destroyed. If you have not yet backed up your data, press (cancel) to cancel the operation and back up your data first; otherwise, press (apply) to continue. page 14
  • 16. LOCKv100 Move the pointer to the left or right to change the size of the public and secure area. (minimum capacity can be set for public area is 2MB) Press (cancel) to cancel the operation if you do not want to change the current public and secure area; otherwise, press (apply) to continue. Formatting will then take place, please wait till the “Formatting Completed” message appear. After configuring (resizing & formatting) your USB device, please remember to remove from USB port and re-plug in again, before start using it again. page 15
  • 17. LOCKv100 You can see the change in capacity sizes of each partition. Before Configure Size After Configure Size NB : After configuring (resizing) is completed, all data will get erased, but the security application program will be restored in public area automatically. page 16
  • 18. LOCKv100 F. Checking the Security Application Program – LOCK’s Version In some situation it is necessary to know this information. Situation like whether you need to upgrade to newer version of the software or if you having trouble when using this software, and is seeking help from our technical staff, our technical staff may ask you which version you are using…etc. Simply press the top left hand button and the version will displayed. G. Running the Program As Privilege User ?! Some user may see this following screen. Check and make sure that you have plugged in your device and your Windows operating system did recognise your device. Otherwise, please check FAQ Q3 for more detail. page 17
  • 19. LOCKv100 H. FAQ – Frequently Asked Questions Q1 A1 My Windows 98 cannot detect my device, what can I do ? Make sure you have installed the latest device driver for your device. If you have already done so, but Windows still cannot detect your device, please try the following. (1) Go to "Safe Mode" => "Device Manager" (2) Remove any devices that's related to USB (3) Remove any "Unknown devices" (4) Remove any device which are not present (5) Remove any devices that's related to your device (6) Restart machine (7) Install driver if necessary (download latest driver from website) (8) Restart machine as requested and then plug in your device Q2 A2 My Windows ME / 2000 / XP cannot detect my device, what can I do ? Since there is no driver required for these operating systems, the device uses the built-in driver (USB Mass Storage Class Driver) from these operating systems. If your operating system cannot find the device, then it is very likely that the built-in driver files were missing or corrupted; please try to recover these files from other computer or from the original Windows operating system CD. NB : Windows 2000 users, please upgrade to service pack 3 or later. Q3 When I run the LOCK program, it displayed “Please insert the device or run this utility as privileged user” ? This problem may occur in Windows 2000 or Windows XP, under the following two situations. Situation 1 : You have forgotten to insert your device. Situation 2 : The security application program – LOCK requires some security privileges in these Windows operating systems. If you are not the administrator of the computer, these privileges may be restricted by administrator. Please check with your MIS or administrator of the computer to open up the privileges for you. (see following method) A3 When logged into the account affected, run GPEDIT.MSC from the run menu (If there is not enough access use the 'Run As' option). We now need to find the security policy "Devices: Allowed to eject removable NTFS media". It is located in Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policy >> Security Options. You need to change the access from "Administrators and Power Users" over to "Administrators and Inter Active Users". page 18