SlideShare a Scribd company logo
1 of 7
Download to read offline
Rohos Mini Drive is a FREE USB flash drive encryption application that creates hidden and protected
partition and password protects data on any removable storage device. This portable encryption tool
offers “on-the-fly” encryption even in traveler mode. The installation requires administrative rights.

Set up USB key
          After installation of Rohos Mini Drive, insert your USB pen drive to the computer and run the
           Rohos Mini Drive application.




screen shot 1
          Click on “Setup USB Key”
          The program automatically determines the best options for Rohos disk for your system. It will
           create a partition namely G: with 499 Mb space. You can customize the partition size, disk letter
           and file system by clicking [Change…].




screen shot 2

© Tesline-Service S.R.L. All rights reserved. 2010                                                         1
screen shot 3

Remember Rohos Mini encrypted disk size limit is 2 GB. Also file system may be changed. By default,
Rohos Mini creates disk in NTFS but it may be changed to FAT/FAT32.

          After all disk settings are adjusted you may insert a password to Rohos disk and click on “Create
           disk”.




screen shot 4
It should take a few seconds to create an encrypted volume on your USB device.




screen shot 5




© Tesline-Service S.R.L. All rights reserved. 2010                                                         2
After the process of creating Rohos disk is completed you’ll see your disk details on Rohos Mini main
window.




screen shot 6
Portable Application allows working with a password protected partition on any PC, you just click on
“Rohos Mini” icon on the USB flash drive root folder




screen shot 7

© Tesline-Service S.R.L. All rights reserved. 2010                                                      3
and enter disk password.




screen shot 8

Virtual Keyboard will help you to protect your encrypted disk password from a key-logger.




screen shot 9




© Tesline-Service S.R.L. All rights reserved. 2010                                          4
Now your Rohos disk is accessible from Windows Explorer. And double-clicking on it you have access
to your encrypted files to edit and save files, listen to music and look through your pictures.




screen shot 10


After you finished working with your encrypted files you may disconnect Rohos disk using Rohos icon
in the system tray.




screen shot 11




© Tesline-Service S.R.L. All rights reserved. 2010                                                    5
Access your portable partition on a PC without Admin rights
On a computer without administrative rights Rohos Disk Browser will automatically be launched and
you will be able to work with your encrypted partition, which is seen as Windows Explorer.




screen shot 12


You can run any application and work with your hidden volume as usual (open, copy, edit, etc. files).




.
screen shot 13




© Tesline-Service S.R.L. All rights reserved. 2010                                                      6
Rohos Disk Browser utility uses “on the fly” encryption principle, thus the program doesn’t save
    files in temporary folder and doesn’t leave unencrypted data on a PC or unprotected part of USB
    flash drive. When you open a file such as MS Word document, MS Word application will read and
    write changes to the file using Rohos Disk Browser. When you run the program, the *. exe will be
    decrypted and run in the program memory.




© Tesline-Service S.R.L. All rights reserved. 2010                                                      7

More Related Content

Similar to Rohos Mini Drive Tutorial

8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systemsHuma Tariq
 
Secure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon KeySecure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon KeySunnja
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryptionCliford John Reandino
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11Muhammad Arsalan
 
Windows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha ShahWindows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha ShahShraddha055
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XPRohan Bhatkar
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptxViaatMunir
 
5 utilities of windows 10
5 utilities of windows 105 utilities of windows 10
5 utilities of windows 10namansaini11
 
System software 1ppt(udated)
System software 1ppt(udated)System software 1ppt(udated)
System software 1ppt(udated)uraj007
 
Open Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsOpen Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsJoshua Smith
 
3uTools Crack 2022
3uTools Crack 20223uTools Crack 2022
3uTools Crack 2022AlfredJarves
 
ANDROID ROOTING
ANDROID ROOTINGANDROID ROOTING
ANDROID ROOTINGVishal Ash
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 

Similar to Rohos Mini Drive Tutorial (20)

8 NOT-So known operating systems
8 NOT-So known operating systems8 NOT-So known operating systems
8 NOT-So known operating systems
 
Secure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon KeySecure Windows logon with Rohos Logon Key
Secure Windows logon with Rohos Logon Key
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryption
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11
 
Windows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha ShahWindows 7 New Features By Shraddha Shah
Windows 7 New Features By Shraddha Shah
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
5 utilities of windows 10
5 utilities of windows 105 utilities of windows 10
5 utilities of windows 10
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Portable OS & Portable Application
Portable OS & Portable ApplicationPortable OS & Portable Application
Portable OS & Portable Application
 
Deft v7
Deft v7Deft v7
Deft v7
 
System software 1ppt(udated)
System software 1ppt(udated)System software 1ppt(udated)
System software 1ppt(udated)
 
Open Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystemsOpen Source: The Lifeblood of iXsystems
Open Source: The Lifeblood of iXsystems
 
3uTools Crack 2022
3uTools Crack 20223uTools Crack 2022
3uTools Crack 2022
 
ANDROID ROOTING
ANDROID ROOTINGANDROID ROOTING
ANDROID ROOTING
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Operating system Tutorial.
Operating system Tutorial.Operating system Tutorial.
Operating system Tutorial.
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Open_suse
Open_suseOpen_suse
Open_suse
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Rohos Mini Drive Tutorial

  • 1. Rohos Mini Drive is a FREE USB flash drive encryption application that creates hidden and protected partition and password protects data on any removable storage device. This portable encryption tool offers “on-the-fly” encryption even in traveler mode. The installation requires administrative rights. Set up USB key  After installation of Rohos Mini Drive, insert your USB pen drive to the computer and run the Rohos Mini Drive application. screen shot 1  Click on “Setup USB Key”  The program automatically determines the best options for Rohos disk for your system. It will create a partition namely G: with 499 Mb space. You can customize the partition size, disk letter and file system by clicking [Change…]. screen shot 2 © Tesline-Service S.R.L. All rights reserved. 2010 1
  • 2. screen shot 3 Remember Rohos Mini encrypted disk size limit is 2 GB. Also file system may be changed. By default, Rohos Mini creates disk in NTFS but it may be changed to FAT/FAT32.  After all disk settings are adjusted you may insert a password to Rohos disk and click on “Create disk”. screen shot 4 It should take a few seconds to create an encrypted volume on your USB device. screen shot 5 © Tesline-Service S.R.L. All rights reserved. 2010 2
  • 3. After the process of creating Rohos disk is completed you’ll see your disk details on Rohos Mini main window. screen shot 6 Portable Application allows working with a password protected partition on any PC, you just click on “Rohos Mini” icon on the USB flash drive root folder screen shot 7 © Tesline-Service S.R.L. All rights reserved. 2010 3
  • 4. and enter disk password. screen shot 8 Virtual Keyboard will help you to protect your encrypted disk password from a key-logger. screen shot 9 © Tesline-Service S.R.L. All rights reserved. 2010 4
  • 5. Now your Rohos disk is accessible from Windows Explorer. And double-clicking on it you have access to your encrypted files to edit and save files, listen to music and look through your pictures. screen shot 10 After you finished working with your encrypted files you may disconnect Rohos disk using Rohos icon in the system tray. screen shot 11 © Tesline-Service S.R.L. All rights reserved. 2010 5
  • 6. Access your portable partition on a PC without Admin rights On a computer without administrative rights Rohos Disk Browser will automatically be launched and you will be able to work with your encrypted partition, which is seen as Windows Explorer. screen shot 12 You can run any application and work with your hidden volume as usual (open, copy, edit, etc. files). . screen shot 13 © Tesline-Service S.R.L. All rights reserved. 2010 6
  • 7. Rohos Disk Browser utility uses “on the fly” encryption principle, thus the program doesn’t save files in temporary folder and doesn’t leave unencrypted data on a PC or unprotected part of USB flash drive. When you open a file such as MS Word document, MS Word application will read and write changes to the file using Rohos Disk Browser. When you run the program, the *. exe will be decrypted and run in the program memory. © Tesline-Service S.R.L. All rights reserved. 2010 7