| Back to logs list
Reprinted from alumni of the user at 16:18 on December 12 2010 read (loading. ..) Comments (0) Category: Personal Diary
Software name:
USBoot Software size:
595KB Software License:
Free Download:
Click here to download
transformation steps:
1. insert U disk, start USBoot software, in the main interface, select the U disk icon, shown in Figure 1.
2. Click on \
】 【Tips for U disk, we usually can choose to \But, the compatibility of both of them slightly different, such as some motherboards will support the \Therefore, if produced in a particular mode, U disk can not start the system, may switch to another mode can be easily solved.
3. Finally, the instructions step by step according to USBoot to do so,
belstaff uk, then the U disk can directly boot to pure DOS environment, and in Figure 3.
Second, the U disk transformation as a \When people go out after something happens to people's computers went rummaging. If the computer is stored in some of the information is pretty popular does not matter, can be stored in case these are confidential documents or personal privacy, then it is hard to avoid the possibility of a leak. In fact, can be in the hands of the U disk transformation as a \Only when the U disk inserted, the computer to work properly, but if something happens to go out, just unplug the U disk, Windows will automatically lock the computer.
Software Name:
U disk file management software specialist Size:
2.56MB software license:
Share Download:
Click here to download
transformation steps:
1. Start \.
2. Then, in the dialog box to set an administrative password,
belstaff online, complete the \
3. Right-click the task bar at the \
4. Then, lock the computer is set to end the longest time \
】 【tips here, first explain the meaning of lock expiration time. When starting the \So,
belstaff jacket, that is, I choose \However,
belstaff jackets outlet, chose \It was at the \it even more convenient.
5. At this point, if you unplug the U disk, then the computer will immediately enter the locked state. Moreover, even if the forced reboot, lock will automatically run, security is quite good,
belstaff sale, is shown in Figure 6 when the computer goes into lock screen (full screen).
third, U disk transformed into \. It should be said, these products require a higher data security for business people is still very appropriate. But often this function for a raise, prices will not be too let the \In fact, encryption is not just their these \
Software Name:
U U disk encryption software Software Easy Size:
772KB Software License:
Free Download:
Click here to download
transformation steps:
1. First, the \
2. Then, according to the figure identified by sequence start encryption, and click the \
4. Finally, set up password encryption area, U disk encryption is completed. At this time, the Encryption Wizard's main interface, click the \But this time, encrypted area icon will also appear in my computer, shown in Figure 8.
5. Because of this new division of the district to fully support encryption of the copy and delete files, but also in the operation of customary and common U disk without any distinction, it is very easy to get started . When clicked on the \Next time, if a wizard starts encryption software, and enter the correct password is good, encrypted area of the document now before the convention right again.
】 【tips when using the encrypted partition function, remember do not directly plug on the U disk, because this operation is very likely to cause loss of data encryption area.
Four, U disk transformation as a \cabinet? \No matter where you go, as long as the U disk into the computer, can easily read your messages and documents. Moreover, since all operations on all the running in the U disk, so then it will not disconnect the host PC leaving no trace, back to the office can synchronize data with your computer. In fact, these ideas are not difficult to achieve, in a program, called \
Software Name:
U disk file management software specialist Size:
2.56MB software license:
Share Download:
Click here to download
transformation steps: (due to the installation of the software has been described above, this section will be skipped)
1. the computer data synchronization
U disk to your computer data will be synchronized to the U disk, is actually very simple. As long as the \Finally, click \
2. in the use of other computer
U disk U disk synchronization can be done on other computers to easily use. Double-click the disk as long as U \Click the button above, can directly activate the corresponding function, such as the following figure is click on the \
3. will be copied to the U disk data synchronization back to the computer
course, since the work thing, and will definitely generate a lot of the U drive a new file, and Back at the office, the first is to dry the new file will be copied back to the computer. In fact,
belstaff leather, the same is to use just introduced the \Step 1 of the whole operation and consistent, so this will not go, as long as we remember the \
V, U disk will be transformed into \It is after all only on paper work, in other people's computers in order to use some of their specific program, I am afraid have to ask another \
Software Name:
Ceedo Software size:
2.03MB software license:
Share Download:
Click here to download
transformation steps:
1. Double-click the installation file to install the Ceedo software, U disk. Thus, after insertion as long as a U disk, Ceedo began to run automatically, as shown in Figure 12.
2. in the Ceedo software above is very easy to install, just click \Then, according to the above prompt, select the right software can install it step by step on the Ceedo, shown in Figure 13.
】 【tips available on the Ceedo website most streamlined version of the English software, does not comply with usage. In fact, U-disk as long as you have enough free space, the majority of desktop computer programs can also be installed in Ceedo. Only, the installation program must be in the running Ceedo own Explorer to be shown in Figure 14.
3. and the standard Windows as the software can be installed directly in the \15 below.
4. As for the removal process is very simple, because with the \The delete operation is relatively simple because, in this paper will not repeat them.
written in the last
how? U did not think you still have these multi-disc play it. In fact, given the limited length of the article, a lot of small features not had time to introduce it. Interested parties may wish to search for a search and then to online again, I hope you can once again the \