CRU Dataport TTS-Q Manual do utilizador - Página 10
Procurar online ou descarregar pdf Manual do utilizador para Invólucro CRU Dataport TTS-Q. CRU Dataport TTS-Q 12 páginas. Hard drive enclosure
CRU
5.2.3 Mounting and ejecting volumes
If the hard drive attached to the ToughTech is already formatted, you can begin using the volume right away. When
the ToughTech is properly connected and turned on, a window may open to allow you access to the volume. If no
window appears, you can find the volume by double-clicking the "My Computer" icon.
Eject the ToughTech before powering it down by single-clicking the green arrow icon on the
task bar, then selecting "Safely remove...." Windows will indicate when it is safe to
disconnect the ToughTech. Disconnecting the unit without first ejecting it can result in
data loss.
5.2.4 Booting from your ToughTech
Some PC motherboards support booting from an external device. To activate this feature, you will need to adjust the
motherboard's BIOS settings. Check with your motherboard's manufacturer or owner's manual for details.
6. Encryption FAQs
Q:
What do I do if I lose a key?
A:
If the privacy of your data is not a concern, you can continue using your product with your remaining
keys. But then, if data privacy were not important, you probably wouldn't own the Secure version of the
product. If you can't account for all your keys, your data is not 100% secure. Anyone who finds a key will
be able to access your data. Therefore, we recommend that you purchase a new set of programmed
keys.
Q:
What would happen if I were to plug the key into the USB port on the rear of ToughTech?
A:
Do not plug the encryption key into any mini-USB port, including the one on the rear of ToughTech
Secure! Although the key will fit in such a slot, they are not electrically compatible. You could damage
both the port and the key, rendering the key useless and your data inaccessible.
Q:
How do I use a new (or different) key with my Secure product?
A:
First, you'll need to back up all your data. Access the data using your old key, and then copy
everything you wish to save to a different drive. Next, insert the new programmed key and cycle power
on the product. The drive will appear to the computer as an unformatted drive. If you proceed to format
the drive, it will be usable again, but only when the new key is used. You can now transfer your data
back to the Secure product.
Q:
Does your company keep records of the keys you create and ship with products?
A:
No, we do not keep any records of the random secret electronic key codes stored on the security
keys. The codes are composed of randomly generated 128 or 256-bit numbers which are never stored
anywhere except on the security keys themselves.
Q:
What do I do if I lose all the keys? Can I retrieve my data? Can you retrieve my data for me?
A:
Loss of all keys will make it virtually impossible to recover your data, even for professional data
recovery services. The only way to retrieve any data would be to crack the encryption. With AES 128
and 256, that would take a super computer many years to accomplish. There is no "back door" on our
encryption products. It is therefore very important that you manage your keys carefully. It is a good idea
to keep one key with you, a backup key in a safe location, and another backup in a location off site.
U s e r M a n u a l f o r T T - Q , T T S - Q ( A9 - 0 0 0 - 0 0 0 1 r e v 1 . 5 )
(Windows XP)
- 10 -