Flash drives are also cost-effective. You can securely store a few dozen gigabytes of data for less than $30, and these devices range in storage capacity, price and overall size - equal to the amount you're willing to invest. Some even have special features like lanyards, locks, belt clips and key fobs to make them easier to carry and keep track of.
“The Samsung BAR is incredibly small and easily portable, measuring just under 2-inches long,” our tester said. He added, “It's also extremely durable: waterproof, shockproof, as well as x-rays and magnets [proof].” The included key ring adds to its portability, according to our reviewer. On the flip side, he called the transfer speeds “decent but mostly unremarkable.” Our tester concluded, “Most of the BAR's problems are due to Samsung releasing a newer, cheaper model, the BAR Plus.”
In the arcade game In the Groove and more commonly In The Groove 2, flash drives are used to transfer high scores, screenshots, dance edits, and combos throughout sessions. As of software revision 21 (R21), players can also store custom songs and play them on any machine on which this feature is enabled. While use of flash drives is common, the drive must be Linux compatible.
USB flash drives use the USB mass storage device class standard, supported natively by modern operating systems such as Windows, Linux, macOS and other Unix-like systems, as well as many BIOS boot ROMs. USB drives with USB 2.0 support can store more data and transfer faster than much larger optical disc drives like CD-RW or DVD-RW drives and can be read by many other systems such as the Xbox One, PlayStation 4, DVD players, automobile entertainment systems, and in a number of handheld devices such as smartphones and tablet computers, though the electronically similar SD card is better suited for those devices.
As of 2011, newer flash memory designs have much higher estimated lifetimes. Several manufacturers are now offering warranties of 5 years or more. Such warranties should make the device more attractive for more applications. By reducing the probability of the device's premature failure, flash memory devices can now be considered for use where a magnetic disk would normally have been required. Flash drives have also experienced an exponential growth in their storage capacity over time (following the Moore's Law growth curve). As of 2013, single-packaged devices with capacities of 1 TB are readily available,[54] and devices with 16 GB capacity are very economical. Storage capacities in this range have traditionally been considered to offer adequate space, because they allow enough space for both the operating system software and some free space for the user's data.
A minority of flash drives support biometric fingerprinting to confirm the user's identity. As of mid-2005,[needs update] this was an expensive alternative to standard password protection offered on many new USB flash storage devices. Most fingerprint scanning drives rely upon the host operating system to validate the fingerprint via a software driver, often restricting the drive to Microsoft Windows computers. However, there are USB drives with fingerprint scanners which use controllers that allow access to protected data without any authentication.[70]
A recent development for the use of a USB Flash Drive as an application carrier is to carry the Computer Online Forensic Evidence Extractor (COFEE) application developed by Microsoft. COFEE is a set of applications designed to search for and extract digital evidence on computers confiscated from suspects.[48] Forensic software is required not to alter, in any way, the information stored on the computer being examined. Other forensic suites run from CD-ROM or DVD-ROM, but cannot store data on the media they are run from (although they can write to other attached devices, such as external drives or memory sticks).
Flash drives may present a significant security challenge for some organizations. Their small size and ease of use allows unsupervised visitors or employees to store and smuggle out confidential data with little chance of detection. Both corporate and public computers are vulnerable to attackers connecting a flash drive to a free USB port and using malicious software such as keyboard loggers or packet sniffers.
Flash drives can be defragmented. There is a widespread opinion that defragmenting brings little advantage (as there is no mechanical head that moves from fragment to fragment), and that defragmenting shortens the life of the drive by making many unnecessary writes.[37] However, some sources claim[38] that defragmenting a flash drive can improve performance (mostly due to improved caching of the clustered data), and the additional wear on flash drives may not be significant.
Some organizations forbid the use of flash drives, and some computers are configured to disable the mounting of USB mass storage devices by users other than administrators; others use third-party software to control USB usage. The use of software allows the administrator to not only provide a USB lock but also control the use of CD-RW, SD cards and other memory devices. This enables companies with policies forbidding the use of USB flash drives in the workplace to enforce these policies. In a lower-tech security solution, some organizations disconnect USB ports inside the computer or fill the USB sockets with epoxy.
Yes you can but if you have a lot of files, a flash drive won't back it all up. If you only need to back up 32GB-64GB for example, you could back it up on the flash drive. However, anything bigger isn't sensible for flash drives; you're better off getting an external hard drive. Also, it's not a long-term storage option––it can corrupt easily or be lost.
Some organizations forbid the use of flash drives, and some computers are configured to disable the mounting of USB mass storage devices by users other than administrators; others use third-party software to control USB usage. The use of software allows the administrator to not only provide a USB lock but also control the use of CD-RW, SD cards and other memory devices. This enables companies with policies forbidding the use of USB flash drives in the workplace to enforce these policies. In a lower-tech security solution, some organizations disconnect USB ports inside the computer or fill the USB sockets with epoxy.
A drawback to the small size of flash drives is that they are easily misplaced or otherwise lost. This is a particular problem if they contain sensitive data (see data security). As a consequence, some manufacturers have added encryption hardware to their drives, although software encryption systems which can be used in conjunction with any mass storage medium will achieve the same result. Most drives can be attached to keychains or lanyards. The USB plug is usually retractable or fitted with a removable protective cap.
External flash drives use what's known as "solid-state" storage, which can store, back up, and retrieve data using only electronic circuits. Solid-state drives do not contain any moving mechanical parts, which enables them to access data quickly and easy. A typical flash drive allows up to 100,000 write/erase cycles before the integrity of the data starts to degrade. This translates to around a 10-year lifespan, depending on how much it is used.
This USB 3.0 drive offers what the company is calling business-grade security with 256-bit AES hardware-based encryption. You can also choose a stepped up “managed” version that offers a more complete set of management tools using SafeConsole as support. Finally, there’s an anti-virus version that loads in ESET antivirus software out of the box to avoid trojan horses and other hacker tracking programs. All of the models are TAA-compliant, so this drive won’t be in breach of government regulations, and that USB 3.0 means that you’ll have nearly the fastest transfer speeds possible. You can pick it up in sizes ranging from 4GB to 64GB.
Some manufacturers deploy physical authentication tokens in the form of a flash drive. These are used to control access to a sensitive system by containing encryption keys or, more commonly, communicating with security software on the target machine. The system is designed so the target machine will not operate except when the flash drive device is plugged into it. Some of these "PC lock" devices also function as normal flash drives when plugged into other machines.
Digital audio files can be transported from one computer to another like any other file, and played on a compatible media player (with caveats for DRM-locked files). In addition, many home Hi-Fi and car stereo head units are now equipped with a USB port. This allows a USB flash drive containing media files in a variety of formats to be played directly on devices which support the format. Some LCD monitors for consumer HDTV viewing have a dedicated USB port through which music and video files can also be played without use of a personal computer.
Flash drives are often measured by the rate at which they transfer data. Transfer rates may be given in megabytes per second (MB/s), megabits per second (Mbit/s), or in optical drive multipliers such as "180X" (180 times 150 KiB/s).[19] File transfer rates vary considerably among devices. Second generation flash drives have claimed to read at up to 30 MB/s and write at about half that rate, which was about 20 times faster than the theoretical transfer rate achievable by the previous model, USB 1.1, which is limited to 12 Mbit/s (1.5 MB/s) with accounted overhead.[20] The effective transfer rate of a device is significantly affected by the data access pattern.[21]
Most USB flash drives weigh less than 30 g (1 oz).[31] While some manufacturers are competing for the smallest size[32] with the biggest memory,[33] some manufacturers differentiate their products by using elaborate housings, which are often bulky and make the drive difficult to connect to the USB port. Because the USB port connectors on a computer housing are often closely spaced, plugging a flash drive into a USB port may block an adjacent port. Such devices may carry the USB logo only if sold with a separate extension cable. Such cables are USB-compatible but do not conform to the USB standard.[34][35]
Flash drives implement the USB mass storage device class so that most modern operating systems can read and write to them without installing device drivers. The flash drives present a simple block-structured logical unit to the host operating system, hiding the individual complex implementation details of the various underlying flash memory devices. The operating system can use any file system or block addressing scheme. Some computers can boot up from flash drives.
As highly portable media, USB flash drives are easily lost or stolen. All USB flash drives can have their contents encrypted using third-party disk encryption software, which can often be run directly from the USB drive without installation (for example, FreeOTFE), although some, such as BitLocker, require the user to have administrative rights on every computer it is run on.
Some organizations forbid the use of flash drives, and some computers are configured to disable the mounting of USB mass storage devices by users other than administrators; others use third-party software to control USB usage. The use of software allows the administrator to not only provide a USB lock but also control the use of CD-RW, SD cards and other memory devices. This enables companies with policies forbidding the use of USB flash drives in the workplace to enforce these policies. In a lower-tech security solution, some organizations disconnect USB ports inside the computer or fill the USB sockets with epoxy.
Modern devices are thinner and lighter, and the Type-C connector is a plug format designed to work with these products. In addition to being smaller than a standard USB plug, Type-C connectors are reversible, so they're easier to use. Some USB flash drives include both a traditional plug and a Type-C connector. These products are ideal for transferring files between computers and portable devices such as smartphones or tablets.