This drive’s small size won over our testers: “Its small profile allows it to stay plugged into a computer even when transporting it in a bag or case, which is not something most flash drives can claim,” one person said. Lifewire reviewers agree that the drive’s tiny footprint makes it much more likely to get lost, but they say its fast read speeds and convenient portability easily make up for that.
There are 2 ways; which one depends on how many USB ports you have. If you have 2, then put both flash drives in, open up in the file browser and move the information between the two drives in the file browser. If there is only one socket, put the first flash drive in and place the files to be transferred on the computer, then unlpug and put the next drive in. If you have no USB ports, you will need an adapter (Mac). You could also transfer files to the Cloud, then download them onto the other flash drive.
For computers set up to be bootable from a USB drive, it is possible to use a flash drive containing a bootable portable operating system to access the files of the computer, even if the computer is password protected. The password can then be changed, or it may be possible to crack the password with a password cracking program and gain full control over the computer. Encrypting files provides considerable protection against this type of attack.
Flash drives are often measured by the rate at which they transfer data. Transfer rates may be given in megabytes per second (MB/s), megabits per second (Mbit/s), or in optical drive multipliers such as "180X" (180 times 150 KiB/s).[19] File transfer rates vary considerably among devices. Second generation flash drives have claimed to read at up to 30 MB/s and write at about half that rate, which was about 20 times faster than the theoretical transfer rate achievable by the previous model, USB 1.1, which is limited to 12 Mbit/s (1.5 MB/s) with accounted overhead.[20] The effective transfer rate of a device is significantly affected by the data access pattern.[21]
Flash drives may present a significant security challenge for some organizations. Their small size and ease of use allows unsupervised visitors or employees to store and smuggle out confidential data with little chance of detection. Both corporate and public computers are vulnerable to attackers connecting a flash drive to a free USB port and using malicious software such as keyboard loggers or packet sniffers.
Some organizations forbid the use of flash drives, and some computers are configured to disable the mounting of USB mass storage devices by users other than administrators; others use third-party software to control USB usage. The use of software allows the administrator to not only provide a USB lock but also control the use of CD-RW, SD cards and other memory devices. This enables companies with policies forbidding the use of USB flash drives in the workplace to enforce these policies. In a lower-tech security solution, some organizations disconnect USB ports inside the computer or fill the USB sockets with epoxy.
Original flash memory designs had very limited estimated lifetimes. The failure mechanism for flash memory cells is analogous to a metal fatigue mode; the device fails by refusing to write new data to specific cells that have been subject to many read-write cycles over the device's lifetime. Premature failure of a "live USB" could be circumvented by using a flash drive with a write-lock switch as a WORM device, identical to a live CD. Originally, this potential failure mode limited the use of "live USB" system to special-purpose applications or temporary tasks, such as:
You can get USB 3.0 speed in a compact and durable metal USB drive from Kingston for under $10. It sports a capless design with a sturdy keyring, perfect for travel or as a part of your everyday carry. The design can even be customized to add your logo or company name. Read speeds top 100 Mb/s, while write speeds are on the slow end. With a five-year warranty, a great design, and a value price, this small drive makes a perfect addition to your keyring.
In addition to providing reliable storage for information, many of these products come with security software that protects your personal data if you lose your device. The software secures files with 128-bit AES encryption and requires a password to unlock the stored information. It also features a drag-and-drop user interface that simplifies transferring and securing your data.