Some organizations forbid the use of flash drives, and some computers are configured to disable the mounting of USB mass storage devices by users other than administrators; others use third-party software to control USB usage. The use of software allows the administrator to not only provide a USB lock but also control the use of CD-RW, SD cards and other memory devices. This enables companies with policies forbidding the use of USB flash drives in the workplace to enforce these policies. In a lower-tech security solution, some organizations disconnect USB ports inside the computer or fill the USB sockets with epoxy.
Most USB flash drives do not include a write protection mechanism. This feature, which gradually became less common, consists of a switch on the housing of the drive itself, that prevents the host computer from writing or modifying data on the drive. For example, write protection makes a device suitable for repairing virus-contaminated host computers without the risk of infecting a USB flash drive itself. In contrast to SD cards, write protection on USB flash drives (when available) is connected to the drive circuitry, and is handled by the drive itself instead of the host (on SD cards handling of the write-protection notch is optional).
On the more practical side our flash drives, also called thumbdrives or memory sticks are available in memory capacities from 64MB to 256GB. With memory capacities like that, we certainly have the options to cover whatever your data storage requirements may be. For more information on data storage capacities, check out our USB Flash Drive Capacity Guide.
Floppy disk drives are rarely fitted to modern computers and are obsolete for normal purposes, although internal and external drives can be fitted if required. Floppy disks may be the method of choice for transferring data to and from very old computers without USB or booting from floppy disks, and so they are sometimes used to change the firmware on, for example, BIOS chips. Devices with removable storage like older Yamaha music keyboards are also dependent on floppy disks, which require computers to process them. Newer devices are built with USB flash drive support.
A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected inside a plastic, metal, or rubberized case, which can be carried in a pocket or on a key chain, for example. The USB connector may be protected by a removable cap or by retracting into the body of the drive, although it is not likely to be damaged if unprotected. Most flash drives use a standard type-A USB connection allowing connection with a port on a personal computer, but drives for other interfaces also exist. USB flash drives draw power from the computer via the USB connection. Some devices combine the functionality of a portable media player with USB flash storage; they require a battery only when used to play music on the go.
Counterfeit USB flash drives are sometimes sold with claims of having higher capacities than they actually have. These are typically low capacity USB drives which are modified so that they emulate larger capacity drives (for example, a 2 GB drive being marketed as a 64 GB drive). When plugged into a computer, they report themselves as being the larger capacity they were sold as, but when data is written to them, either the write fails, the drive freezes up, or it overwrites existing data. Software tools exist to check and detect fake USB drives,[43][44] and in some cases it is possible to repair these devices to remove the false capacity information and use its real storage limit.[45]
Counterfeit USB flash drives are sometimes sold with claims of having higher capacities than they actually have. These are typically low capacity USB drives which are modified so that they emulate larger capacity drives (for example, a 2 GB drive being marketed as a 64 GB drive). When plugged into a computer, they report themselves as being the larger capacity they were sold as, but when data is written to them, either the write fails, the drive freezes up, or it overwrites existing data. Software tools exist to check and detect fake USB drives,[43][44] and in some cases it is possible to repair these devices to remove the false capacity information and use its real storage limit.[45]
"Helps transfer data without bulky external drives....Compared to the Ultra Flash Drives I purchased (which are designed for faster downloads), this Flash Drive took just a little bit longer for downloading a large quantity of items, but it really was not that much of a time difference, so I am extremely satisfied with the speed and abilities of the Cruzer"
USB flash drives are often used for storage, data back-up and transfer of computer files. Compared with floppy disks or CDs, they are smaller, faster, have significantly more capacity, and are more durable due to a lack of moving parts. Additionally, they are immune to electromagnetic interference (unlike floppy disks), and are unharmed by surface scratches (unlike CDs). Until about 2005, most desktop and laptop computers were supplied with floppy disk drives in addition to USB ports, but floppy disk drives became obsolete after widespread adoption of USB ports and the larger USB drive capacity compared to the 1.44 MB 3.5-inch floppy disk.
Some file systems are designed to distribute usage over an entire memory device without concentrating usage on any part (e.g., for a directory) to prolong the life of simple flash memory devices. Some USB flash drives have this 'wear leveling' feature built into the software controller to prolong device life, while others do not, so it is not necessarily helpful to install one of these file systems.[39]
USB flash drives have been integrated into other commonly carried items, such as watches, pens, and even the Swiss Army Knife; others have been fitted with novelty cases such as toy cars or Lego bricks. USB flash drives with images of dragons, cats or aliens are very popular in Asia.[36] The small size, robustness and cheapness of USB flash drives make them an increasingly popular peripheral for case modding.
Some file systems are designed to distribute usage over an entire memory device without concentrating usage on any part (e.g., for a directory) to prolong the life of simple flash memory devices. Some USB flash drives have this 'wear leveling' feature built into the software controller to prolong device life, while others do not, so it is not necessarily helpful to install one of these file systems.[39]
"Helps transfer data without bulky external drives....Compared to the Ultra Flash Drives I purchased (which are designed for faster downloads), this Flash Drive took just a little bit longer for downloading a large quantity of items, but it really was not that much of a time difference, so I am extremely satisfied with the speed and abilities of the Cruzer"
Some manufacturers deploy physical authentication tokens in the form of a flash drive. These are used to control access to a sensitive system by containing encryption keys or, more commonly, communicating with security software on the target machine. The system is designed so the target machine will not operate except when the flash drive device is plugged into it. Some of these "PC lock" devices also function as normal flash drives when plugged into other machines.
USB flash drives usually specify their read and write speeds in megabytes per second (MB/s); read speed is usually faster. These speeds are for optimal conditions; real-world speeds are usually slower. In particular, circumstances that often lead to speeds much lower than advertised are transfer (particularly writing) of many small files rather than a few very large ones, and mixed reading and writing to the same device.
Flash drives may present a significant security challenge for some organizations. Their small size and ease of use allows unsupervised visitors or employees to store and smuggle out confidential data with little chance of detection. Both corporate and public computers are vulnerable to attackers connecting a flash drive to a free USB port and using malicious software such as keyboard loggers or packet sniffers.
As of 2011, newer flash memory designs have much higher estimated lifetimes. Several manufacturers are now offering warranties of 5 years or more. Such warranties should make the device more attractive for more applications. By reducing the probability of the device's premature failure, flash memory devices can now be considered for use where a magnetic disk would normally have been required. Flash drives have also experienced an exponential growth in their storage capacity over time (following the Moore's Law growth curve). As of 2013, single-packaged devices with capacities of 1 TB are readily available,[54] and devices with 16 GB capacity are very economical. Storage capacities in this range have traditionally been considered to offer adequate space, because they allow enough space for both the operating system software and some free space for the user's data.
A recent development for the use of a USB Flash Drive as an application carrier is to carry the Computer Online Forensic Evidence Extractor (COFEE) application developed by Microsoft. COFEE is a set of applications designed to search for and extract digital evidence on computers confiscated from suspects.[48] Forensic software is required not to alter, in any way, the information stored on the computer being examined. Other forensic suites run from CD-ROM or DVD-ROM, but cannot store data on the media they are run from (although they can write to other attached devices, such as external drives or memory sticks).

"Nice device for bulky files....I have 2 of these flash drives and it's more convenient for me to store backups of my most important files on 2 of these flash drives than an external drive because it's easier for me to transfer my data files between 3 devices, carry the drive around in my pocket, and the transfers are easy and fast since it's USB 3.0"
A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected inside a plastic, metal, or rubberized case, which can be carried in a pocket or on a key chain, for example. The USB connector may be protected by a removable cap or by retracting into the body of the drive, although it is not likely to be damaged if unprotected. Most flash drives use a standard type-A USB connection allowing connection with a port on a personal computer, but drives for other interfaces also exist. USB flash drives draw power from the computer via the USB connection. Some devices combine the functionality of a portable media player with USB flash storage; they require a battery only when used to play music on the go.
For computers set up to be bootable from a USB drive, it is possible to use a flash drive containing a bootable portable operating system to access the files of the computer, even if the computer is password protected. The password can then be changed, or it may be possible to crack the password with a password cracking program and gain full control over the computer. Encrypting files provides considerable protection against this type of attack.

High-security flash drives aren’t exactly a new concept. For as long as companies have been transferring confidential info via USB drives, there’s been a concern of keeping that info confidential. While you might be swayed by flashy gimmicks like fingerprint sensors and password keypads, these end up being too expensive and not overly powerful (with a few exceptions of course). But that’s why our security pick goes to the Kingston Data Traveler Vault.


Lexar is attempting to introduce a USB FlashCard, which would be a compact USB flash drive intended to replace various kinds of flash memory cards. Pretec introduced a similar card, which also plugs into any USB port, but is just one quarter the thickness of the Lexar model.[85] Until 2008, SanDisk manufactured a product called SD Plus, which was a SecureDigital card with a USB connector.[86]
Many people rely exclusively on the cloud for storing their data; it’s convenient and you can get a lot of storage for free. While storing data online certainly has its advantages, it also has serious drawbacks. The most obvious is security. Anything that is kept online is susceptible to security breaches, and news stories about many of the largest corporations suffering hacks only confirms that our online lives are not as safe as we may like.
×