
How to secure your Computer by using eToken. Authentication in Windows/Mac with BlueTooth device. Access your computer by biometric USB flash drive. Supported authentication means, security keys, cards and tokens. Software and Hardware Requirements for Rohos Logon Key. Secure 2-factor authentication for Remote Desktop login by OTP codes. Main Features of Rohos Logon Key application. Login Windows Seven by using a USB flash drive. Login Windows Remote Desktop in a secure way by USB key. Installing Rohos Logon Key, MSI command-line options. How two-factor authentication works in Rohos Logon Key. How to set up and use Rohos Logon Key Emergency Logon. Comparison matrix Rohos Logon Key licensing. Using electronic access keys in Rohos Disk. Rohos Disk Encryption and Rohos Mini Drive FAQ. Protect your Data by Steganography using Rohos Disk. How to access your encrypted partition on a guest PC in Windows 7. How does Rohos Disk differ from the similar disk encryption software?. How can I repair a Rohos Disk or Rohos Mini Drive. Comparison matrix Rohos Disk Encryption vs Rohos Mini Drive. How to set up USB flash drive for secure Windows or Mac OS login?. Click the OK button to confirm the chosen action. This can be another directory, USB flash drive, or virtual cipher disk made by the Rohos program Specify, if necessary, where the chosen files and directories are to be placed before destroying. Rohos Disk shredder window, where the chosen files list would be, will open. Right mouse button click on chosen files. Choose files you want to move or simply delete. In this way, you may fully destroy data presence by saving other data over it.įile-Shredder is installed with the Rohos program and integrated into the Windows Explorer Send-To menu.įile-Shredder allows not only to delete unnecessary files but to move files into wanted place (for example into another directory, into the outside hard drive, or into a USB drive) and to destroy information about deleted files.įile-shredder works in this way in Rohos Disk:
disk space it occupied earlier is filled with other data (random number sequence). This approach is implemented in programs called file-shredders. To delete a file reliably and be sure that nobody can recover it and get access to data you wanted to destroy forever, you need to use another approach.
After files were moved they are deleted by shredder without moving them to the basket.
In Rohos Disk ciphering program there is File-Shredder, which allows you to move files and directories to your secret Rohos disk.