How to require Startup Key Disk to start Windows 8 laptop?

mandril

How do I set up Windows 8 to require a “startup key disk” so that I can use a flash drive as a digital key to lock and prevent unauthorized use of my laptop?

Topic: Security
Answer this Question

Answers

1 total
lsmall
Vote Up (2)

For anyone unfamiliar with this, you can set up Windows 8 to store the key used to decrypt encrypted passwords on a USB flash drive. This requires anyone trying to log on to both know the password and have the flash drive with the encryption key. Without the drive, no one can sign in to your PC. If you do this, make sure to have a backup of the flash drive, because if you lose it, you are not going to be able to use your PC.

 

Here is a link to a guide on how to set it up. It should only take you a few minutes. http://www.sevenforums.com/tutorials/243846-syskey-create-usb-key-lock-unlock-windows.html

Ask a question

Join Now or Sign In to ask a question.
Dennis Technology Labs says it tested it because of marketing claims for it; Malwarebytes says free version of product is just a clean-up tool.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
New guidance from Microsoft researchers suggests that users re-use simple passwords and avoid password management services.
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a post by a forensics scientist, iOS author and ex-hacker.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+