1 GoGo Key ™ Designed & created by Strong Bear, LLC.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Computer As Personal Storage. Mass Storage We are people who have massive amounts of things to store. We need more room, more closets, more garages, more.
Windows Basics An Introduction to the Windows Operating System.
Click on the Tools and Help button to bring up Tools and Help.
HOW TO IMPORT AND EXPORT DATA. Why do I need to use Export/Import? Here are some examples: If you have a laptop that you take home (or have a home version.
Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Microsoft Office Illustrated Brief File Management Understanding.
Hard Drive Information Module Hard Drive Information Module.
With Microsoft Office 2007 Introductory© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Office 2007 Introductory.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
The sequence of folders to a file or folder is called a(n) ________.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
WinZip Basics Chris Comito Marybeth MacLean Jameelah Roberts Matt Smith.
Source XP vs Windows 7 XPWin 7.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
COMPREHENSIVE Windows Tutorial 2 Organizing Your Files.
Operating Systems Day 3. Changing Date & Time 1.Double click on digital clock on the notification area of a task bar (Click start button, Click control.
Windows Tutorial 9 Maintaining Hardware and Software
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Microsoft Office Illustrated Fundamentals Unit B: Understanding File Management.
TRUECRYPT.
Chapter 7 Working with Files.
Tutorial 11 Installing, Updating, and Configuring Software
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Hands-On Virtual Computing
Teach Yourself Windows 98 Module 2: Working with Files, Folders, and the Desktop.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Windows Management Computer Literacy 1 Transition Plus Services.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
FIRST COURSE Managing Your Files. XP New Perspectives on Microsoft Office 2007: Windows XP Edition2 Objectives Develop file management strategies Explore.
WINDOWS Part 1 – Start Up Basics
Unit R005: Understanding Computer Systems Introduction System Software Software (i.e., programs) used to control the hardware directly Used to run the.
Microsoft Office 2008 for Mac – Illustrated Unit C: Understanding File Management.
Working with Windows 2000 What it is: The system inside your computer that enables it to run software Uses icons (pictures) to access and work within programs.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Configuring Data Protection Chapter 12 powered by dj.
XP New Perspectives on Windows 2000 Professional Windows 2000 Tutorial 2 1 Microsoft Windows 2000 Professional Tutorial 2 – Working With Files.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Practical PC, 7 th Edition Chapter 4: File Basics.
Lesson No: 6 Introduction to Windows XP CHBT-01 Basic Micro process & Computer Operation.
Microsoft Office XP Illustrated Introductory, Enhanced with Programs, Files, and Folders Working.
Understanding Backup and Recovery Methods Lesson 8.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
FIRST COURSE Managing Your Files. XP Objectives Develop file management strategies Explore files and folders Create, name, copy, move, and delete folders.
®® Microsoft Windows 7 Windows Tutorial 2 Organizing Your Files.
Page 1 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
File and File Systems Compiled by IITG Team Need to be reorganized and reworded.
Photo Recovery How to Get Back your Lost Photos Easily?
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
WINDOWS Part 2 – File Management. File Management Files - Electronic collections of data that you create and save on a computer Examples: –Resume created.
Full Review of Jihosoft Android Data Recovery
Chapter Objectives In this chapter, you will learn:
Getting Started with Application Software
Chapter 3 Installing and Learning Software
Basic Computing for Teachers
Microsoft Windows 2000 Professional
Best Windows 10 Password Reset Software for Free Trial.
Reset Windows Vista Password--Never Easier than before
Windows Tutorial 9 Maintaining Hardware and Software
Grauer and Barber Series
Have you seen this screen?
Operating Systems & System Software
Microsoft Office Illustrated Fundamentals
An Introduction to the Windows Operating System
TERMS AND CONDITIONS   These PowerPoint slides are a tool for lecturers, and as such: YOU MAY add content to the slides, delete content from the slides,
Presentation transcript:

1 GoGo Key ™ Designed & created by Strong Bear, LLC

2 Contents What is GoGo Key ™ ? What does GoGo Key ™ look like? How does GoGo Key ™ work? Concerns about GoGo Key ™ The future of GoGo Key ™

3 What is GoGo Key ™?

4 GoGo Key ™ (GGK) is a program that is designed to be used with a USB key to provide security for your files. GGK uses the Advanced Encryption Standard (AES) algorithm for encryption. Your files are protected by one of the best encryption methods approved by the US government. GGK is very easy to use and even a novice computer user can run GGK with very little instruction.

5 What is GoGo Key ™ ? USB keys are one of the best ways to store and transport data. USB keys are easily portable, hold more data than floppies or Zip disks, and are not susceptible to the same risks as magnetic media. USB keys are becoming inexpensive with much greater capacities and, in the immediate future, will hold more data than a CD-ROM disk with greater reliability and robustness.

6 What is GoGo Key ™ ? GGK has a simple interface that is very intuitive. Most users will be encrypting their files in just a few minutes without any instruction at all. The simple “drag and drop” interface means anyone can use it!

7 What is GoGo Key ™ ? Many encryption programs are very complicated to use, requiring the user to install a program to the hard drive of the user’s computer and separately to the hard drives of any additional computers the user might employ in order to utilize their security software. GGK solves this problem by performing all the work for you on any computer using a Windows 98SE * operating system or higher. All you have to do is enter your password and press the Lock or Unlock button. * Win98SE requires a USB driver obtained from Microsoft™ at their web site and installed prior to USB insertion.

8 What does GoGo Key ™ look like?

9 The GGK interface has been designed to be as simple as possible and exceedingly user friendly. All of the controls have been positioned to maximize the productivity of the user. GGK uses simple language; even the most novice computer user can understand what each button does.

10 What does GoGo Key ™ look like? The current status of GGK. (Unlocked in this case.) Press this button to lock or unlock your files. Press this button to open Windows explorer to view, add, and remove your files. Type your password here. Press this button to change your password and the way GGK looks. The status bar shows what GGK is doing. Press this button to exit GGK. Click here for help.

11 What does GoGo Key ™ look like? The splash screen of GGK can be changed by simply scanning your company logo or business card and insert it via the options menu. Should you then lose your key, anyone finding it can quickly identify the owner and contact you.

12 What does GoGo Key ™ look like? GGK also comes with other interfaces or “skins”. The default interface utilizes your current operating system’s colors.

13 What does GoGo Key ™ look like? The Blue interface has a very modern look.

14 What does GoGo Key ™ look like? The Sunshine interface works very good for visually impaired users or for all of us that use the computer too much!!!

15 How does GoGo Key ™ work?

16 How does GoGo Key ™ work? GGK was designed to utilize very little of your computer’s resources. When the USB key is inserted for the first time into a computer’s USB port, only two files are automatically and invisibly installed on your computer. All other functions are performed on the USB key. The two files can be removed by following the instructions on the Options menu in GGK.

17 How does GoGo Key ™ work? File 1 File 2 File 3 File 4 File 5 This is the USB key. These are the files on the USB key. When the user presses the Lock button, GGK combines all of the files into a single Megafile.

18 How does GoGo Key ™ work? File 1, File 2, File 3, File 4, File 5 & Dir This Megafile contains all of the files plus a file directory created by GGK. GGK then encrypts the Megafile using AES. xia ask3gfeo 6ald fpw[2;ka3a er2 9 agr xia ask3gfeo 6ald fpw[2;ka3a er2 9 agr

19 How does GoGo Key ™ work? The data is now encrypted. No one, not even Strong Bear (the programmers of GGK), can view the data without the user’s password.

20 Concerns about GoGo Key ™

21 Concerns about GoGo Key ™ Concern # 1 What happens to the files that GGK deletes from your USB key? Can a file recovery program bring them back?

22 Concerns about GoGo Key ™ When GGK deletes a file, it uses the National Security Agency (NSA) approved method of deletion. First, it fills the file with randomized data and changes the file name to a random name. The file is then deleted. If a file recovery program attempts to recover and recompile the file, it will find only meaningless random data.

23 Concerns about GoGo Key ™ Concern #2 What happens if GGK runs out of room for files on the key?

24 Concerns about GoGo Key ™ If the USB key does not have the capacity to contain all of the files during the encryption/decryption process, GGK will use the computer’s hard drive as temporary storage. As the data is encrypted or decrypted, it will be restored to the key and the temporary file will be securely deleted. A stand-alone compression program such as Winzip™ or PKZip™ may be used prior to the encryption process without any loss of security or data.

25 Concerns about GoGo Key ™ Concern #3 What happens if my key gets damaged?

26 Concerns about GoGo Key ™ If your key is damaged it may be possible to copy the files onto another key. The GGK program will encrypt only on the original key, but it will allow you to decrypt on any key using your original password.

27 The future of GoGo Key ™

28 The future of GoGo Key ™ GoGo Key ™ is a valuable asset for your company, providing reliable secure encryption that is quick and easy to use. A convenient, affordable method of transportation of your data, it is unequaled by any other security software currently on the market. The AES encryption algorithm utilized by GGK has been approved by the US government for use in banks, as well as many government organizations.

29 The future of GoGo Key ™ The market for USB-powered devices is growing exponentially as more businesses and consumers seek greater security, portability and reliability for their data. GGK sees the consumer market taking off, with technologies maturing and the increasing trend of data information on the go.

30 The future of GoGo Key ™ AES, a 128-bit encryption system, used by GGK, is recognized as the best method currently available to the public and accepted by the federal government. It is virtually impossible to break the AES encryption algorithm. The use of this password-based method in the GoGo Key ™ product of Strong Bear LLC has been certified by Dr. Warren D. MacEvoy, Jr., Ph.D. in Mathematics, currently on the faculty of Mesa State College, Grand Junction, Colorado.

31 GoGo Key ™ This product contains encryption technology that is controlled by the United States Export Administration Regulations, and as such may not be exported or re- exported to Cuba, Iraq, Iran, Libya, North Korea, Sudan, Syria, the Taliban controlled areas of Afganistan or any country to which the United States embargoes goods. This product may not be distributed to persons on the Table of Denial Orders, the Entity Lists, or the List of Specially Designated Nationals.