How to Create a USB Physical Security Key?
USB devices act as physical security keys for PCs. Without being plugged in, you can not use or unlock the computer. You can either buy one or create your own to add an extra layer of protection to your device.
To create a physical USB security key, you need to use software like the USB Raptor, Predator, and Rohos Logon Key. However, the latter two are paid services.
Creating A USB Physical Security Key for Windows
- Download USB Raptor from the SourceForge page.
- Save on your computer.
- Unzip the downloaded folder and open it.
- Run the USB Raptor application.
- Verify terms and conditions by clicking on the checkbox next to “I Agree.”
- Plug a USB flash drive into your computer.
- Type out a strong password in the “Encryption” field.
- Open the “Select USB Drive” drop-down box in the “Unlock File Creation” section and select the desirable USB flash drive.
- Click the “Create k3y File” button.
- Check the box next to “Enable USB Raptor” in the “USB Raptor Status” section.
After this, ejecting your USB will lock your computer. You can now also go to settings and choose functions according to your USB Physical Security needs. Also, go to “Advanced Configuration” options to enable a backup password, startup settings, and more.
Creating A USB Physical Security Key for Mac
For creating a USB physical security key, macOS does not have any free option like Windows. Some provide free trials, e.g., Rohos Logon Key.
- Download Rohos Logon Key.
- Unzip the file, click “RohosLogon installer,” and then click “Continue.”
- Click agree and select “Install for all users of this computer,” click “Continue” and “Install.”
- Enter username and password and click “Install Software.”
- After closing, connect a USB to your mac.
- Open Rohos Logon Key and click “USB Drive.”
- Select the USB Drive you want to use and click “OK.”
- Select “Lock the Desktop” from the drop-down box.
- Rohos Logon will now protect your mac device when the USB is not connected.
For more information on physical and data security, take a look at the rest of Security Forward.