Blog Data Erasure

“Deleted” Data that is not completely Deleted

A PC generally keeps most of the data stored on it whether it has or hasn’t been deleted, up to the moment of being disposed of if no complete erasure is done. It is common for people to tend to think “erase” or “delete” in Windows means that the file is gone forever and unrecoverable. People with a bit more security awareness feel comfortable after they format all data of partition before disposing of the PC. However, it is common knowledge that deleted and formatted data in Windows can be easily recovered by using simple recovery software that is easily accessible on the Internet.

In the United States and the U.K., they are famous for their stricter industry-standard, government regulations, and laws in comparison with other countries. The following data leakage from used disk relating to government organizations reminds us of the importance of completely wiping disk drives.

In 2009, the United States Department of Veteran Affairs had one of their hard drives fail, which contained records of millions of U.S. veterans. Without destroying the data first, they sent the failing hard drive back to the vendor for repairs, risking potential data breach that could have affected 760,000 people. This accident is claimed to be the single largest release of personally identifiable information by the government in history.

In 2010, there was a sensitive case with NASA’s preparation for the end of the space shuttle program. Selling their surplus of supplies, old computers were on the list. However, fourteen computers from the Kennedy Space Center failed tests to determine whether they were properly sanitized of sensitive and confidential information. Ten of the computers had already been released to the public at that point, creating a serious data security issue and breaches to NASA’s IT security practices. Information on the computers could have helped hackers gain access to NASA’s internal computer network.

Also in 2010, an army officer, Captain Robert Sugden sold his broken laptop for “spare and repair” parts for around $32 USD. However, the laptop contained military secret files such as troop numbers, patrol details, ammunition stock lists and locations of police command posts, none of which required passwords. Such information could be fatal if put it was in the hands of terrorists. When the shocked buyer returned the laptop to the U.K.’s Ministry of Defense, it was also discovered that the laptop contained hundreds of photos and names, risking the lives of those that joined the Afghan National Police and Afghan National Army.

In the previous mentioned cases, it was fortunate that the government authorities went ahead with inspection and prevented the data from being leaked and misused by other parties. There are cases where those who were not wary of the dangers of data leakage from a used hard disk. The two U.S. cases mentioned above were only discovered because of an audit done by the government while in the case of the U.K., a buyer let the government know of the situation. It is reasonable to say that there are many potential cases out there that can lead to great risk just like the ones brought up in this entry.

In 2008, an illegal content distribution scandal took place in Hong Kong, China. Although this case does not involve the government, it does involve an individual’s privacy. Dubbed the “Edison Chen Photo Scandal,” a personal computer was sent in for repairs where hundreds of private photos were taken, copied, and distributed without consent, allegedly by the computer repair shop. The PC’s owner, Edison Chen stated that the photos that were distributed were deleted before being sent in for repairs, but with the advancement and accessibility of data recovery technology, about 1,300 of Chen’s sexual and celebrity photos were recovered, taken and copied, only to be distributed for the world to see. This case severely damaged his reputation and his career in China.

Over 250,000 used computers and over 100,000 used laptops are waiting to be sold on eBay by the end of April 2013. Many people carefully erase the data by deleting files and reformatting the hard drive to feel more secure when selling computers. This blog entry was created to raise data security awareness to prevent such data leakage incidents, which may creep up on us someday.

Blog Data Erasure NEWS News Letter Press Release

SECUDRIVE Sanitizer Portable Released

A new hard disk wipe solution now available from Brainzsquare, SECUDRIVE Sanitizer Portable allows users to easily delete data on hard drives completely, including the OS, without the need to enter BIOS setup or use additional booting devices.

Brainzsquare announced its release of SECUDRIVE Sanitizer Portable(SDSP), a simple hard drive erasure solution that doesn’t require additional booting devices or the BIOS setup.

The only requirements of running SDSP are connecting the USB flash drive, choosing an erase algorithm, and selecting the disk to be wiped within the same PC environment. SDSP erases various kinds of disk drives such as ATA/IDE, SATA, SCSI, USB, and FireWire. SDSP utilizes world-known to erase algorithms such as the Gutmann algorithm (35 times overwrite), the DoD5220.22-M algorithm (3 and 7 times overwrite), etc. to wipe the PC including the OS.

In addition, the details of the erase procedure (disk info, erase algorithm, etc.) are recorded on the report log which is embedded into the hardware. SDSP’s software also allows the user to erase multiple computers and disk drives simultaneously and can be used as many times as needed within a single location.

“Due to the difficulty and complicated nature of having to set up BIOS and having to use additional booting devices such as CD or USB flash drive when wiping the disk, IT specialists were often necessary. SDSP was developed with a solution in mind. The goal of SDSP is to allow even the casual users to be able to completely wipe their computer with extreme ease,” said Simon Kang, CEO of Brainzsquare.

About Brainzsquare:
Founded in 2000, Brainzsquare has been serving specialized and innovative data security solutions into the market. With the launch of the SECUDRIVE product line in 2006, Brainzsquare has been providing products ranging from secure USB flash drives and data erasure products to copy protection software, device control, and file server security for corporate customers and content publishers.
If you have any questions or inquiries about this article or its contents, please contact us.

(Secudrive Drive Eraser is an improvement and a replacement of Secudrive Sanitizer Portable now, 0823/2019)


Three Cases Where CD/DVD Content Distribution Cannot Be Used.

Generally, content publishers distribute their content via CD or DVD disc media when it comes to their important content. For over 20 years, CD and DVD discs have been the main method of distributing copy-protected media such as audio and video content. However, CD/DVD based copy protection has been challenging the limitations of what types of content and necessities of a content publisher can be stored on the discs.

In this blog, we’ll discuss three cases where CD and DVD based copy protection solutions cannot function properly when distributing content.

We cannot use it when the content is important and very high in value.
Generally, audio and video content that is distributed via CD/DVD discs are cheap(under the value of fifty US dollars). In this case, content publishers can distribute a large number of CD/DVD containing content using the CD/DVD based copy protection. It is cost-effective for content publishers to distribute in this method, even if some of their content can be copied illegally with cheap or free technological resources available on the internet. There are a lot of CD cracking tools for the general public to use such as Clone CD, which allows even the non-tech savvy people to copy content. Since such resources exist, if you want to distribute content worth hundreds or thousands of dollars, you should not use CD/DVD copy protection solution.

Sharing confidential corporate information internally.
While it is efficient to share data digitally, when sharing confidential information within the company there is crucial and almost irreparable damage if it is exposed outside of the organization. For example, the service manual of a motor company would be shared with various cooperative auto service partners and dealers to enhance their quality of service. However, the exposure of this information to customers, competitors, or outside of the company, in general, may severely damage the reputation and reliability of the company. This service manual can be updated a lot regularly and can be used in the case of internet disconnection. The level of security should be kept high on this content even if there’s a high number of a distribution involved. In this case, CD/DVD based copy protection cannot be used.

Sometimes want to distribute content which cannot be viewed with an existing standard viewing program.
Existing CD/DVD copy protection solutions generally use standard playing or viewing programs to play normal audio and video formatted files. For example, an e-book generally uses a certain viewer such as a PDF viewer. The content of the e-book would be transferred into a PDF format from the publishers’ original format. In this process, there are some issues where the content cannot function efficiently.

1. If the Content has too many HTML or PDF links.
2. PPT file is multimedia, mixed with animation, sounds, and videos.
3. Content is in the form of a .EXE file.
4. Ultra high definition video file that is not compatible with the standard/existing player.

In addition to the three cases, there are some other challenges that come from the rapidly changing IT market environment. Recently, newly released laptops started to stop providing CD/DVD drives. The capacity of a DVD disc is at most 4.7 GB. It is inconvenient to keep track of multiple discs when high-resolution files are involved.

In conclusion, CD/DVD based copy protection solutions have relatively good quality and standards as well as cost-effectiveness, but it has met some challenges with the various growing needs of digital content publishers. Nowadays, Secudrive USB Copy Protection, one of USB based copy protection solutions are used to distribute large amounts of content while providing higher security functions than CD/DVD based copy protection solutions.

Blog NEWS News Letter Press Release USB Copy Protection

SECUDRIVE USB Copy Protection Released

Specialized copy protection software, SECUDRIVE USB Copy Protection offers the highest caliber copy protection solution for digital content and documents. SECUDRIVE USB Copy Protection provides advanced copy protection features while offering flexibility and compatibility with custom, user-developed applications.

Brainzsquare announced its release of SECUDRIVE USB Copy Protection(SDUCP) a USB copy protection solution into the market.

The USB flash drives have been increasing in popularity due to their convenience, their high capacity storage size and their high-speed performance. More recognized than the CD-ROM when it comes to portable storage, USB drives have been used to distribute high-quality digital content by the media, education systems, government, and others.

SDUCP caters to companies that need copy protection for their digital content and documents when distributing it to others. SDUCP utilizes advanced features such as copy protection that prevents screen capture and printing without authorization, watermark options, validity settings, and DRM policy settings with optional password settings.

SDUCP’s copy protection is compatible with a variety of applications and formats such as HTML, PDF, Flash, multimedia, as well as custom, user-developed applications. SDUCP will interrupt and block the execution of applications except for the ones on the allowed list, and the content owner can simply register the applications via SDUCP’s user interface. There is no need to buy special USB drives because SDUCP also works with normal USB flash drives. SDUCP makes business life easier and more secure by eliminating the excess work of fixing content formatting and having to replace USB drives.

SECUDRIVE USB Copy Protection can be used in multiple settings such as small businesses and companies that distribute digital content like educational files, private documents, and more to prevent unauthorized copying. For customers in need of distributing a large quantity of secure content on USB drives, they can take advantage of the high-speed USB duplication system.

“This solution will help content publishers distribute their content easily and expand their business, especially if they deal with high-quality content such as educational files, technical files, E-books, manuals, etc.,” explains Simon Kang, CEO of Brainzsquare.

Brainzsquare offers 30-day trial versions of SDUCP for businesses to try on their website. (

Blog USB Copy Protection

How to Distribute Your Content Securely

Discs have been the primary method of distribution that content publishers have used for the past decade. With all the copy protection solutions for CD-ROMs and DVD-ROMs that are mostly used, we realize that content publishers trade good functions and content formatting issues for the convenience of using their own applications and a secure method to distributing. However, what has been quickly growing is that copy protection for discs are easily bypassed and copied without authority. These methods of distribution are quickly becoming outdated by the increasing advancement of USB storage capacity, security, and portable convenience.

Is there an affordable solution?
There is now! If you’re a content publisher or corporate distributor in a similar position, we announce Secudrive USB Copy Protection which provides content publishers security for their content by preventing unauthorized copying upon distribution. Secudrive USB Copy Protection is a USB based copy protection solution featuring copy protection policies, Digital Rights Management (DRM) policies, and compatibility with various pre-existing applications. The solution also works with normal USB flash drives, meaning you save money by not having to buy specific flash drives. For mass content distributors, by using the USB duplicator system and USB hubs, you can simultaneously copy secure content on up to sixteen USB drives.

What makes Secudrive USB Copy Protection so special?
The unique feature of Secudrive USB Copy Protection is that not only is it compatible with application programs that already exist on your computer(i.e. PDF viewer, audio and video players, Flash, etc.), it is compatible with special custom-developed applications that are required for your content to function properly. This allows content publishers the flexibility of protecting their content without having to worry about incompatibility and file formatting problems.

So whether you’re distributing digital education or entertainment media, important research documents, powerpoint media, or content requiring specialized custom applications, Secudrive USB Copy Protection has you covered.

A free consultation will be available.

Blog Data Erasure

How to Delete the Hard Drive and the OS

Even after I emptied the recycle bin and formatted the PC, why would I need to use deletion software when I dispose of my old PC?

Well, the answer is simple: Because even after all you just did, I could still recover everything you have entered on your computer.

We obliviously store everything on our computers. So, knowing how to handle confidential data and personal information such as your bank account number, financial data, bank card number and private information is an essential precaution you have to take, in order to protect your personal information against data leakage or theft. Many people believe that formatting their PC hard drive will remove all of their input information. But the truth of the matter is, just because you can no longer see the file, it doesn’t mean it is gone. File traces are digitally left behind on the OS and potential ‘data thieves’ are able to recover your confidential data that was supposedly ‘deleted.’

You need to have hard drive deletion software.

For safe PC disposal, you need to have some sort of deletion software that will completely delete all of the information on the PC. There is deletion software that uses a constant number deletion mechanism, in which the entire sector is overwritten once by a predetermined constant value. What does that mean? It simply means that your recycle bin or your confidential data will get completely wiped clean using the algorithm to overwrite the data that was stored in your hard drive. This deletion mechanism causes all file traces unrecoverable and completely deletes the digitally stored data in the hard drive, thus, preventing data loss or confidential information recovery after PC disposal.

Where can I get deletion software, that won’t hurt my wallet?

We provide a FREE deletion software, SECUDRIVE Sanitizer Free that uses the same deletion algorithm as stated above. It also has the capability to detect bad sectors and efficiently delete the hard drive until completion. SECUDRIVE Sanitizer Free adopted the automatic deletion mechanism to completely delete all of the data and file traces, giving the user safe hard drive disposal at home.

Compared to other hard drive deletion software, that requires you to make a decision every time a bad sector is found or make you wait for hours just to get you disappointed with an error message in the end, SECUDRIVE Sanitizer Free keeps deleting until the deletion process is completed (pretty hardworking program in my opinion)! When a bad sector is detected in the hard drive by this software, SECUDRIVE Sanitizer Free automatically skips the sector until the total deletion of the hard drive is complete.

(Secudrive Sanitizer Free for individual use is not available. We only provide Secudrive Drive Eraser for businesses, a commercial version of it, now. 08/23/2019)

Blog Device Control

USB Port Control Program Purchase Guide

This is the purchase guide of SECUDRIVE Device Control for USB port controlling.

Case 1: For some of the PCs in the office, USB drives or external HDs should be blocked.

Case 2: We have about 50 PCs across the branches and the HQ needs to proceed with USB port control and log collection for connected devices and file events.

Case 3: We do not need USB port control inside the office. Because the staffs bring their own laptop, USB port and network should be blocked.

Case 4: We have a customer service center and would like to block the USB ports of about 100 PCs. We do not need logs of the connected devices.


Case 1. For some PCs in the office, USB drives or external HDDs should be blocked.
A. PC is connected to the Internet.
– SECUDRIVE Device Control BASIC, ESD Editionis available. This program does not require a separate management program. Just install software on the PC, proceed with a standard license and proceed with USB port control.

B. PC is not connected to the Internet.
– SECUDRIVE Device Control, USB Edition is available. For license authentication, plug in the D Device Control USB drive to the PC and install the program. Without an internet connection, your license can still be authenticated.

Case 2. We have about 50 PCs across the branches and the HQ needs to proceed with USB port control and log collection for connected devices and file events. 
– SECUDRIVE Device Control Enterprise is available. Enterprise version is composed of the central manager program and the client agent program. The manager program automatically collects events of the connected devices and file tasks on them.

Case 3. We do not need USB port control inside the office. Because the staffs bring their own laptop, USB port and network should be blocked. 
– SECUDRIVE Device Control Enterprise is available. Enterprise version provides both [Online policy] for the communication status of the central manager program and the client agent and [Offline policy] for disconnection status. Making use of them, you can set policies for the office and outside environment separately.

Case 4. We have a customer service center and would like to block the USB ports of about 100 PCs. We do not need logs of the connected devices.
– SECUDRIVE Device Control, USB Edition is available. If you need to block USB ports but do not need event logs, you can use BASIC edition. For installation on lots of client PCs, divide licenses into multiple SECUDRIVE Device Control USB drives and install the agent simultaneously on the PCs.

NEWS Notice Press Release USB Copy Protection USB Sescurity

SECUDRIVE Secure USB products embed “Trend Micro USB Security™ 2.0”

Brainzsquare Co. Ltd. is introducing a new lineup of SECUDRIVE USB with “Trend Micro USB Security (TMUSB) 2.0” vaccine program, provided by Trend Micro Inc.

Equipped with AES 256bit hardware encryption chip, SECUDRIVE USB is targeting individuals with various security utilities and corporate with copy protection and policy management features.

With TMUSB 2.0 embedded, SECUDRIVE USB prevents viruses and malicious codes from invading the USB memory and terminates such threat when detected. Free pattern analysis and engine update is provided for one year from the date of purchase. The license can be renewed each year.

[ SECUDRIVE lineup with TMUSB 2.0 ]

• SECUDRIVE USB Personal V SD 200 Series:
Secure USB for privacy protection with auto-login, PC lock, secure backup, file eraser, hide folder utility embedded.
• SCUDRIVE USB Basic V SD200 Series :
Secure USB for work purposes that does not require any driver or software installation or administrator rights.
• SECUDRIVE USB Enterprise V SD200 Series:
Secure USB memory for enterprises that can set copy protection policy, data leakage control, file, and USB usage log with an exclusive management program
• SECUDRIVE USB Office V SD200 Series:
Copy-protected USB, suitable for delivering MS Office documents to partner companies with usage period and usage control.
Copy-protected USB, suitable for delivering CAD files to partner companies with usage period and usage control.

• TMUSB website:

SECUDRIVE USB Drive Security & Management:

Blog NEWS Notice USB Copy Protection USB Sescurity

A Checklist to Buy Secure USB Drives for Businesses

1. Hardware Encryption
Encrypting data is one of the basic features of a secure USB drive. There are two different types of encryption methods, software, and hardware; the main difference between the two is the location of the decipher key. While the software encryption method stores the decipher key on the PC, leaving it vulnerable to virus and hacking, the hardware encryption method keeps the decipher key on the USB drive to reduce the risk of it being exposed. If you are handling confidential or exposure-sensitive files, you should think about purchasing a hardware encrypted secure USB drive.

2. Automatic Self-Destruction Against Brute Force Attack
One of the simplest ways to hack into the secured information is by entering every possible combination until a match on the password is found. This is called the “brute force attack”. In order to prevent illegal access methods, the USB drive needs have a function where the data is completely deleted after a set amount of incorrect password attempts. Make sure your secure USB drive has safeguards against brute force attack.

3. Embedded with Vaccine Program for USB Drive
There are many factors that increase the chances of virus infection; the most influential factor is on how often the USB drive gets connected to an unreliable computer (i.e. public places, schools, libraries, and airports). Once infected, the USB drive acts as a host to infect other PCs. This is extremely dangerous, especially when the infected USB drive is connected to PCs that are connected to lab equipment or contains confidential data. The most efficient way to defend the USB drive from virus infection is to embed a vaccine program

on the USB drive. Anti-virus for USB drive is absolutely necessary when it comes to protecting your private data and files.

4. Need for Copy Protection
The basic function of a secure USB drive is to encrypt data, thus, preventing data leakage when lost or

stolen. However, sometimes those with access to the files would copy the shared files using a USB drive or external hard drive. In this case, the data stored on the USB drive could be saved to the local PC without any trouble.

To prevent data leakage through a friend, coworker or family member, copy protection is ideal. Although the copy protection function is optional, it is necessary to keep those who might be closer to you, out of your private life.

5. Do I need administrative USB drive?

Usually, secure USB drives are purchased by the company and given out to the employees. In which case, each USB drive is independently protected against copy protection, and the individuals become responsible for any leakage accidents.

The administrative USB drive is suitable for companies with a security administrator; the administrator controls every USB drive in the entire company with his own configured security policy. With the administrative USB drive, the security administrator can control password, copy protection, log collection, prevent data leakage, restore password, validity period and number of uses.

6. Reusable with Initialization Tool 
What happens when you forget your password to access the USB drive? Some secure USB drives are not allowed to be initialized, meaning you have to buy a new one. Others are reusable right after initialization but the data will be lost.

Make sure to purchase a replacement secure USB drive or buy one that can be initialized.

Blog USB Sescurity

How to Protect the USB Flash Drive from Viruses

Due to its convenience, portability, high storage capability and price competitiveness, the usage of USB drives are exponentially increasing. Unfortunately, the number of security accidents and computer damage are also rapidly increasing.

The most notorious virus that gets into the USB drive is the “Stuxnet”. This computer worm can cause significant problems on industrial software and equipment, resulting in the immeasurable loss.

The SECUDRIVE USB flash drive embedded the Trend Micro USB Security system, USB security system specialized on the virus-vaccine program, to prevent USB infection from malicious codes.

In this post, we will discuss:
1. The path of the USB drive virus
2. The damage caused by the virus-infected USB drive
3. How to prevent virus infection through the USB drive.

1. The path of the USB drive virus
Virus infection through the USB drive goes through the following process;
– a USB drive is infected by being connected to a virus-infected PC
– Any PC, where the virus infected USB drive is connected to, will be infected

Computer => USB Drive infection
When the USB drive is used in the virus-infected PC, the virus is automatically copied to the flash drive. “Autorun.inf” file, which automatically executes the virus, is created on the top layer of the USB memory.

USB drive => Computer infection
The virus infected USB drive automatically executes the “autorun.inf” file when connected to a PC. The file copies the virus to the computer and the “autorun.inf” file is also created on the PC.

Autorun.inf File
– This file is created to execute certain programs automatically. It is often used when a CD is inserted to a PC. The USB drive also uses the same process to start the system in the PC, consequentially infecting the PC it connects to.

2. Virus infection damage caused by USB drive
When the USB drive is infected, it starts to infect other PCs and USB flash drives. Once it has infected a computer, the virus can download other viruses through the internet and exacerbate the problem.

The following are some examples of how the virus can harm the user:
– Steals personal information
– Remotely maneuvers PC
– Transmits confidential information on the PC
– Sends keyboard log to an outsider
– Downloads new viruses

3. How to prevent virus infection of USB drive 
The number of new viruses that are infecting USB drives is significantly increasing. Be careful because your USB drive may be infected by one of them without you realizing.

SECUDRIVE USB V series embedded the Trend Micro USB Security anti-virus program, which prevents viruses and malicious codes from infecting the secure zone of the USB drive. The virus pattern is automatically updated when connected to the Internet. Learn how Trend Micro USB Security works.

The following are some safeguards against USB drive viruses.
– Uses secure USB drive with vaccine program embedded
– Uses USB drives on PC with up to date vaccine program
– Uses different USB for different purposes
– Does not use unreliable USB drives
– Checks for virus on the USB drive before opening any files onboard
– Stops any autorun processes by pressing the “shift” button when connecting the USB drive
– Opens the file from Windows Explorer and not from My Computer
– Deactivates the autorun from Windows setting
– Creates the “autorun.inf” folder in the USB drive to prevent the creation of malicious autorun.inf file
– Shows hidden files and folders to quickly distinguish hidden autorun.inf file.