CONTACT US
info@bidaiondo.com

How to recycle the pendrives that you don't use into security keys

Security keys are a digital tool intended for protecting devices and online accounts. They can be easily configured from home, without the need for technical knowledge.

Pendrives were one of the most used tools, whether to save music, documents, photos and more. However, with the growth of cloud storage and online file transfer services, pen drives were forgotten. Luckily, they have now been given a second chance as security keys.

Security keys are a digital tool intended for protecting devices and online accounts. They can be easily configured from home, without the need for technical knowledge. Simply, using a computer with access to Windows. Here we will explore how pen drives can be recycled and what other uses they can be given besides turning them into security keys.
What are security keys?

Also known as authentication keys, they are security devices used to prevent unauthorized intrusions. To do this, they generate access codes that must match those provided by the site you are trying to access. Something similar to two-step verification. Only instead of using a code that arrives online, we must insert the pendrive into the computer.

Its main function is to offer an additional layer of protection against cyber attacks and identity theft. Hence, security keys can be easily purchased online, under different brands and models. However, it is also possible to create them, using transfer media such as pendrives or any type of storage media.

How to convert a pendrive into a security key

The Windows operating system offers a simple way to configure a pen drive as a security key. It is even possible to use any storage device, with the only requirement that it must have a minimum amount of space available. Likewise, this configuration can be done in most versions of Windows, although it is recommended to use the most up-to-date one.

The first step to configure a security key is to connect the pendrive to a computer. Subsequently, open the Windows configuration panel and access the accounts section. Once there, select the "Login Options" category and then click on "Windows Hello." All that remains is to follow the instructions that will allow you to configure the security key for the USB.

Even if you do not have a Windows operating system, there are currently many programs and alternatives that allow you to configure pendrives as security keys. Therefore, it is an accessible solution for all types of users, regardless of the tools and resources they have at hand.
Other recycling ideas for pendrives

It is normal for us to have more than one pendrive stored in our drawers. While only one can be designated as a security key, there are many other uses that the remaining devices can be put to. This depending on the available storage space. Since they can be considered as an alternative to store media such as movies, music and photos.

Likewise, pen drives can be used as recording devices for television programs. Just connect them to the TV through the USB port. It is also very useful as an alternative for backup copies or to back up important files. Lastly, there is the option to load rescue tools and utilities, such as a Linux distribution, fixing corrupted OS issues.
The versatility of security keys

While security keys are primarily used for online privacy, they have wide-ranging applications. Many people use them to unlock physical doors, protect encrypted files, protect access to computer systems, and much more. They also eliminate the need to remember complex passwords, making it much easier to use apps and accounts in everyday life.

These security keys are only in their beginning phase. Not all applications that we use daily take them into account. Since the main method is two-step verification by text message or email. However, it is expected that in the future security keys will become the means of accessibility in different digital spaces. Eliminating the use of traditional passwords entirely.

Getting familiar with the use of digital keys is crucial for those who want to stay up to date with the latest online protection methods. This is one of the best ways to get started, especially if you are looking for a solution that can be easily applied independently, without the intervention of professionals or complicated programs and using tools you have at home.

https://www.larazon.es/emergente/como-reciclar-pendrives-que-usas-llaves-seguridad_202311036543414fb27615000190a0e4.html?utm_source=pocket-newtab-es-es

Last news

base_url:
host: www.bidaiondo.com
REQUEST_URI: /articulos/como-reciclar-los-pendrives-que-no-usas-en-llaves-de-seguridad
path: /news/all-about-the-influencer-law-a-temporary-patch-or-a-lasting-measure
All about the Influencer Law: a "temporary patch" or a lasting measure?
The government of Spain approved the Influencers Law with the aim of regulating the activity of content creators on social networks and protecting consumers from covert or harmful advertising. This regulation will apply to all content creators who ha...
base_url:
host: www.bidaiondo.com
REQUEST_URI: /articulos/como-reciclar-los-pendrives-que-no-usas-en-llaves-de-seguridad
path: /noticias/apple-ya-pronuncia-inteligencia-artificial-asoma-como-una-estrategia-post-iphone-que-llegara-con-socios
Apple already pronounces 'Artificial Intelligence'. It appears as a post-iPhone strategy that will arrive with partners
WWDC 2023, Apple's event for its developers in which it revealed the Vision Pro, left a curiosity: the company did not once utter 'Artificial Intelligence' despite it being the technological hype train. In the quarterly results that he...

online trading systems.

We show you the best way to market products and services online, through a professional service of installation, management and maintenance of your virtual store

We program to suit you

We help you achieve operational excellence in all your business processes, whether they are production, logistics, service or office processes. In addition, we assure you to maintain continuous improvement in your management.

Bidaiondo Articles

Quishing: what it is, how it works and how to avoid and protect yourself from this type of cyber scam

We are going to explain to you what quishing is, a type of scam similar to phishing, but which is based on deceiving you using QR codes. This is a scam in which they pass off a code as legitimate, and take you to a website where they can steal your data. We are going to explain this article by explaining what exactly quishing is, and its main characteristics. This will make you able to identify it and differentiate it from other types of scam,...

Ver más »

Phishing emails are the source of 90% of attacks on companies

Email is one of the main technological innovations that has revolutionized the way we understand the world, as well as reconfigured the business model. Since its invention in 1965, the evolution of this means of communication has been transgressive, and according to data from Statista, there were already more than 4.26 billion users using email in 2022 and the number of emails sent on that same date amounted to 330,000 million, with a growth fore...

Ver más »