Brute Force Hacking Detection - Kingston DataTraveler 2000 Manual De Instrucciones

Ocultar thumbs Ver también para DataTraveler 2000:
Tabla de contenido
Idiomas disponibles
  • ES

Idiomas disponibles

  • ESPAÑOL, página 32

Brute Force Hacking Detection

If you enter an incorrect User PIN 10 (ten) consecutive times, the DT2000's brute force
Caution:
mechanism will trigger and the User PIN, the encryption key and ALL DATA will be deleted and
lost forever.
PINs
PINs used to
configured on
unlock DT2000
DT2000
Admin & User
Admin & User
User Only
Admin Only
If you enter an incorrect PIN 10 (ten) consecutive times, the encryption key and all data will be deleted and lost
forever. The DT2000 will then revert to the factory default User PIN of 11223344. Refer to
for more information.
Also, since this will force the creation of a new encryption key, the DT2000 will have to be reformatted. Refer to
Configure the DT2000 with Windows OS
Unlike other similar drives, the DT2000 incorporates a random number generator. Once the drive is reset, a new
encryption key is randomly generated.
Document No. 480ADT2000.B00
What happens after 10 incorrect PIN entries?
User PIN
The DT2000's brute force mechanism will trigger and the User
PIN will be deleted. All data will remain on the DT2000 and can
only be accessed by the Admin entering the correct Admin
PIN.
Admin PIN
The DT2000's brute force mechanism will trigger and both the
User and Admin PINs, the encryption key and all data will be
deleted and lost forever.
User PIN
The DT2000's brute force mechanism will trigger and the User
PIN, the encryption key and all data will be deleted and lost
forever.
Admin PIN
The DT2000's brute force mechanism will trigger and the
Admin PIN, the encryption key and all data will be deleted and
lost forever.
or
Mac OS
for the corresponding process.
DT2000
Change the User PIN
Page 24 of 30
Tabla de contenido
loading

Tabla de contenido