Because USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and extremely portable, they are popular secure usb for storing and transporting files from one computer to another. However, these same characteristics make them appealing to attackers.
A secret —-> there is only one known sure fire way of getting around a content filter. Use DDNS for your own PC. Setup a proxy on your PC. Make sure you know the port its running the hostname.(DONT SHARE IT, trying to make it look like you are a guru) Major usage will get you unwanted attention, and ANYTHING that happens, even things like bomb threats, usb protect will be traced back to YOU. You can actually use a VPN or proxy on your own box at home, connect to it, and you are usually ok. Me personally, I knew this would happen so I stopped it before it got started, but most school admins are uselss in I.T. security. As for the usb drive, there is nothing that cannot be invaded, dont get over confident.
Designed with protection in mind, the entire Aegis Secure Drive family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Security usb access control Generation (formerly Securethoughts) is dedicated to a variety of topics including information & network security, Mac OS X, Single Packet Authorization, Privacy and other techno-funky subjects.