Advertisement

Quick Links

U.S. Patent Pending
Chameleon
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Chameleon and is the answer not in the manual?

Questions and answers

Summary of Contents for Marathon 6 Chameleon

  • Page 1 U.S. Patent Pending Chameleon User Manual...
  • Page 2: Table Of Contents

    Password Modification ....................20 Adding, Deleting, and Resizing Encrypted Drives ............... 21 Additional Functions and Limitations .................. 23 Using a Chameleon Device with Multiple Computers ..........23 Using Multiple Devices with the Same Computer ............23 Windows Paging File ....................24 Safe Removal ........................
  • Page 3: Introduction

    USB encryption devices by protecting the files on your hard disk rather than transferring them to a USB device. Chameleon creates an encrypted drive using the free space in your hard disk. Files and applications stored in this encrypted drive are protected and can only be accessed when the Chameleon device is plugged in.
  • Page 4 A) Choose a Recovery Passphrase. This passphrase is only used for making duplicate copies of your Chameleon device (in case you lose it) and not used in normal operation. You can think of the Recovery Passphrase as a password stored on the device itself.
  • Page 5 After completing the installation, make several duplicate devices with this sequence as backups (See ). In order “5 Duplicating a Chameleon Device” to create additional duplicates in the future, save the random sequence in a secure location. Delete the sequence, otherwise.
  • Page 6: Uninstalling

    Windows. A forensic examination of your hard disk will reveal only encrypted, apparently random, data. Only files that are stored on the Chameleon drive are encrypted. Any files copied or read from the encrypted drive are automatically decrypted. For instance, if a user were to attach a file from an encrypted drive to an email, that file would be attached decrypted.
  • Page 7 Secure commands are only available when the Chameleon device is plugged in. The Chameleon software also adds a secure delete command. Right click on any file or folder then select “Secure Delete”. This is more secure than deleting the file then deleting it again from the Windows’...
  • Page 8 Deleting a file stored in an encrypted drive places it in the Windows’ Recycle Bin. You can recover the file from the Recycle Bin as long as the Chameleon device is still inserted. Deleted files disappear from the Recycle Bin when the device is removed. They reappear in the Recycle Bin when the device is reinserted.
  • Page 9: Encrypting Individual Files And Folders

    If an application is open with an encrypted file, that application and file may still be accessible even after you unplug the Chameleon device. For example, let’s say you are editing a protected file in Microsoft Word. If you unplug the device, a copy of this file is still open in Word. You cannot save this file to the encrypted drive until you re-insert the device.
  • Page 10 Chameleon User Manual Doc# 100-03-080 3. Right click on the file or folder you want to protect. 4. Select “Encrypt here” to create an encrypted version of the selected file The encrypted file appears as a file in the same folder with the same file name but with the extension “.cge”.
  • Page 11 Chameleon User Manual Doc# 100-03-080 4. Drag the mouse pointer to the target folder and release the right mouse button. The encrypted file will be created in this folder. 5. Select “Encrypt move here” or “Encrypt copy here”. “Encrypt move here” places the encrypted file at the destination while securely deleting the source file.
  • Page 12: Decrypting Files

    Chameleon User Manual Doc# 100-03-080 4. Right click on the destination drive or directory. 5. Select “Encrypt Paste” This places the encrypted file at the destination. If you selected “Cut”, the source file will be securely deleted after the encryption completes.
  • Page 13 Chameleon User Manual Doc# 100-03-080 The other methods for decrypting .cge files are essentially identical to encrypting: 1. Plug in the device 2. Enter your password (if enabled) 3. Right click on the .cge file to be decrypted. 4. Select “Decrypt here”...
  • Page 14 Chameleon User Manual Doc# 100-03-080 3. Click and hold down the right mouse button on the .cge file. 4. Drag the mouse pointer to the target folder and release the right mouse button. The decrypted contents will be created in this folder.
  • Page 15: View Encrypted File Details

    Chameleon User Manual Doc# 100-03-080 4. Right click on the destination drive or directory. 5. Select “Decrypt Paste” This places the decrypted contents at the destination. If you selected “Cut”, the source file will be securely deleted after the decryption completes.
  • Page 16: Duplicating A Chameleon Device

    5 Duplicating a Chameleon Device If you lose or break your Chameleon device, the data in the encrypted drive can be recovered using a new Chameleon device and the Recovery Passphrase you specified during installation. This process can also be used to create duplicate Chameleon devices. Devices without a Recovery Passphrase cannot be duplicated.
  • Page 17: Disabling Lost Chameleon Devices

    This new duplicate device will not have a password associated with it. Click on the “Password Management” tab to add one. You do not need the original Chameleon device to make a duplicate. But as a precaution, an encrypted drive must be present for successful duplication.
  • Page 18 You will be prompted to migrate them when they are later connected. To change the device and migrate the encrypted drives: 1. Plug in a duplicate of the original Chameleon device. 2. Enter your password (if enabled).
  • Page 19: Migrating Encrypted (.Cge) Files

    Doc# 100-03-080 This procedure creates replacement encrypted drives using the new Recovery Passphrase with all your encrypted files in it. The updated Chameleon device will not have a password associated with it. Click on the “Password Management” tab to add one.
  • Page 20: Password Protection

    By default, no passwords are required for Chameleon devices. However, adding password protection secures your data in the event that you lose your device along with your PC. When enabled, the Chameleon software requests the password whenever it is plugged in or when the computer is restarted or wakes from sleep.
  • Page 21: Password Modification

    (or no passwords at all). Be aware that a Chameleon device without password protection can access the data protected by a different device with password protection as long as they have the same Recovery Passphrase.
  • Page 22: Adding, Deleting, And Resizing Encrypted Drives

    Chameleon User Manual Doc# 100-03-080 4. Select the “Password Management” tab.  To add a password, select “Set New Password” then enter the new password and click the “Proceed” button.  To change your password: Select “Change Password”. Enter your existing password.
  • Page 23 Chameleon User Manual Doc# 100-03-080 1. Plug in your device. 2. Enter your password (if already enabled) Click on the Windows “Start” > 3. Start the “Chameleon All Programs > Manager” Chameleon > Chameleon Manager 4. Select the “Drive Management” tab.
  • Page 24: Additional Functions And Limitations

    Chameleon Manager instead of uninstalling the Chameleon software. Uninstalling the Chameleon software does not delete the encrypted drives. The Chameleon software does not support more than one Chameleon device being inserted at a time. Copyright © LucidPort Technology, Inc.
  • Page 25: Windows Paging File

    Chameleon User Manual Doc# 100-03-080 9.3 Windows Paging File Windows may store temporary data in its paging file (virtual memory). This file is usually unencrypted and is updated continuously. Enable pagefile encryption to direct Windows to encrypt its paging file.
  • Page 26: Safe Removal

    Only Windows 7 supports page file encryption (ignored for other operating systems). 9.4 Safe Removal Unplugging the Chameleon device while writing data to the encrypted drive may result in data corruption. This is similar to removing an external hard disk in the middle of a write to it. To be absolutely sure that no writes are occurring, use the Windows Safe Remove function before unplugging the device.
  • Page 27: Backing Up Your Data

    WARNING: Do not copy the backup ChameleonDrives directory to the top level (root) of a drive (e.g. D:\ChameleonDrives). The Chameleon software cannot distinguish between the original and the copy. If identical drives are detected in the top level, the Chameleon software will not activate either drive. Any subdirectory or network location will work (e.g.
  • Page 28 Chameleon User Manual Doc# 100-03-080 LucidPort Technology, Inc. warrants to you that the Chameleon will be free from defects in materials and workmanship under normal use for the 90 day warranty period starting on your date of purchase. Your dated sales or delivery receipt is your proof of purchase date. You may be required to provide proof of purchase as a condition of receiving warranty service.
  • Page 29 Chameleon User Manual Doc# 100-03-080 The AES encryption technology in the Chameleon is classified by the United States government as an ECCN 5A002 item and can be exported under License Exception ENC, Sec. 740.17 (b)(3) of the Export Administration Regulations ("EAR"). The Chameleon may not be used or otherwise exported or re-exported into (or to a national or resident of) Cuba, Iran, North Korea, Sudan, or Syria.

Table of Contents