Knowledge

User talk:XFireRaidX

Source 📝

88:
which shouldn't really be there (it's not intended to be a comparative article). I've had misgivings about the whole "Similar/Competing Products" section since I was prompted to include it for exactly this reason. It might be better to simply move it out into a separate article comparing hardware/software full disk encryption, or possibly expanding the current software full disk encryption article. If, instead, that section is kept, then it probably does need to be expanded out to list what significant features the IronKey has or lacks that differentiate it from other similar solutions (software or hardware), otherwise comparison becomes fairly meaningless. I feel that incomplete information can be worse than none. Either way, I appreciate your input for this. —
62:
commercial flash drives that do). I'm simply trying to put accurate information for comparison purposes. I haven't once tried to hide or remove any information regarding this, I'm actually glad that someone put in the initial basic edit about software based comparison and just felt it needed further clarification. —
87:
I'm not trying to misrepresent anything, simply trying to stick to the facts. I fully agree that different solutions offer different functionality--TrueCrypt's hidden partitions is one I've always considered a winning argument in certain cases. I've just been trying not to put too much in the article
61:
functionally equivalent. Adding further software on top of the straight full disk encryption gets you closer and closer to the Personal/Enterprise models, though I must admit I'm not aware of any current straight software solution that replicates the Enterprise model (there are a couple of other
25:
page. I've been trying to make it clear on the article page that a cheaper equivalent to an IronKey can be created using software based full disk encryption along with a couple of other pieces of software. What exactly is it about this that you disagree with? Thanks. —
56:
Software based full disk encryption gives the the same functionality as the Basic model IronKey. The Personal and Enterprise models add a lot of extra features that require more than just adding disk based encryption, and hence are
73:
You're misrepresenting things because software solutions also offer significant functionality that ironkey doesn't. You're giving a one-sided view of them
42:
give effectivly the same functionality. You're just trying to misrepresent them by trying to play this fact down.
74: 43: 89: 63: 27: 92: 82: 66: 51: 30: 22: 21:Hi, just wanted to discuss your edits of the 8: 36:The software alternatives to Ironkey 7: 14: 1: 93:01:25, 28 January 2010 (UTC) 83:00:10, 28 January 2010 (UTC) 67:23:59, 26 January 2010 (UTC) 52:23:33, 26 January 2010 (UTC) 31:09:49, 24 January 2010 (UTC) 117: 78: 47: 108: 116: 115: 111: 110: 109: 107: 106: 105: 19: 12: 11: 5: 114: 112: 104: 103: 102: 101: 100: 99: 98: 97: 96: 95: 18: 15: 13: 10: 9: 6: 4: 3: 2: 113: 94: 91: 86: 85: 84: 80: 76: 72: 71: 70: 69: 68: 65: 60: 55: 54: 53: 49: 45: 41: 40: 35: 34: 33: 32: 29: 24: 17:IronKey edits 16: 58: 38: 37: 20: 75:XFireRaidX 44:XFireRaidX 90:Endareth 64:Endareth 28:Endareth 23:IronKey 79:talk 48:talk 59:not 81:) 50:) 39:do 77:( 46:(

Index

IronKey
Endareth
09:49, 24 January 2010 (UTC)
XFireRaidX
talk
23:33, 26 January 2010 (UTC)
Endareth
23:59, 26 January 2010 (UTC)
XFireRaidX
talk
00:10, 28 January 2010 (UTC)
Endareth
01:25, 28 January 2010 (UTC)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.