
Chameleon User Manual Doc# 100-03-090
Copyright © 2011, LucidPort Technology, Inc.
485 E. Evelyn Ave., Sunnyvale, CA 94086
Tel: (408)720-8800 Fax: (408)720-8900
www.lucidport.com
5
2.1 Uninstalling
You can uninstall the Chameleon software by locating “Chameleon” from the Windows start
menu and selecting “Uninstall” (Start > All Programs > Chameleon > Uninstall). Uninstalling
does not remove your encrypted drives. To remove the encrypted drives, delete the directory
ChameleonDrives from your hard disk’s top level directory (ex. C:\ ChameleonDrives\). The
ChameleonDrives directory can only be deleted when the Chameleon device is disconnected.
3 Chameleon Encrypted Drives: Protecting Your Data
Plug in your Chameleon device to access the encrypted drive. The encrypted drive appears like
any other hard disk in your system. You can store files in it, open files from it, install and run
programs from it, move files from one directory to another, and direct applications to use the
encrypted drive. Once the Chameleon device is removed, the encrypted drive disappears from
Windows. A forensic examination of your hard disk will reveal only encrypted, apparently
random, data.
Only files that are stored on the Chameleon drive are encrypted. Any files copied or read from
the encrypted drive are automatically decrypted. For instance, if a user were to attach a file from
an encrypted drive to an email, that file would be attached decrypted.
You can copy files to the encrypted drive simply by dragging and dropping them there.
However, this retains the original unencrypted file at its original location. A more secure method
is to right-click drag and drop. Hold down the right mouse button, then drag the selected file to
the encrypted drive. A dialog appears showing “Copy”, “Move”, and “Secure move”. The
secure move option moves the file into the encrypted drive, then scrubs away any traces of that
file from its original location.
2
If a significant amount of data is involved, this may take some
time.
2
The standard Windows move command copies the file, then marks the original file as deleted. The deleted file
may be recoverable with specialized tools. The secure move option prevents recovery by overwriting the deleted
file.