Sorry to disagree. Its quite common in secure environments, since memory sticks are easier to monitor than bits on a wire and need more co-operation from the user than a subconscious click on the "allow access" button.
I also have to request for for a key file and would like to know, what...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.