background image

页面 52

IMATION PERSONAL – IRONKEY 提供技术支持 – 用户指南

后单击“继续”按钮。

7.  将会出现一条提示信息表明已发送邮件至您的邮箱。按照邮件中的说明来设置您的在

线帐户;包括创建一个“安全问题”。

• 

您的在线帐户要求一些安全功能,例如重置密码,使用安全会话浏览网页,更新

设备软件以及更多功能。

8 . 

一旦为您的设备建立了在线账户,单击信息提示中的“确定”可继续设置设备。

9 . 

设备初始化。在此进程期间,将会生成 AES 加密密钥,为安全卷创建文件系统,并

将安全应用程序和文件复制到安全卷。

10. 当初始化完成后,会出现 Imation 控制面板。您的设备现在可以保护您的数据并能够

用于 Windows,Mac 或 Linux 计算机。

• 

如果您想要添加或修改显示在解锁屏幕上的信息,请参阅在忘记密码时访问我的

设备。

解锁设备

Windows 和 Mac 的解锁程序相同。对于 Linux 系统,请参阅在 Linux 系统上使用我的

设备。

1.  插入您的设备并等待解锁窗口出现。

如果解锁窗口并未出现,您可以通过以下方式手动开启:

• 

WINDOWS: 在“我的电脑”中双击“IronKey 解锁器”驱动并启动“IronKey.exe”。

• 

MAC: 在 Finder 中打开 IronKey 解锁器驱动并在 IronKey 解锁器 文件夹中打开 

IronKey 应用程序。

• 

注意:在 Mac 计算机上您可以安装自动启动助手,当您插入一个 Imation 设备时

它会自动打开解锁器。

2.  输入您的设备密码并单击“解锁”。将会出现 Imation 控制面板。

• 

或者,您可以单击“只读模式”复选框,在只读模式下解锁设备。

• 

正确输入您的密码(已在硬件中验证的密码)将安装携有您的全部安全应用程序

和文件的安全卷。

• 

连续 10 次输入错误密码将永久毁坏设备和您的全部板载数据。如果您正在使用 

Imation 企业设备,错误密码的输入次数可能由系统管理员管理定义的密码设置来

决定。 

• 

作为安全防范措施,输入三次错误密码后,您必须拔出并重新插入设备。

只读模式下解锁设备

您可以在只读模式下解锁您的设备,以便其他人无法编辑您存放在安全文件驱动中的文

件。举例来说,当在使用一台非信任或未知计算机时,您想要访问您的设备里的一个文

件;以只读模式解锁您的设备将会防止该计算机上的恶意软件感染您的设备或修改您的

文件。

1.  插入您的设备并启动解锁程序。
2.  单击“只读模式”复选框。

3 . 

单击“解锁”按钮。

Summary of Contents for imation D250

Page 1: ...PAGE 1 IMATION PERSONAL POWERED BY IRONKEY USER GUIDE Imation Personal User Guide Models S250 D250 Updated October 2012...

Page 2: ...est security technologies and making them simple to use and widely available Years of research and millions of dollars of development have gone into bringing this technology to you We are very open to...

Page 3: ...ds with theVirtual Keyboard 13 Access my device if I forget my password 14 Change my password 14 Access my secure files 15 Encrypt and decrypt files 15 Create a secure backup of my files 15 Restore fi...

Page 4: ...matically 25 Edit and delete accounts and logins 25 Lock down accounts withVeriSignVIP 25 Back up and restore my Identity Manager data 25 Manage my online account settings 25 Change device nickname 26...

Page 5: ...folder and follow the onscreen instructions 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 Configuraci n d...

Page 6: ...ryptochip detects physical tampering by a hacker or if 10 consecutive incorrect password attempts have been entered it initiates a permanent self destruct sequence that securely erases all onboard dat...

Page 7: ...ata Your online account includes the SecurityVault If your device is ever lost or stolen you can easily restore your online passwords from this encrypted online backup Self Learning Password Managemen...

Page 8: ...his product There is no hocus pocus or handwaving here We use established cryptographic algorithms we develop threat models and we perform security analyses internal and third party of our systems all...

Page 9: ...hardware encrypted area inside the device not in the file system being first locally encrypted with 256 bit AES using randomly generated keys encrypted with a SHA 256 hash of your device password All...

Page 10: ...rsonal devices do not require any software or drivers to be installed Advertised capacity is approximate and not all of it will be available for storage Some space is required for onboard software Rec...

Page 11: ...is case sensitive and must be at least 4 characters long 4 Click the Enable Password Reset check box if you want to be able to recover your device if you forget your password 5 Type an email address i...

Page 12: ...lock the device in Read Only Mode Entering your password correctly which is verified in hardware will mount your secure volume with all your secure applications and files Entering the wrong password 1...

Page 13: ...P To uninstall it click on the Uninstall Auto Launch Assistant button LOCK DEVICE Click the Lock button in the bottom left of the Control Panel to safely lock your device You can also use the keyboard...

Page 14: ...ging and screenlogging spyware use the Imation Virtual Keyboard It helps protect your device password by letting you click out letters and numbers The underlying techniques in theVirtual Keyboard will...

Page 15: ...utton 5 A message prompt will appear indicating that an email has been sent to you Follow the instructions in the email to set up your online account this includes creating a secret ques tion 6 Once y...

Page 16: ...an also access your files by right clicking the IronKey icon on the Windows taskbar and clicking Secure Files Encrypt and decrypt files Everything you store on your Imation Personal device is encrypte...

Page 17: ...ot add alter or delete the backed up files or you may be prevented from restoring them later RESTORE FILESTO DEVICE FROM BACKUP FILE 1 In the Applications list of the Imation Control Panel click the S...

Page 18: ...rased Use my device on Linux You can use your Imation Personal device on several distributions of Linux x86 systems only with kernel version 2 6 SETUP UPTHE DEVICE 1 Plug the device into your computer...

Page 19: ...with the password devicepassword enter ironkey password devicepassword To lock the device you must either unmount and physically remove unplug it or else run ironkey lock Simply unmounting the device...

Page 20: ...ess their Imation Personal devices All of these methods require that the system administrator take one time action to enable access after that ordinary users can lock unlock and change passwords on an...

Page 21: ...open onboard Firefox by right clicking the IronKey icon in the Windows taskbar and clicking Secure Browser OPEN A SECURE BROWSING SESSION You must have an online account to open a secure web browsing...

Page 22: ...nd click Secure Sessions Bandwidth Meter Change identities You can change your apparent online identity to create a new random circuit and change the path of your encrypted web traffic As you will be...

Page 23: ...iew on Windows computers RESTORE ONBOARD APPLICATIONS You can restore your onboard applications if they are ever erased or corrupted Windows only 1 Unlock your device and click the Settings button on...

Page 24: ...tials such as login information and one time passwords to applications and online accounts You must have an online account to use Identity Manager Typcially you create the account during device setup...

Page 25: ...online account you will be asked if you want to en able the Identity Manager option Click Yes To start Identity Manager 1 Unlock your device and click the Applications button in the menu bar of the C...

Page 26: ...can lock down some important online accounts withVeriSign sVIP service so that they can only be accessed using your device Log into eBay or PayPal and the Identity Manager will guide you through the r...

Page 27: ...l appear indicating that an email has been sent to you Follow the instructions in the email to set up your online account this includes creating a secret ques tion 7 Once you have finished and have su...

Page 28: ...an incorrect secret question attempt You can also sign up to be notified of new Imation product announcements Edit Secret Questions and Answers Click the Edit button to modify your Secret Question res...

Page 29: ...omissions contained herein nor for incidental or consequential damages resulting from the furnishing or use of this material The information provided herein is subject to change without notice The in...

Page 30: ...PERSONAL IRONKEY Imation Imation Enterprise Enterprise Imation Imation Imation Enterprise RSA SecurID Enterprise Firefox Web Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB...

Page 31: ...Y Windows Firefox IronKey Mac Auto Launch Assistant LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey Unlocker IronKey exe MAC Finder IronKey Unlocker IronKey Unlocker Ironkey 2 Imation En...

Page 32: ...Enterprise 7 Web 8 OK 9 AES 10 Imation Windows Mac Linux Unlocker Windows Mac Linux Linux 1 Unlocker Unlocker WINDOWS Ironkey Unlocker IronKey exe MAC Finder IronKey Unlocker IronKey Unlocker Ironkey...

Page 33: ...32 IMATION PERSONAL IRONKEY 10 Imation Enterprise 3 1 Unlocker 2 3 Linux ironkey readonly Unlocker Imation Unlocker 1 2 3 7 200 Imation Enterprise...

Page 34: ...33 IMATION PERSONAL IRONKEY Imation 1 Imation Unlocker CTRL ALT V 2 Randomize Windows QWERTY CTRL L...

Page 35: ...34 IMATION PERSONAL IRONKEY Imation WINDOWS Windows Explorer MAC Finder Windows Ironkey Imation Cryptochip Personal Enterprise Personal 1 Unlocker 2 3...

Page 36: ...35 IMATION PERSONAL IRONKEY 4 OK 5 6 Personal Enterprise 1 Unlocker 2 3 4 5 Imation 1 2 3 Imation Windows...

Page 37: ...36 IMATION PERSONAL IRONKEY 1 1 Imation Windows 2 3 4 5 zip 1 Imation Windows 2 3 4 Imation...

Page 38: ...USB Linux ironkey DVD Linux ironkey Unlocker 2 Q Y 3 4 4 AES 5 UNLOCKER Linux Unlocker Linux Windows Mac Linux Linux DVD Linux ironkey 1 Imation ironkey Imation ironkey Linux ironkey devicename ironk...

Page 39: ...ROMSupport DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI HCD most Intel and VIA support DeviceDrivers USB Mass S...

Page 40: ...n com 5 Linux Imation Unlocker x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imation com 91...

Page 41: ...ERSONAL IRONKEY Imation Imation Enterprise Imation Imation Imation Enterprise ID RSA SecurID Enterprise Firefox Secure Sessions Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 U...

Page 42: ...ronKey ID Secure Sessions Mac Auto Launch Assistant ID LED Windows Mac Linux Linux 1 USB Imation DVD WINDOWS IronKey Unlocker IronKey exe MAC IronKey Unlocker IronKey Unlocker IronKey 2 Imation Enterp...

Page 43: ...olume Secure Volume 10 Imation Windows Mac Linux Unlocker Windows Mac Linux Linux 1 Unlocker Unlocker WINDOWS IronKey Unlocker IronKey exe MAC IronKey Unlocker IronKey Unlocker IronKey Mac Imation Unl...

Page 44: ...43 IMATION PERSONAL IRONKEY 1 Unlocker 2 3 Linux ironkey readonly Unlocker Imation Unlocker 1 2 3 7 200 Imation Enterprise Imation 1 Imation Unlocker CTRL ALT V 2 Enter Windows QWERTY...

Page 45: ...44 IMATION PERSONAL IRONKEY CTRL L Imation WINDOWS Windows MAC Windows Ironkey Imation Cryptochip Personal...

Page 46: ...45 IMATION PERSONAL IRONKEY Enterprise Personal 1 Unlocker 2 3 4 5 6 Personal Enterprise 1 Unlocker 2 3 4 5 Imation 1 2 3...

Page 47: ...46 IMATION PERSONAL IRONKEY Secure Backup Imation Windows Secure Backup 1 Imation Secure Backup Windows Secure Backup 2 3 4 5 1 Imation Secure Backup Windows Secure Backup 2 3 4 Imation...

Page 48: ...Linux ironkey Unlocker 2 Q Y 3 4 4 AES Secure Volume 5 UNLOCKER Linux Unlocker Linux Windows Mac Linux Linux DVD Linux ironkey Imation ironkey Imation ironkey Secure Volume Linux ironkey devicename i...

Page 49: ...ort DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI HCD most Intel and VIA support DeviceDrivers USB Mass Storage...

Page 50: ...10 Linux Imation Unlocker x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imation com 910 E H...

Page 51: ...50 IMATION PERSONAL IRONKEY Imation Imation Imation Imation Imation RSA SecurID Firefox Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB 1 1 Linux...

Page 52: ...51 IMATION PERSONAL IRONKEY Windows Firefox IronKey Mac LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey 2 Imation 3 Imation Imation 4 5 6...

Page 53: ...52 IMATION PERSONAL IRONKEY 7 8 9 AES 10 Imation Windows Mac Linux Windows Mac Linux Linux 1 WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey Mac Imation 2 Imation 10 Imation 1 2 3...

Page 54: ...53 IMATION PERSONAL IRONKEY Linux ironkey readonly Imation 1 2 3 7 200 IMATION Imation 1 Imation CTRL ALT V 2 WINDOWS CTRL L...

Page 55: ...54 IMATION PERSONAL IRONKEY Imation WINDOWS Windows MAC Finder WINDOWS IRONKEY Imation 1 2 3 4 5 6...

Page 56: ...55 IMATION PERSONAL IRONKEY 1 2 3 4 5 Imation 1 2 3 Imation Windows 1 Imation Windows 2 3 4 5...

Page 57: ...6 IMATION PERSONAL IRONKEY 1 Imation Windows 2 3 4 Imation Linux Linux Imation x86 2 6 1 USB Linux ironkey DVD Linux ironkey 2 Q Y 3 4 AES 5 Linux Linux Windows Mac Linux Linux ironkey DVD Linux Imati...

Page 58: ...ernel 2 6 Kernel DeviceDrivers SCSIDeviceSupport SCSICDROMSupport DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI...

Page 59: ...ttp support imation com 5 Linux Imation x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imati...

Page 60: ...59 IMATION PERSONAL IRONKEY Imation Imation Imation Imation Imation RSA SecurID Firefox Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB 1 1 Linux...

Page 61: ...PERSONAL IRONKEY Windows Firefox IronKey Mac Auto Launch Assistant LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey 2 Imation 3 Imation Ima...

Page 62: ...TION PERSONAL IRONKEY 6 7 8 9 AES 10 Imation Windows Mac Linux Windows Mac Linux Linux 1 WINDOWS IronKey IronKey exe MAC Finder IronKey Mac IronKey IronKey Auto Launch Assistant Imation 2 Imation 10 I...

Page 63: ...62 IMATION PERSONAL IRONKEY 1 2 3 Linux ironkey readonly Imation 1 2 3 7 200 IMATION Imation 1 Imation CTRL ALT V 2 QWERTY WINDOWS...

Page 64: ...63 IMATION PERSONAL IRONKEY CTRL L Imation WINDOWS Windows Explorer MAC Finder WINDOWS IRONKEY Imation 1 2...

Page 65: ...64 IMATION PERSONAL IRONKEY 3 4 5 6 1 2 3 4 5 Imation 1 2 3 Imation Windows 1 Imation Windows 2...

Page 66: ...65 IMATION PERSONAL IRONKEY 3 4 5 1 Imation Windows 2 3 4 Imation Linux Linux Imation x86 2 6 1 USB linux ironkey DVD linux ironkey 2 Q Y 3 4 4 AES 5...

Page 67: ...lock devicename devicename ironkey readonly devicepassword ironkey password devicepassword ironkey lock Linux 1 2 6 DeviceDrivers SCSIDeviceSupport SCSICDROMSupport DeviceDrivers Support for Host side...

Page 68: ...3 USB DVD DVD Linux Imation Imation 4 Linux http support imation com 5 Imation Linux x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecur...

Page 69: ...ispositivos de Enterprise Gestor de identidades RSA SecurID solo para dispositivos de Enterprise Firefox incorporado al dispositivo Teclado virtual y Sesiones seguras El sitio web de cuentas en l nea...

Page 70: ...necte el dispositivo Imation en el puerto USB de su equipo Aparece la pantalla Configu raci n de dispositivo El software de configuraci n se ejecuta autom ticamente desde un DVD virtual Puede que esta...

Page 71: ...dispositivo entre otras 8 Una vez configurada su cuenta en l nea para el dispositivo haga clic en Aceptar en el men saje de confirmaci n para continuar con la configuraci n del dispositivo 9 El dispo...

Page 72: ...o y ejecute el Desbloqueador 2 Haga clic en la casilla Modo de solo lectura 3 Haga clic en el bot n Desbloquear Ver un mensaje en el Panel de control que indica que se encuentra en Modo de solo lectur...

Page 73: ...lic sobre otros Adem s si lo desea puede hacer clic en el bot n Randomize Aleatorizar para cambiar el orden de las teclas Esta opci n le ayudar a protegerse frente a los registradores de pulsaciones d...

Page 74: ...s lida y siempre activa Arrastre un archivo a la unidad de archivos seguros para cifrarlos autom ticamente Los archivos que se abren desde la unidad de archivos seguros se descifran autom ticamente en...

Page 75: ...Ayuda para la contrase a haga clic en el bot n Restablecer la contrase a Se le enviar un correo electr nico con instrucciones sobre c mo continuar 4 Despu s de completar las instrucciones del mensaje...

Page 76: ...frar n y se les har una copia de seguridad NOTA Aunque los archivos est n cifrados de forma segura los nombres de archivos no Para ocultar los nombres de archivos comprima los archivos a los que desea...

Page 77: ...R EL DESBLOQUEADOR Utilice el Desbloqueador para acceder a los archivos y cambiar la contrase a del dispositivo en Linux lo cual le permite transferir de forma segura archivos entre equipos con sistem...

Page 78: ...determinado que viene con una distribuci n compatible no necesita llevar a cabo ninguna otra acci n Adem s en sistemas Linux de 64 bits deben instalarse bibliotecas de 32 bits para poder ejecutar el p...

Page 79: ...ibuciones compatibles 5 En este momento el Desbloqueador Imation para Linux solo admite sistemas x86 D nde obtener ayuda PARA OBTENER M S INFORMACI N ik imationmobilesecurity com forum Foro en l nea c...

Page 80: ...ire d identit s RSA SecurID p riph riques Enterprise uniquement Firefox le Clavier virtuel et les Sessions s curis es Le site Web des comptes en ligne et les e mails par d faut sont galement en anglai...

Page 81: ...mesWindows et Mac Pour les syst mes Linux reportez vous au paragraphe Utilisation du p riph rique sous Linux 1 Branchez le p riph rique Imation sur le port USB de votre ordinateur L cran Configuratio...

Page 82: ...ous avez configur votre compte en ligne pour votre p riph rique cliquez sur OK dans le message pour configurer le p riph rique 9 Le p riph rique s initialise Ce processus g n re une cl de cryptage AES...

Page 83: ...verrouilleur 2 Cochez la case Mode Lecture seule 3 Cliquez sur le bouton D verrouiller Un message s affiche dans le panneau de commande indiquant que vous tes en lecture seule Lorsque vous d verrouil...

Page 84: ...les saisissant et d autres en cliquant dessus Vous pouvez galement cliquer sur le bouton Randomize Al atoire afin de r organiser de mani re al atoire l emplacement des touches Ce syst me permet de vo...

Page 85: ...SB ordinaire tout en b n ficiant d une s curit renforc e et continue Faites glisser un fichier vers le disque Fichiers s curis s pour le crypter automatiquement Les fichiers ouverts depuis le disque F...

Page 86: ...on Aide sur le mot de passe 3 Dans l invite cliquez sur le bouton R initialiser le mot de passe Un e mail d instructions vous est envoy 4 Apr s avoir suivi les instructions de l e mail cliquez sur le...

Page 87: ...QUE Bien que les fichiers soient crypt s les noms de fichiers ne le sont pas Pour masquer les noms de fichiers zippez les fichiers sauvegarder avant de cr er le fichier de sauvegarde REMARQUE N ajoute...

Page 88: ...t pr t tre utilis UTILISER LE D VERROUILLEUR Utilisez le D verrouilleur pour Linux afin d acc der vos fichiers et de modifier votre mot de passe de p riph rique sous Linux Vous pouvez ainsi transf rer...

Page 89: ...eDrivers Prise en charge EHCI HCD USB 2 0 DeviceDrivers Prise en charge UHCI HCD Intel et VIA pour la plupart DeviceDrivers Syst me de stockage de masse USB Les noyaux inclus par d faut dans la plupar...

Page 90: ...les mots de passe sur tout p riph rique Imation branch 4 Distributions prises en charge Toutes les distributions Linux ne sont pas prises en charge Consultez le site l adresse http support imation co...

Page 91: ...der mitgelieferte Firefox Virtual Keyboard Virtuelle Tastatur und Secure Sessions Die Website f r das Online Konto und die Standard E Mail Adressen sind ebenfalls nur in Englisch verf gbar Dieser Abs...

Page 92: ...Das Ger t unter Linux verwenden 1 Stecken Sie das Imation Ger t in die USB Schnittstelle des Rechners Das Fenster Ger te Setup wird angezeigt Die Setup Software wird automatisch von einer virtuellen...

Page 93: ...das Online Konto f r das Ger t eingerichtet haben klicken Sie OK in der Eingabeaufforderung der Mitteilung um mit der Einrichtung fortzufahren 9 Das Ger t wird initialisiert W hrend dieses Prozess we...

Page 94: ...und starten Sie den Entsperrer 2 Klicken Sie das Ankreuzfeld Schreibgesch tzter Modus 3 Klicken Sie die Taste Entsperren Im Kontrollfeld wird eine Mitteilung angezeigt die darauf hinweist dass Sie sic...

Page 95: ...verwenden sodass Sie einige Zeichen eingeben und andere anklicken Sie k nnen optional auch die Taste Zuf llig festlegen dr cken um eine zuf llige Anordnung der Tasten zu schaffen Das hilft gegen Scree...

Page 96: ...eitsfunktion Das Ziehen einer Datei auf das Laufwerk Sichere Dateien verschl sselt diese automatisch Die auf dem Laufwerk Sichere Dateien ge ffneten Dateien werden beim ffnen automatisch entschl sselt...

Page 97: ...Sie im Fenster Kennwort Hilfe die Taste Kennwort Reset Es wird eine E Mail mit einer Anleitung f r das weitereVorgehen an Sie geschickt 4 Nachdem Sie diesen Anweisungen gefolgt sind klicken Sie die Ta...

Page 98: ...erden verschl sselt und das Backup erstellt HINWEIS Zwar sind die Dateien sicher verschl sselt die Dateinamen allerdings nicht Wenn Sie die Dateinamen unlesbar machen m chten erstellen Sie eine ZIP Da...

Page 99: ...schlossen ist dann ist das Ger t einsatzbereit DEN ENTSPERRERVERWENDEN Verwenden Sie den Entsperrer f r Linux um auf Ihre Dateien zuzugreifen und das Ger tepasswort unter Linux zu ndern So ist es m gl...

Page 100: ...ng Die Kernel die standardm ig in den meisten Distributionen enthalten sind verf gen ber diese Funktionen Wenn Sie also den Standardkernel verwenden der mit einer unterst tzten Distribution geliefert...

Page 101: ...erst tzt Bitte besuchen Sie http support imation com zu Informationen ber die aktuelle Liste unterst tzter Distributionen 5 Der Imation Entsperrer f r Linux unterst tzt derzeit nur x86 Systeme Wo find...

Reviews: