USB Storage Device Protection Software

Article Preview

Abstract:

U disk is the most convenient external memory, it is simple and easy to carry, but at the same time it is best tools to bring the virus. Limiting the use of USB interface effectively not only can limit the circulation of the virus, but also can play a part in safety precautions. In fact ,the easiest way of restricting USB interface is to modify the registry,but for many users, dealing with Registry keys is a boring job,for ordinary users, the application is the best way to solve this problem. This article describes a software development process, focusing on how to use C # to modify the registry key and password protection settings, to provide some reference for computer enthusiasts.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

244-249

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang Ding Lei, A the Exploitation on the Telecommunication Module of Computer Based on the Interface of USB. Zhengzhou University 2005-10-25

Google Scholar

[2] YAO Aiqin, SUN Yunqiang, SHI Xiling Key Lab on Instrumentation Science & Dynamic Measurement of The Ministry Education of China North China Institute of Technology 030051Shanxi China. Data acquisition systems based on USB [A]. Proceedings of the 5th International Symposium on Test and Measurement (Volume 1) [C], 2003.

Google Scholar

[3] LI Yongke, Dong Hairui, Chen Zi-li, Department of Optical and Electronic Engineering, Mechanical Engineering College, Shijiazhuang 050003, China. UAV Telemetry Data Acquisition System Based on Virtual Instrument Technology [A]. Proceedings of the 5th International Symposium on Test and Measurement (Volume 1)[C], 2003 .

Google Scholar

[4] Wang Hepingpang, Na Li, Jianming Department of Electrical Engineering; Shanxi Higher Vocational college of Power Taiyuan; Shanxi; 030021 Data Acquisition System of ECG with USB Storage Device  Proceedings of 6th International Symposium on Test and Measurement(Volume 1) , (2005)

Google Scholar

[5] YU Changsheng ,Dynamic Monitor and Static Analysis of Windows NT Registry Computer Applications, 2003-3-1

Google Scholar

[6] Meng Wanhua, RESEARCH ON SEVERAL KEY TECHNIQUES OF PROHIBITING OR PERMITTING USING WINDOWS2000/XP REGISTRY EDITOR, Computer Applications and Software 2004-04-051.

Google Scholar

[7] Mike Elliott, "C# and XML Source Code Documentation", unpublished.

Google Scholar

[8] T-C, "Load and save objects to XML using serialization", unpublished.

Google Scholar

[9] LIU Xing-quan, YANG Hai-yan, SHI Hong-fei, How to Compile Context Help Files of Internet Applications——HTML Help Workshop for Example, Computer and Modernization, 2005-12-24.

Google Scholar

[10] KingLeon, "Integrate Help into Your .NET Apps", unpublished.

Google Scholar