Teach you to easily resist the spread of the U disk virus in Windows

  
. The floppy disk has become a dusty history. I am afraid that the computer users who have not used the U disk are really rare. U disk has become a mainstream mobile storage medium with its increasingly compact size, rapidly expanding capacity, and cheaper and cheaper alternatives to floppy disks. With the popularity of mobile storage devices such as USB flash drives, mobile hard drives, and memory cards, the U disk virus has already become a disaster. Inadvertently, a virus or malicious program has infected your computer.
What is the U disk virus? U disk virus as the name suggests is a virus transmitted through the U disk, the virus that can be transmitted by generating AutoRun.inf, can be called U disk virus (also known as Autorun virus). Then, at this stage, it is impossible to eliminate the use of U disk, how to reduce the probability of poisoning? At this time, it is particularly important to master certain U disk virus protection measures and solutions. What should I do? Is it always possible to passively use anti-virus software to defend against it? Like car security technology, Windows 7 provides active defense technology in addition to passive defense —— restricts the running of programs on mobile storage. .
It is also very convenient to start this function, run gpedit.msc directly, open “local group policy editor”, find “computer configuration”, then expand to find “admin template”, then click &ldquo ;system”, find and click "Removable Storage Access”. All configurable removable storage access related policies are displayed on the right.
The U disk is a removable disk, so let's see how to set up an access policy for a removable disk.
Since Windows Vista, the system has been able to limit the reading and writing of removable disks, and everyone should be familiar with this. Moreover, simply limiting the reading and writing of the USB flash drive does not meet our needs. Can not read naturally will not be infected with the virus, but also lost the meaning of the U disk. Failure to write prevents information from being outflowed, but does not prevent virus intrusion.
What we need is a new feature from Windows 7 that refuses to execute permissions.
Click on the strategy and select “Enabled” to open the policy. Enabling this policy setting will deny execute permission on the removable storage class. Execution permissions for this removable storage class are allowed if this policy setting is disabled or not configured.

After setting the strategy, let's run the program on the U disk. The system directly gives hints that are not allowed to run:
Don't look at this prompt is a bit like UAC, but it can't be executed by changing the running account. Unless the policy is changed to allow execution permissions.
Copyright © Windows knowledge All Rights Reserved