How to use software to add "lock" to computer hardware

  
Everyone said that using computer is software, the importance of software is self-evident. However, as the basis of the computer, hardware is the most basic element to ensure the reliable operation of the software. In fact, software and hardware are mutually dependent and interdependent. For example, in many cases, for security reasons, we often want to make the necessary restrictions on the use of hardware. The easiest way to handle this is to use a variety of security software to lock the relevant hardware. This article introduces several software related to hardware security. Below, the system home Xiaobian introduces you how to implement ADSL Modem, camera, keyboard and mouse, printer, USB port, Bluetooth, CD-ROM, IEEE1394, infrared port. , technology such as network card locks. I hope that I can start the role of throwing bricks and lead the jade, and guide everyone to discover more security software to better realize the safe use of hardware. For the ADSL cat plus "dark lock", neighbor Wang Ayi recently bought a new computer, installed broadband, wonderful network world, brought a lot of fun to Wang Ayi's family life. However, the troubles followed, and the children of Wang Ayi’s family fell in love with online games, causing the academic performance to decline. This makes Wang Ayi very worried, it seems necessary to take control measures to prevent children from indulging in the network. The unit technician introduced the unique encryption software of ModemLockDown to Wang Ayi, which can easily lock the ADSL Modem. Without the permission of Wang Ayi, the children can't play the game online. Under the supervision of Aunt Wang, the child’s academic performance finally went up. ModemLockDown can follow the system automatically, and has a strong anti-official shutdown function. When it is first run, the password configuration panel will pop up in the lower right corner of the screen (as shown in Figure 1). Enter the administrator password in the “Administration Password” field, and use this password to perform ModemLockDown management operations, such as changing the password and locking ADSL. Modem, set the time range for automatic lock, adjust the ModemLockDown configuration, and so on. Enter the ADSL Modem unlock password in the “Unlock Password” field. ModemLockDown provides three methods for locking the modem. One is to manually lock the ADSL Modem by clicking the “Lock Modem” option directly on the ModemLockDown right-click menu. After that, all network connections can be cut off. To unlock it, click on the “Unlock Modems” option on the above menu and enter the unlock password. The second is the automatic lock function. Click the “Administration” item on the ModemLockDown right-click menu. After entering the administrator password, click the second button on the vertical toolbar on the left side of the settings window. In the right window (Figure 2) Select the <quo;Automatically lock” item in the list to indicate that the Modem can be automatically locked when ModemLockDown is started. Click the <;Automatically lock dialup modems when I disconnect" item. When the red check mark appears on the left side of the item, it means that ModemLockDown can immediately lock the modem when you disconnect the network. Click the “Lock non-dialup modems” item, when a red check mark appears on the left side of the item, it means that the lock operation is only for the Modem of the non-dial type. In order to enhance the concealment of the operation, click the “Stealth mode” item, and set the activation hotkey in the pop-up window (Figure 3). When the OK button is clicked, ModemLockDown can enter the hidden operation state. Then click the hotkey again to reopen its configuration window. The third is to lock the Modem periodically. In the above list, select the “Use user schedules” item to indicate that the Modem is locked according to the time range preset by the user. Click the third button in the vertical toolbar on the left side of the settings window, and the plan lock function can be set in the right window (Figure 4). In the “Scheduled User Access" list selection time period, click the “Access” button to add a green mark to it. Similarly, multiple time periods can be added, and then the Modem can be automatically locked when entering the preset time range. Adding a lock to the keyboard and mouse Xiao Li is a movie fan. He likes to download the latest movies from the Internet. After that, he is comfortable lying on the sofa and holding a book to enjoy the wonderful blockbuster. This is the most pleasant thing for Xiao Li. However, during the viewing process, the buttons and touchpads on the books are often inadvertently touched, causing the book to suddenly become uncomfortable. It is not accidentally opening other programs, or suddenly interrupting the movie playback, which makes Xiao Li unable to watch the movie normally. It seems necessary to lock the mouse without affecting the movie, so that you can enjoy the visual feast quietly. With the help of KeyboardLock, a free gadget, Xiao Li’s troubles were finally lifted. Download address: http://keylock.booring.net/bin/full.zip. KeyboardLock requires support for the .NET FrameWork 3.5 component, which uses system hook technology that allows you to set a lock cipher. At any time, KeyboardLock can instantly lock the system by typing a lock on the keyboard. When the system is locked, it does not affect the operation of other programs, but the keyboard and mouse are in a state of failure. Although the mouse can move normally, only the click operation has no effect. The system is like a "set-up" & rdquo; in general, can not accept any input action of the keyboard and mouse. Enter the lock cipher in the main KeyboardLock window (Figure 5) (default is “cake”), click the “Start” button, KeyboardLock is active. As long as you enter a preset slang, the keyboard and mouse ambulance are in a failed state and you cannot do anything with the system. At the same time, when you want to be able to lock the mouse and keyboard at any time to lock the mouse and keyboard, then at any time enter the unlocking whisper to restore the vibrancy of the mouse and keyboard. All kinds of port lock company CEOs handed over some important documents to the secretary Xiaohua, telling him to keep it safe and not to let unrelated people contact. Xiaohua naturally does not dare to neglect, but can not always hold the computer, it seems that they have to think about other strategies. After some thinking, Xiaohua believes that as long as the possible leaks of the computer are completely closed, the data can naturally sit back and relax. With the software of Port Locker, Xiaohua finally found a good solution to the problem. Port Locker can completely block the connection between the USB port, IEEE 1394 port, network card port, optical drive port, printer port, infrared port and other computers connected to the outside world, just like locking all the windows and doors of the room. Let the data stored in the early computer be safe and secure. Download address: http://unistal.in/demo-downloads/PortLocker.zip. When you first run Port Locker, you need to set a password for it. You must enter it when you start Port Locker later. Click the “Configuration” button in the main window toolbar of Port Locker, and click on the “Settings”→“General Settings”→“Password” item on the left side of the window to change the management password on the right side of the window. Click the menu “Configuration” and “Resets” to display the port range that Port Locker allows to protect (see Figure 6), including the USB port, IEEE 1394 port, and all ports associated with the network card. Optical drive, printer, infrared port, etc. It is recommended to check the “All Ports” item to allow Port Locker to automatically lock all ports. Selecting the "Permanent Blocked" option in the "Lock Type" column indicates that all selected ports are completely blocked, and any data is prohibited from entering and leaving these ports. This is the most restrictive locking method, then click the "Apply” button, Activate Port Blocker port protection. To increase the flexibility of use, Port Locker also provides timing locking. Select the “Schedule Blocked” item in the “Lock Type” column, and check the “Lock when system is Idle” option in the next window (Figure 7), and set the system in the “Select Idle Time X Minutes” column. Leisure time. For example, set it to 5 minutes, so that the system idle time is more than 5 minutes, Port Locker can automatically lock all ports. Check the box to check the “Select Duration” to set the lock time range. For example, in order to prevent someone from illegally stealing data after work, you can enter “12:00:00” in the "From” column, enter “14:30:00” in the "To” column, click “ The Add” button adds the lunch break to the locked time period. In the same way, other time periods can be added as well. Then click the “Apply” button to activate the Port Locker's timed port lock feature. After locking the USB port, you want to use your own USB flash drive, and you don't want to unlock the Port Locker protection. What should I do? The device whitelist function provided by Port Locker can effectively solve this problem. Before locking all ports, click on the menu “Configuration”→“Device Permissions”, check the “USB White List” option, connect your USB flash drive, click the “Enumerate” button to get the details of the USB flash drive. Then click the “Add” button to add it to the whitelist. Click the “Apply” button to save the whitelist information. This way, you can freely use your own USB stick even if you get into the most restrictive protection status of Port Locker. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved