When the notebook hits the SBA U disk, I want to "steal" the data.

  
Whether it is a student dormitory or a house or company that is shared with people, it is inevitable that there will be a brother who owes you a hand to copy something from your computer. . If your computer supports SBA technology, you can easily solve the above problems. In the special topic of this issue, we introduced how to encrypt storage devices such as USB flash drives or removable hard drives. However, the problem we are discussing today is to prevent others from using the storage device to “steal away” files from your computer, so the idea of ​​prevention should also be transferred to the connection port between the computer platform and the storage device: USB. SBA software and hard platform requirements SBA (Small Business Advantage) is an auxiliary management and maintenance technology introduced by Intel, as long as your computer is equipped with Core i series processors of the second generation or above (Pentium does not support ), and the chipset is B75 (desktop), QM77/QS77/HM77/UM77 (notebook) can be installed and used. SBA software download address: http://www.dwz.cn/9lRVt, after downloading, unzip and run IntelOEMWizard.exe, according to the installation wizard. Blocking the source of data breaches SBA technology provides the "USB Interceptor" function, which, as the name suggests, intercepts USB devices that are recognized by the system, thereby preventing data in the computer from being copied without permission. The setting method is also very simple. Click the “Edit Settings” button on the USB Interceptor interface (Figure 1), enter the login password and security question (Figure 2), and you can manage all USB devices uniformly (Figure 3). ), before clicking Save, make sure the computer is not connected to any USB device, otherwise it will not be saved. 01----In addition to USB interception, SBA also supports rich functions such as system update, automatic backup and recovery. 02----This group of passwords should be kept in mind. 03----It is recommended to set all USB devices in Unallowed status Next, you can connect your U disk, mobile phone and computer to the “Exceptions” option interface in the USB Interceptor settings, and put them in the “Allow these devices” list (Figure 4). After saving and exiting, in addition to the USB peripherals you added in the exception, other people's U disk, mobile hard disk will not respond to your computer connection, thus preventing data loss. 04----Add your own storage device to the list of allowed devices. Don't forget to click the logout button. What if someone else uses the exception feature to allow other USB devices to use? In order to ensure that nothing is lost, after you complete the above operation, you must remember to click the “Logout” button in the upper right corner of the main interface (Figure 5). At this point, if someone wants to enter the SBA software to make any settings changes, they need to enter the login password (that is, the set of passwords that are prompted to be added). If there is no password, naturally no other allowed devices can be added. 05----Be sure to log out after the setup is completed, otherwise it will give others a chance to take advantage of the 2012 B75 chipset motherboard sales, and the brand's multi-business notebooks also support SBA technology, but many The product was shipped without pre-installed this software, and the manufacturer did not deliberately promote the practicality of SBA. I hope that through this article, more computer users who meet the needs of the SBA application environment will try this cool security software. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved