One of the most common software encryption: Start encryption (Figure) _ Vulnerability Research

Source: Internet
Author: User

To start encryption:

1.BIOS

Currently, the simplest and easiest system password is the number of BIOS passwords. Set the BIOS password, each boot into the Windows operating system, the computer will be prompted to enter the BIOS password, only the correct input password, before the start of the winodows system, if the password is not correct, then the illegal intruder can only do points on the boot, shutdown operation.

Start the computer, press the DEL key, enter the BIOS setup interface (because the motherboard is different, BIOS version and operating interface is not the same, the user can refer to the motherboard instructions to set), select "BIOS FEATURES Setup (BIOS feature settings)" After entering the submenu (Figure 1), Move the indicator bar to security option, and set the existing parameter to System (password Authentication on power-on). Then press ESC to return to the main menu, then use the arrow keys to move the indicator bar to the Supervisor PASSWORD (Super User password), enter the password. After you set the superuser password, press the F10 key or move the bar to the Save & Exit Setup (Save settings and Exit BIOS program), and you will be prompted to save the changes, press the Y key to restart the computer, and the power-on password will be in effect. In this way, each time the computer starts from the power to the user will be the password, if the password is not correct, will not be able to start the operating system.

Figure 1

Hint: Although the BIOS power-on password has been in effect before the computer executes other programs, the security is relatively strong. However, if you open the chassis, you will be responsible for the battery discharge BIOS power or short BIOS 0 jumper, you can easily clean up the BIOS data (including power-on password information). Therefore, for the computer or server that has important data, it should be placed in the room with high safety performance, and it is also a good way to lock the chassis lock on the chassis.

2. "Encryption" optical drive and second hard drive

In general, we have hard drives and optical drives installed on our machines, under certain special conditions, we have to lock them, such as locking the optical drive to prevent anyone from using the optical drive to install software into our system, or locking the second hard drive if we put some secret information on the second hard drive.

Connect the second hard disk or optical drive to the second IDE port on the motherboard, then start the computer, enter the BIOS setup interface, move the cursor to the "Pnp,pci&onboard I/O" entry, and "Onborad IDE-2 Controller (onboard IDE2 Controller) "set to Disable (disabled), press F10 to save exit. Restart your computer, open into the Explorer window, and you will find all the devices hanging on the second IDE port on the motherboard are not visible! If you want to use them again, just press the DEL key at startup and enter the BIOS to set "Onborad IDE-2 Controller" to "Enalbe (available)" and press F10 to save the settings and reboot the system.

Tip: For other devices locking method and lock IDE-2 mouth, according to similar operation, we can lock the print port, serial port, USB and other computer ports, you do not have to worry about others through the U disk copy machine files or use the printer.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.