We often encounter U disk automatic operation of the situation, although to a certain extent to bring us convenience, but the U disk after all do not recognize things, whether the program is good or bad it is all run, which leads to frequent Trojans to take advantage of the situation through automatic fish fishy infection u disk. We can take the following three kinds of strong measures to prevent the U disk to start the Trojan horse.
One, Disable the displaying of icons for shortcuts (suppresses ICO, this scenario will appear to cause many of your icons are displayed whiteboard, not recommended).
Methods: Run "Start-run" one at a time, enter Regedit.exe, navigate to registry Hkey_classes_rootlnkfileshellexiconhandler, right-click Select Iconhandler Select Export, Save it as a Iconhandlerbak.reg, restart the Explorer or reboot the computer, but in my test it looks like the desktop has become miserable.
Second, prohibit the automatic playback of USB (recommended).
This method is the most effective, the simplest way to achieve the virus.
Method: Open "Start → run", in the dialog box, enter the "gpedit.msc" command, and in the Group Policy window, select "In Computer configuration → administrative Templates → system", double-click "Turn off AutoPlay", select the "Enabled" option on the Settings tab, and turn off AutoPlay device selection. All drives "on it.
In addition, there is another way, is to plug the hard drive after the left shift button, you can prevent this autoplay.
Third, Disable the WebClient service (shut down the system WebClient services).
1. Enter "Services.msc" in the start-run, open the service settings, locate the "WebClient" service item, and if it is in the running state, close it first, then modify the startup type to "disabled".
The impact of this scenario is that WebDAV requests will not be transmitted, and any other service items that are significantly dependent on the "WebClient" service will be affected.
Above three kinds of tough measures can quickly and effectively prevent U disk automatic running Trojan, of course, every measure in the solution after the Trojan will produce some "sequela", to some extent to the system brought some impact, of course, these than Trojan intrusion system, it is easy to solve more. I'm sure you won't hate the tough solution above.