Solved

How can I protect USB port access through password protection...?

Posted on 2008-10-16
7
6,486 Views
Last Modified: 2012-05-05
I need to protect unauthorized user to access USB port of a particular system. I cant disable it from registry because being as administrator I have to use pen drive frequently....is there any password protection mechanism to lock USB port....I am using XP sp2...please let me know...
0
Comment
Question by:Tanmoyonline
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 8

Accepted Solution

by:
mikainz earned 20 total points
ID: 22734166
as far as I know this is not possible.
You need 3rd party software like devicelock see http://www.devicelock.com/dl/
 
0
 
LVL 8

Expert Comment

by:eXpeLLeD_4RM_heLL
ID: 22735018
0
 

Author Comment

by:Tanmoyonline
ID: 22735560
I know how to disable usb port from registry & windows usbstor.inf & pnf file.....but i dont want to disable...i want to lock usk port with some password protection mechanism...
0
 
LVL 8

Expert Comment

by:eXpeLLeD_4RM_heLL
ID: 22742844
sorry my bad, then you gonna have to try a 3rd party software like the one mikainz suggested.
0
 
LVL 1

Expert Comment

by:sledneck69
ID: 22888312
This should be most helpful,very inexpensive and effective
http://www.idsecuritysuite.com/products/id-usb-lock-key.htm
0

Featured Post

Space-Age Communications Transitions to DevOps

ViaSat, a global provider of satellite and wireless communications, securely connects businesses, governments, and organizations to the Internet. Learn how ViaSat’s Network Solutions Engineer, drove the transition from a traditional network support to a DevOps-centric model.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Configuring Remote Assistance for use with SCCM
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question