SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Write Protect USB Devices
                               in Windows XP
                                             Dustin Hurlbut

    In the recent release of Windows XP Service Pack 2 (SP2), a new feature was added by Microsoft to
allow the write protection of USB block storage devices. This entails a simple Registry modification that
requires no hardware devices to write protect thumb drives. This allows us to examine and duplicate
USB devices with write protection that previously didn’t exist.
    To enable this feature, we’ll go step by step to modify the Registry. As in all Registry operations, it is
advisable to back up your Registry files prior to modification. You can do this easily by either creating a
Restore Point in XP or by using FTK Imager to look at your own drive and export the Registry Files.
    To create a Restore Point, go to Start > Programs > Accessories > System Tools > System Restore
(see below). Once at the System Restore dialog box, select “Create a restore point” and follow the
steps. This creates a backup of selected system files that can then be enabled to restore the system
back to the state it was in.




To create the necessary Registry values to enable USB write protection, follow these steps:

Step 1 - Go to Start > Run and type in regedit.




                                                  Page 1
Step 2 - Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSet and highlight the Control
key. The CurrentControlSet key has system information about the current configuration of the machine.
The system keeps a backup of this key. You will see the current and backup listed as ControlSet001
and 002 in this example. The select key will show which is valid. The key CurrentControlSet is the one
being used at this moment and is the one you want to modify.




                         Highlight the
                         Control Key
                                                                           Select Key Showing the
                                                                            Current Control Set
                                                                                    (001)




Step 3 - Right click on Control and select New > Key. Name the key StorageDevicePolicies.




                                             Page 2
Step 4 - Right click on StorageDevicePolicies and select DWORD. Name the value WriteProtect.




Step 5 - Right click (or double click) on WriteProtect and select Modify. To write protect USB devices
select 1 as the value. To turn off write protection, change this value to 0.




                                              Page 3
We have created a new key and value in the Registry that will write protect USB devices. You may
want to place this on your examination machine full time. However, if you need to be able to switch back
and forth from a write protected state to an non write protected state, it is cumbersome to have to go
through this procedure each time. To automate this process, create a .REG file to enable you to select
either on or off.

   To create a write protect switch, right click on the key StorageDevicePolicies we just modified and
select "Export". Name it and you can send a file with the extension of .reg to your Desktop. Name it
"USB Write Protect ON".




   Recreate the key with the switch turned off to un-write protect the USB making another .reg file. You
can activate either .reg file by clicking on it to modify the Registry key.

   Be sure to test and verify this procedure and write protect function. The National Center for
Forensic Science (NCFS) has a free program available to automate this function. They also have a five

                                              Page 4
step validation process for verification that the program functions properly. This would also work for vali-
dation of the process described in this paper.


References:

1.      Change to Functionality in Microsoft Windows XP Service Pack 2 - Part 7: Other Technologies
        Published: August 9, 2004 | Updated: September 15, 2004
        By Starr Andersen, Technical Writer; Vincent Abella, Technical Editor
        Microsoft TechNet Article:
        http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/
        sp2otech.mspx

2.      National Center for Forensic Science (NIJ)
        http://ncfs.ucf.edu/home.html - Reference the Link: NCFS Software Write-block XP




© 2005 AccessData Corporation – All rights reserved.
Some topics and items in this paper are subject to change. This document is for information purposes only. Ac-
cessData makes no warranties, express or implied, in this document. AccessData, Forensic Toolkit, FTK, FTK
Imager, Known File Filter, KFF, Password Recovery Toolkit, PRTK, Registry Viewer, Ultimate Toolkit, Li-
censeManager and WipeDrive are either registered trademarks or trademarks of AccessData Corporation in the




                                                Page 5

Contenu connexe

Similaire à Usb Write Protect En Us

Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeologyWindows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeologyMichael Gough
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Yashpal Rathore
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration toolsDuggesh Talawar
 
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxLab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxDIPESH30
 
Optimize Your Computer
Optimize Your ComputerOptimize Your Computer
Optimize Your ComputerShan Sachwani
 
Registry hacks speed_up_xp
Registry hacks speed_up_xpRegistry hacks speed_up_xp
Registry hacks speed_up_xpopptecnologia
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...Concentrated Technology
 
SysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc RecoverySysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc RecoverySysInfoTools Software
 
MSI / Windows Installer for NGN 'Dummies'
MSI / Windows Installer for NGN 'Dummies'MSI / Windows Installer for NGN 'Dummies'
MSI / Windows Installer for NGN 'Dummies'Roel van Bueren
 
How To Make System Work Faster
How To Make System Work FasterHow To Make System Work Faster
How To Make System Work FasterGaurav bhatnagar
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUSfauscha
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility programDhani Ahmad
 
Configuration testing
Configuration testingConfiguration testing
Configuration testingfarouq umar
 
Corrupt Backup
Corrupt BackupCorrupt Backup
Corrupt BackupJhone Smit
 
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxCASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxketurahhazelhurst
 

Similaire à Usb Write Protect En Us (20)

Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeologyWindows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech)
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration tools
 
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxLab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
 
Optimize Your Computer
Optimize Your ComputerOptimize Your Computer
Optimize Your Computer
 
Registry hacks speed_up_xp
Registry hacks speed_up_xpRegistry hacks speed_up_xp
Registry hacks speed_up_xp
 
Experimentos lab
Experimentos labExperimentos lab
Experimentos lab
 
SysInfoTools OpenOffice Base Repair
SysInfoTools OpenOffice Base RepairSysInfoTools OpenOffice Base Repair
SysInfoTools OpenOffice Base Repair
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
 
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
TechMentor Fall, 2011 - Packaging Software for Automated Deployment with Wind...
 
SysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc RecoverySysInfoTools OpenOffice Calc Recovery
SysInfoTools OpenOffice Calc Recovery
 
MSI / Windows Installer for NGN 'Dummies'
MSI / Windows Installer for NGN 'Dummies'MSI / Windows Installer for NGN 'Dummies'
MSI / Windows Installer for NGN 'Dummies'
 
How To Make System Work Faster
How To Make System Work FasterHow To Make System Work Faster
How To Make System Work Faster
 
ANTIVIRUS
ANTIVIRUSANTIVIRUS
ANTIVIRUS
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility program
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Corrupt Backup
Corrupt BackupCorrupt Backup
Corrupt Backup
 
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxCASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
 

Plus de Erol Dizdar

Kardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiKardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiErol Dizdar
 
ENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERErol Dizdar
 
KAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİKAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİErol Dizdar
 
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİSİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİErol Dizdar
 
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİSİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİErol Dizdar
 
ÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiErol Dizdar
 
TIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİTIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİErol Dizdar
 
Anksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıAnksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıErol Dizdar
 
Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Erol Dizdar
 
Yaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıYaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıErol Dizdar
 
GEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIGEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIErol Dizdar
 
Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Erol Dizdar
 
AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2Erol Dizdar
 
AKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIAKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIErol Dizdar
 
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiCOVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiErol Dizdar
 
Kendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakKendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakErol Dizdar
 
Bilgisayar İlk Yardım
Bilgisayar İlk YardımBilgisayar İlk Yardım
Bilgisayar İlk YardımErol Dizdar
 
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Erol Dizdar
 
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Erol Dizdar
 
Mazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakMazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakErol Dizdar
 

Plus de Erol Dizdar (20)

Kardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem TerminolojisiKardiyovasküler Sistem Terminolojisi
Kardiyovasküler Sistem Terminolojisi
 
ENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLERENDOKRİN SİSTEME AİT TERİMLER
ENDOKRİN SİSTEME AİT TERİMLER
 
KAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİKAN TERMİMOLOJİSİ
KAN TERMİMOLOJİSİ
 
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİSİNDİRİM SİSTEMİ TERMİNOLOJİSİ
SİNDİRİM SİSTEMİ TERMİNOLOJİSİ
 
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİSİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
SİNİR SİSTEMİ VE PSİKİYATRİ TERİMLERİ
 
ÜrinerSistem Terminolojisi
ÜrinerSistem TerminolojisiÜrinerSistem Terminolojisi
ÜrinerSistem Terminolojisi
 
TIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİTIBBİ TERMİNOLOJİ
TIBBİ TERMİNOLOJİ
 
Anksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) BozukluklarıAnksiyete(Kaygı) Bozuklukları
Anksiyete(Kaygı) Bozuklukları
 
Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?Akılcı İlaç Kullanımı Ne Demektir?
Akılcı İlaç Kullanımı Ne Demektir?
 
Yaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç KullanımıYaşlı Hastada İlaç Kullanımı
Yaşlı Hastada İlaç Kullanımı
 
GEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMIGEBELİKTE AKILCI İLAÇ KULLANIMI
GEBELİKTE AKILCI İLAÇ KULLANIMI
 
Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?Akılcı İlaç Kullanımı (AİK) nedir?
Akılcı İlaç Kullanımı (AİK) nedir?
 
AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2AKILCI ANTİBİYOTİK KULLANIMI 2
AKILCI ANTİBİYOTİK KULLANIMI 2
 
AKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMIAKILCI ANTİBİYOTİK KULLANIMI
AKILCI ANTİBİYOTİK KULLANIMI
 
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma RehberiCOVID-19 Salgın Yönetimi ve Çalışma Rehberi
COVID-19 Salgın Yönetimi ve Çalışma Rehberi
 
Kendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmakKendi vpn sunucunuzu kurmak
Kendi vpn sunucunuzu kurmak
 
Bilgisayar İlk Yardım
Bilgisayar İlk YardımBilgisayar İlk Yardım
Bilgisayar İlk Yardım
 
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
Düzce ve Çevresinde Gıda Olarak Tüketilen Yabani Bitkilerin Tüketim Biçimleri...
 
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
Düzce Bitki Biyolojik Çeşitliliği, Endemik, Nadir Bitki Taksonları ve Koruma ...
 
Mazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmakMazeretleri yıkarak başarılı olmak
Mazeretleri yıkarak başarılı olmak
 

Dernier

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Dernier (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Usb Write Protect En Us

  • 1. Write Protect USB Devices in Windows XP Dustin Hurlbut In the recent release of Windows XP Service Pack 2 (SP2), a new feature was added by Microsoft to allow the write protection of USB block storage devices. This entails a simple Registry modification that requires no hardware devices to write protect thumb drives. This allows us to examine and duplicate USB devices with write protection that previously didn’t exist. To enable this feature, we’ll go step by step to modify the Registry. As in all Registry operations, it is advisable to back up your Registry files prior to modification. You can do this easily by either creating a Restore Point in XP or by using FTK Imager to look at your own drive and export the Registry Files. To create a Restore Point, go to Start > Programs > Accessories > System Tools > System Restore (see below). Once at the System Restore dialog box, select “Create a restore point” and follow the steps. This creates a backup of selected system files that can then be enabled to restore the system back to the state it was in. To create the necessary Registry values to enable USB write protection, follow these steps: Step 1 - Go to Start > Run and type in regedit. Page 1
  • 2. Step 2 - Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSet and highlight the Control key. The CurrentControlSet key has system information about the current configuration of the machine. The system keeps a backup of this key. You will see the current and backup listed as ControlSet001 and 002 in this example. The select key will show which is valid. The key CurrentControlSet is the one being used at this moment and is the one you want to modify. Highlight the Control Key Select Key Showing the Current Control Set (001) Step 3 - Right click on Control and select New > Key. Name the key StorageDevicePolicies. Page 2
  • 3. Step 4 - Right click on StorageDevicePolicies and select DWORD. Name the value WriteProtect. Step 5 - Right click (or double click) on WriteProtect and select Modify. To write protect USB devices select 1 as the value. To turn off write protection, change this value to 0. Page 3
  • 4. We have created a new key and value in the Registry that will write protect USB devices. You may want to place this on your examination machine full time. However, if you need to be able to switch back and forth from a write protected state to an non write protected state, it is cumbersome to have to go through this procedure each time. To automate this process, create a .REG file to enable you to select either on or off. To create a write protect switch, right click on the key StorageDevicePolicies we just modified and select "Export". Name it and you can send a file with the extension of .reg to your Desktop. Name it "USB Write Protect ON". Recreate the key with the switch turned off to un-write protect the USB making another .reg file. You can activate either .reg file by clicking on it to modify the Registry key. Be sure to test and verify this procedure and write protect function. The National Center for Forensic Science (NCFS) has a free program available to automate this function. They also have a five Page 4
  • 5. step validation process for verification that the program functions properly. This would also work for vali- dation of the process described in this paper. References: 1. Change to Functionality in Microsoft Windows XP Service Pack 2 - Part 7: Other Technologies Published: August 9, 2004 | Updated: September 15, 2004 By Starr Andersen, Technical Writer; Vincent Abella, Technical Editor Microsoft TechNet Article: http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/ sp2otech.mspx 2. National Center for Forensic Science (NIJ) http://ncfs.ucf.edu/home.html - Reference the Link: NCFS Software Write-block XP © 2005 AccessData Corporation – All rights reserved. Some topics and items in this paper are subject to change. This document is for information purposes only. Ac- cessData makes no warranties, express or implied, in this document. AccessData, Forensic Toolkit, FTK, FTK Imager, Known File Filter, KFF, Password Recovery Toolkit, PRTK, Registry Viewer, Ultimate Toolkit, Li- censeManager and WipeDrive are either registered trademarks or trademarks of AccessData Corporation in the Page 5