Instruction
1
The most reliable solution to this problem is the use of hardware protection that start to load the operating system of the computer. Such remedies are called "electronic locks". At the preparatory stage of use, follow the installation and configuration of the castle. Usually, tuning is performed by the security administrator.
2
First, create a list of users who are allowed access to the computer. For each user, create a key carrier. This can be a floppy disk, smart card or electronic tablet. List stored in the memory of the electronic lock. Next, make a list of the files that are to be protected: executable application modules, system libraries operating system templates are Microsoft Word documents and the like.
3
After the installation in normal operation, the lock will prompt the user for the media key. If the user is in the list, the authentication succeeds and the OS starts. When the castle gets control from the BIOS of the PC, but the BIOS of some modern computers can be configured so that the control lock is not transmitted. If you have this problem, check that your castle had the ability to block the uploading of computer (contact closure Reset, for example).
4
There is also the possibility that a burglar can simply pull the lock out of the computer. To protect yourself use the following countermeasures:
• Sealing buildings, ensure access to the system unit.
• There is a comprehensive remedy, when the lock is combined with a hardware encoder.
• there are also locks that can block the PC case from the inside.