SlideShare a Scribd company logo
Disable USB ports on Windows PC via Registry
With this trick, you can disable access to your USB(Universal Serial Bus) ports in your Windows based
PC to prevent people from taking out data from your personal computer without permission or
spreading viruses through the use of USB(pen and flash) drives.
To use this trick to disable USB ports, follow the steps given below:1. Click on Start.
2. Click on Run. If you cannot find RUN, type it in the search box.
3. Type "regedit" without quotes. This will launch the Registry Editor.
4. Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesusbstor.
5. In the work area, double click on Start.
6. In the Value Data box, enter 4.
7. Click on OK.
8. Close Registry Editor and refresh your desktop.
9. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.

More Related Content

What's hot

Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusFixPCyourself
 
How to get rid of windows web commander virus
How to get rid of windows web commander virusHow to get rid of windows web commander virus
How to get rid of windows web commander virusFixPCyourself
 
How to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusHow to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusFixPCyourself
 
Isearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpIsearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpFixPCyourself
 
Vista driver installation instructions
Vista driver installation instructionsVista driver installation instructions
Vista driver installation instructionsdongmao
 
How to delete yontoo layers client
How to delete yontoo layers clientHow to delete yontoo layers client
How to delete yontoo layers clientFixPCyourself
 
How to get rid of windows home patron virus
How to get rid of windows home patron virusHow to get rid of windows home patron virus
How to get rid of windows home patron virusFixPCyourself
 
Delete runclips.com browser hijacker
Delete runclips.com browser hijackerDelete runclips.com browser hijacker
Delete runclips.com browser hijackerFixPCyourself
 
How to get rid of win32 viking g virus
How to get rid of win32 viking g virusHow to get rid of win32 viking g virus
How to get rid of win32 viking g virusFixPCyourself
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusFixPCyourself
 
How to get rid of windows premium defender virus
How to get rid of windows premium defender virusHow to get rid of windows premium defender virus
How to get rid of windows premium defender virusFixPCyourself
 
How to delete windows pro defence virus
How to delete windows pro defence virusHow to delete windows pro defence virus
How to delete windows pro defence virusFixPCyourself
 
Audacity tutorial
Audacity tutorialAudacity tutorial
Audacity tutorial
Nancy Agüero
 
Ads not by this site virus removal help
Ads not by this site virus removal helpAds not by this site virus removal help
Ads not by this site virus removal helpFixPCyourself
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusFixPCyourself
 
How to delete windows high end protection
How to delete windows high end protectionHow to delete windows high end protection
How to delete windows high end protectionFixPCyourself
 
Clean Up Windows Log Files
Clean Up Windows Log FilesClean Up Windows Log Files
Clean Up Windows Log Files
AsadAhmed109
 
How to get rid of great antispy 2012
How to get rid of great antispy 2012How to get rid of great antispy 2012
How to get rid of great antispy 2012FixPCyourself
 
How to get rid of windows profound security virus
How to get rid of windows profound security virusHow to get rid of windows profound security virus
How to get rid of windows profound security virusFixPCyourself
 
How to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusHow to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusFixPCyourself
 

What's hot (20)

Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virus
 
How to get rid of windows web commander virus
How to get rid of windows web commander virusHow to get rid of windows web commander virus
How to get rid of windows web commander virus
 
How to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusHow to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virus
 
Isearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpIsearch.claro search.com virus removal help
Isearch.claro search.com virus removal help
 
Vista driver installation instructions
Vista driver installation instructionsVista driver installation instructions
Vista driver installation instructions
 
How to delete yontoo layers client
How to delete yontoo layers clientHow to delete yontoo layers client
How to delete yontoo layers client
 
How to get rid of windows home patron virus
How to get rid of windows home patron virusHow to get rid of windows home patron virus
How to get rid of windows home patron virus
 
Delete runclips.com browser hijacker
Delete runclips.com browser hijackerDelete runclips.com browser hijacker
Delete runclips.com browser hijacker
 
How to get rid of win32 viking g virus
How to get rid of win32 viking g virusHow to get rid of win32 viking g virus
How to get rid of win32 viking g virus
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virus
 
How to get rid of windows premium defender virus
How to get rid of windows premium defender virusHow to get rid of windows premium defender virus
How to get rid of windows premium defender virus
 
How to delete windows pro defence virus
How to delete windows pro defence virusHow to delete windows pro defence virus
How to delete windows pro defence virus
 
Audacity tutorial
Audacity tutorialAudacity tutorial
Audacity tutorial
 
Ads not by this site virus removal help
Ads not by this site virus removal helpAds not by this site virus removal help
Ads not by this site virus removal help
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virus
 
How to delete windows high end protection
How to delete windows high end protectionHow to delete windows high end protection
How to delete windows high end protection
 
Clean Up Windows Log Files
Clean Up Windows Log FilesClean Up Windows Log Files
Clean Up Windows Log Files
 
How to get rid of great antispy 2012
How to get rid of great antispy 2012How to get rid of great antispy 2012
How to get rid of great antispy 2012
 
How to get rid of windows profound security virus
How to get rid of windows profound security virusHow to get rid of windows profound security virus
How to get rid of windows profound security virus
 
How to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusHow to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virus
 

Viewers also liked

Depuradora
DepuradoraDepuradora
DepuradoraYacullay
 
Variedades de Naranjas
Variedades de NaranjasVariedades de Naranjas
Variedades de Naranjas
Getic
 
Correction onet m6_social_53
Correction onet m6_social_53Correction onet m6_social_53
Correction onet m6_social_53Patthanan Sw'mind
 
Mendi eta ibaien mapa mutua
Mendi eta ibaien mapa mutuaMendi eta ibaien mapa mutua
Mendi eta ibaien mapa mutua
EderAnboto34
 
MN Activitat comunitària: marxa nòrdica per la salut
MN Activitat comunitària: marxa nòrdica per la salutMN Activitat comunitària: marxa nòrdica per la salut
MN Activitat comunitària: marxa nòrdica per la salut
Institut Català de la Salut
 
Número 14
Número 14Número 14
Número 14
jordanrc
 
Gestión de personas por competencias 3
Gestión de personas por competencias 3Gestión de personas por competencias 3
Gestión de personas por competencias 3Talentia Gestio
 
MN Rutes saludables per Mataró
MN Rutes saludables per MataróMN Rutes saludables per Mataró
MN Rutes saludables per Mataró
Institut Català de la Salut
 

Viewers also liked (11)

Depuradora
DepuradoraDepuradora
Depuradora
 
Variedades de Naranjas
Variedades de NaranjasVariedades de Naranjas
Variedades de Naranjas
 
Correction onet m6_social_53
Correction onet m6_social_53Correction onet m6_social_53
Correction onet m6_social_53
 
Mendi eta ibaien mapa mutua
Mendi eta ibaien mapa mutuaMendi eta ibaien mapa mutua
Mendi eta ibaien mapa mutua
 
MN Activitat comunitària: marxa nòrdica per la salut
MN Activitat comunitària: marxa nòrdica per la salutMN Activitat comunitària: marxa nòrdica per la salut
MN Activitat comunitària: marxa nòrdica per la salut
 
Quality tip 4
Quality tip 4Quality tip 4
Quality tip 4
 
Número 14
Número 14Número 14
Número 14
 
Ro 18-065 aussenblende
Ro 18-065 aussenblendeRo 18-065 aussenblende
Ro 18-065 aussenblende
 
6
66
6
 
Gestión de personas por competencias 3
Gestión de personas por competencias 3Gestión de personas por competencias 3
Gestión de personas por competencias 3
 
MN Rutes saludables per Mataró
MN Rutes saludables per MataróMN Rutes saludables per Mataró
MN Rutes saludables per Mataró
 

Similar to Disable usb ports

Blue screen of death crash fix
Blue screen of death crash fixBlue screen of death crash fix
Blue screen of death crash fixSarahLamusu
 
1234mokuit
1234mokuit1234mokuit
1234mokuit
dadabah
 
Prevent the application has failed to start because its side by-side config...
Prevent  the application has failed to start because its  side by-side config...Prevent  the application has failed to start because its  side by-side config...
Prevent the application has failed to start because its side by-side config...
Sumit Modi
 
Close backgrown program
Close backgrown programClose backgrown program
Close backgrown program
wasim liam
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performancepacampbell
 
How to fix “svchost.exe application error”
How to fix “svchost.exe application error”How to fix “svchost.exe application error”
How to fix “svchost.exe application error”
BestTechTips
 
To speed up your hard disk speed we need to configure a special buffer in the...
To speed up your hard disk speed we need to configure a special buffer in the...To speed up your hard disk speed we need to configure a special buffer in the...
To speed up your hard disk speed we need to configure a special buffer in the...Harshith Agarwal
 
Lession 2 starting with mssqlserver
Lession 2 starting with mssqlserverLession 2 starting with mssqlserver
Lession 2 starting with mssqlserverĐỗ Đức Hùng
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2mariacalji
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceramsashu15
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshanravish roshan
 
How To Make System Work Faster
How To Make System Work FasterHow To Make System Work Faster
How To Make System Work FasterGaurav bhatnagar
 
Xp trick
Xp trickXp trick
Xp trick
Blacklover143
 
1 system security
1 system security1 system security
1 system security
Arjun Trivedi
 
How to repair windows 8
How to repair  windows 8How to repair  windows 8
How to repair windows 8
Alex Robert
 

Similar to Disable usb ports (20)

Ports
PortsPorts
Ports
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
Blue screen of death crash fix
Blue screen of death crash fixBlue screen of death crash fix
Blue screen of death crash fix
 
1234mokuit
1234mokuit1234mokuit
1234mokuit
 
Prevent the application has failed to start because its side by-side config...
Prevent  the application has failed to start because its  side by-side config...Prevent  the application has failed to start because its  side by-side config...
Prevent the application has failed to start because its side by-side config...
 
Close backgrown program
Close backgrown programClose backgrown program
Close backgrown program
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
How to fix “svchost.exe application error”
How to fix “svchost.exe application error”How to fix “svchost.exe application error”
How to fix “svchost.exe application error”
 
To speed up your hard disk speed we need to configure a special buffer in the...
To speed up your hard disk speed we need to configure a special buffer in the...To speed up your hard disk speed we need to configure a special buffer in the...
To speed up your hard disk speed we need to configure a special buffer in the...
 
Win7guide
Win7guideWin7guide
Win7guide
 
Lession 2 starting with mssqlserver
Lession 2 starting with mssqlserverLession 2 starting with mssqlserver
Lession 2 starting with mssqlserver
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Presentation1
Presentation1Presentation1
Presentation1
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Tricks N Tips By Ravish Roshan
Tricks N Tips By Ravish RoshanTricks N Tips By Ravish Roshan
Tricks N Tips By Ravish Roshan
 
How To Make System Work Faster
How To Make System Work FasterHow To Make System Work Faster
How To Make System Work Faster
 
Xp trick
Xp trickXp trick
Xp trick
 
1 system security
1 system security1 system security
1 system security
 
How to repair windows 8
How to repair  windows 8How to repair  windows 8
How to repair windows 8
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Disable usb ports

  • 1. Disable USB ports on Windows PC via Registry With this trick, you can disable access to your USB(Universal Serial Bus) ports in your Windows based PC to prevent people from taking out data from your personal computer without permission or spreading viruses through the use of USB(pen and flash) drives. To use this trick to disable USB ports, follow the steps given below:1. Click on Start. 2. Click on Run. If you cannot find RUN, type it in the search box. 3. Type "regedit" without quotes. This will launch the Registry Editor. 4. Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesusbstor. 5. In the work area, double click on Start. 6. In the Value Data box, enter 4. 7. Click on OK. 8. Close Registry Editor and refresh your desktop. 9. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.