(It is a very effective method to shield the usb interface of the computer to manage data reasonably and ensure the leakage of resources in the enterprise; it also excludes the virus from the U disk from being brought into the local area network;
usb\usb_off.reg
usb\usb_on.reg)