Disable USB storage in linux
To protect data from leaks, we use software and hardware firewalls to limit unauthorized access from the outside, but data leaks can also occur internally. To eliminate this possibility, agencies restrict and monitor access to the Internet and disable USB storage devices.
In this tutorial, we will discuss three different methods to disable USB storage devices on Linux machines. All three methods are tested on CentOS 6&7 machines. So let us discuss these three methods one by one.
(Also read: Ultimate guide to securing SSH sessions[1])
In this method, we add a line install usb-storage /bin/true to the configuration file, which will actually turn the installation of the usb-storage module into running /bin /true, This is why this method is called pseudo installation. Specifically, create and open a file named block_usb.conf (it may also be called other names) in the folder /etc/modprobe.d,
$ sudo vim /etc/modprobe.d/block_usb.conf
Then add the following content:
install usb-storage /bin/true
Finally save the file and exit.
This method requires us to delete or move the USB storage driver (usb_storage.ko) so that the USB storage device can no longer be accessed. Execute the following command to move the driver from its default location:
$ sudo mv /lib/modules/$(uname -r)/kernel/drivers/usb/storage/usb-storage.ko /home/user1
The driver is no longer found in the default location, so the driver cannot be loaded when the USB memory is connected to the system, rendering the disk unusable. But there is a small problem with this method, that is, when the system kernel is updated, the usb-storage module will appear in its default location again.
We can also blacklist usb-storage through the /etc/modprobe.d/blacklist.conf file. This file is available on RHEL/CentOS 6, but you may need to create it yourself on 7. To blacklist the USB storage, use vim to open/create the above file:
$ sudo vim /etc/modprobe.d/blacklist.conf
And enter the following line to blacklist USB:
blacklist usb-storage
Save the file and exit. usb-storage will be blocked by the system from loading, but this method has a big disadvantage, that is, any privileged user can load usb-storage by executing the following command Module,
$ sudo modprobe usb-storage
This problem makes this method less than ideal, but for non-privileged users, this method works well.
Restart the system after the changes are completed for the changes to take effect. Please try these methods to disable USB storage and let us know if you encounter any problems or have any questions.
The above is the detailed content of Disable USB storage in linux. For more information, please follow other related articles on the PHP Chinese website!

Learning Linux is not difficult. 1.Linux is an open source operating system based on Unix and is widely used in servers, embedded systems and personal computers. 2. Understanding file system and permission management is the key. The file system is hierarchical, and permissions include reading, writing and execution. 3. Package management systems such as apt and dnf make software management convenient. 4. Process management is implemented through ps and top commands. 5. Start learning from basic commands such as mkdir, cd, touch and nano, and then try advanced usage such as shell scripts and text processing. 6. Common errors such as permission problems can be solved through sudo and chmod. 7. Performance optimization suggestions include using htop to monitor resources, cleaning unnecessary files, and using sy

The average annual salary of Linux administrators is $75,000 to $95,000 in the United States and €40,000 to €60,000 in Europe. To increase salary, you can: 1. Continuously learn new technologies, such as cloud computing and container technology; 2. Accumulate project experience and establish Portfolio; 3. Establish a professional network and expand your network.

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

The Internet does not rely on a single operating system, but Linux plays an important role in it. Linux is widely used in servers and network devices and is popular for its stability, security and scalability.

The core of the Linux operating system is its command line interface, which can perform various operations through the command line. 1. File and directory operations use ls, cd, mkdir, rm and other commands to manage files and directories. 2. User and permission management ensures system security and resource allocation through useradd, passwd, chmod and other commands. 3. Process management uses ps, kill and other commands to monitor and control system processes. 4. Network operations include ping, ifconfig, ssh and other commands to configure and manage network connections. 5. System monitoring and maintenance use commands such as top, df, du to understand the system's operating status and resource usage.

Introduction Linux is a powerful operating system favored by developers, system administrators, and power users due to its flexibility and efficiency. However, frequently using long and complex commands can be tedious and er

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.

Introduction: Securing the Digital Frontier with Linux-Based Ethical Hacking In our increasingly interconnected world, cybersecurity is paramount. Ethical hacking and penetration testing are vital for proactively identifying and mitigating vulnerabi


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

WebStorm Mac version
Useful JavaScript development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

Atom editor mac version download
The most popular open source editor