CN2879281Y - Computer hacker, virus attack and data theft proof device based on physical isolation - Google Patents

Computer hacker, virus attack and data theft proof device based on physical isolation Download PDF

Info

Publication number
CN2879281Y
CN2879281Y CNU2006200786778U CN200620078677U CN2879281Y CN 2879281 Y CN2879281 Y CN 2879281Y CN U2006200786778 U CNU2006200786778 U CN U2006200786778U CN 200620078677 U CN200620078677 U CN 200620078677U CN 2879281 Y CN2879281 Y CN 2879281Y
Authority
CN
China
Prior art keywords
hard disk
backup hard
virus attack
hacker
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNU2006200786778U
Other languages
Chinese (zh)
Inventor
谢飞
谢寿生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNU2006200786778U priority Critical patent/CN2879281Y/en
Application granted granted Critical
Publication of CN2879281Y publication Critical patent/CN2879281Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

A computer hacker, virus attack and data theft proof device based on physical isolation includes a backup hard disk connecting with the computer via a data wire and a power wire, wherein the backup hard disk connects with a CD driver data wire and further connects with the power wire by a spst switch (K1 or K2). The utility model adds a backup hard disk and a spst switch in the computer to switch between a system hard disk and the backup hard disk, thus the aim of computer hacker, virus attack and data theft proof can be achieved.

Description

Prevent hacker and virus attack and steal data set based on the isolated computing machine of physics
Technical field
The utility model belongs to computer data protection field, is specifically related to a kind of computing machine that completely cuts off based on physics and prevents hacker and virus attack and steal data set.
Background technology
Present PC computing machine or notebook computer are made up of CPU microprocessor, internal storage, hard disk, CD-ROM drive and floppy drive, and the operating system of employing is the above operating systems of WINDOWS 98 series.And computer virus is mainly propagated by data file; its object of attack is a computer operating system; existing anti-hacker and virus attack technology all are by firewall software and the antivirus software that anti-hacker and virus enter being installed in computing machine, being reached the purpose of anti-hacker and virus attack protected data.Yet, things is development and change, virus is a kind of understanding antagonistic process that finishes that do not have forever with anti-virus software, hacker and anti-hacker software, therefore, fail to upgrade in time for virus firewall software, hacker master-hand finds new operating system leak, and all these may make the whole operation systemic breakdown, if and at this moment do not have a Backup Data, loss can't be estimated so.
Summary of the invention
The purpose of this utility model is to overcome the shortcoming of above-mentioned prior art, provides a kind of and can effectively prevent preventing hacker and virus attack and steal data set based on the isolated computing machine of physics based on what physics completely cutting off of computer virus.
For achieving the above object, the technical solution adopted in the utility model is: the backup hard disk that is connected with computing machine by data line and power lead.The backup hard disk directly is connected with the CD-ROM drive data line, and the backup hard disk then is connected with power lead by a single-pole single-throw switch (SPST) (K1 or K2).
Backup hard disk of the present utility model connects according to " Slave " item in " Cable Select " jumper list.
The utility model increases a backup hard disk and single-pole single-throw switch (SPST) (K1 or K2) in computing machine, realize the switching of system disk and backup hard disk, thereby reaches computing machine anti-hacker and virus attack and steal the purpose of data.
Description of drawings
Accompanying drawing is a structure principle chart of the present utility model.
Embodiment
Below in conjunction with accompanying drawing structural principle of the present utility model and principle of work are described in further detail.
Referring to accompanying drawing, the utility model increases a backup hard disk 3 on the basis of existing P C computing machine or notebook computer hardware setting and the red line of wire harness that is used for cutting off the electricity supply (+5V) or yellow line (+12V) single-pole single-throw switch (SPST) K1 or K2.To back up hard disk 3 according to " Cable Select " jumper list, and select " Slave " item, and then be connected on the data line 2 of CD-ROM drive in PC or the notebook computer, and backup hard disk 3 is connected with power lead 4 by a single-pole single-throw switch (SPST) K1 or K2.When adopting the utility model online, disconnect the power lead 4 of backup hard disk 3 by single-pole single-throw switch (SPST) (K1 or K2).At this moment, PC computing machine or notebook computer can be surfed the Net as common computer.Because backup hard disk 3 is not worked, and enters in the computing machine so virus or hacker have both made, and also can't destroy or steal private data; In the time will handling important clothesline, disconnect network, connect the power connection that single-pole single-throw switch (SPST) (K1 or K2) makes backup hard disk 3, restart computing machine, can handle clothesline carefreely.In view of backup hard disk 3 of the present utility model is separately independently with computer operating system hard disk 1, can prevent effectively that like this computer virus and hacker from destroying and stealing user's private data.In addition, because significant data had both made operating system be damaged on backup hard disk 3, data can not lost yet.

Claims (2)

1, prevents hacker and virus attack and steal data set based on the isolated computing machine of physics, comprise a backup hard disk [3] that is connected with computing machine by data line [2] and power lead [4], it is characterized in that: backup hard disk [3] is connected with CD-ROM drive data line [2], and backup hard disk [3] also is connected with power lead [4] by a single-pole single-throw switch (SPST) (K1 or K2).
2, the computing machine that completely cuts off based on physics according to claim 1 is prevented hacker and virus attack and stolen data set, it is characterized in that: said backup hard disk [3] is connected with CD-ROM drive data line [2] according to " Slave " item in " CableSelect " jumper list.
CNU2006200786778U 2006-03-30 2006-03-30 Computer hacker, virus attack and data theft proof device based on physical isolation Expired - Fee Related CN2879281Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU2006200786778U CN2879281Y (en) 2006-03-30 2006-03-30 Computer hacker, virus attack and data theft proof device based on physical isolation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU2006200786778U CN2879281Y (en) 2006-03-30 2006-03-30 Computer hacker, virus attack and data theft proof device based on physical isolation

Publications (1)

Publication Number Publication Date
CN2879281Y true CN2879281Y (en) 2007-03-14

Family

ID=37861701

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU2006200786778U Expired - Fee Related CN2879281Y (en) 2006-03-30 2006-03-30 Computer hacker, virus attack and data theft proof device based on physical isolation

Country Status (1)

Country Link
CN (1) CN2879281Y (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530556A (en) * 2013-08-14 2014-01-22 南通腾启电子商务有限公司 Control system effectively preventing computer from being attacked by hacker and viruses and data stealing
US10331884B2 (en) 2016-10-10 2019-06-25 Stephen Rosa Method and system for countering ransomware

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530556A (en) * 2013-08-14 2014-01-22 南通腾启电子商务有限公司 Control system effectively preventing computer from being attacked by hacker and viruses and data stealing
US10331884B2 (en) 2016-10-10 2019-06-25 Stephen Rosa Method and system for countering ransomware

Similar Documents

Publication Publication Date Title
CN101714197B (en) Hardware-based anti-virus scan service
CN1925926B (en) Device including cooperative embedded agents, related system and method
WO2005038598A3 (en) Policy-based network security management
EP2463782A3 (en) Encapsulated Accelerator
WO2007130354A3 (en) Methods and apparatus providing computer and network security for polymorphic attacks
WO2009085977A3 (en) Virtual computing management systems and methods
US20120131371A1 (en) Method for obtaining power states of a computer
CN2879281Y (en) Computer hacker, virus attack and data theft proof device based on physical isolation
JP2010157229A (en) Method, apparatus, article, and removable storage device for pre-boot recovery of locked computer system
CN110505246B (en) Client network communication detection method, device and storage medium
CN2785015Y (en) Network safe system based on NC system
TWI470472B (en) Anti-theft device and method and related computer system
US20110154502A1 (en) Data Protection
TW200736891A (en) Thermal throttling duty estimation methods and systems for a CPU
CN2556721Y (en) Device for anti-hacker and anti-virus and stealing data for computer
CN203204625U (en) Information anti-theft device of computer
CN101436241A (en) Computer network security control system
CN102708068A (en) Implementation method of software tool for flash drive privacy protection
CN103530556A (en) Control system effectively preventing computer from being attacked by hacker and viruses and data stealing
CN202103700U (en) Double network isolation system
Cisco Using Peripherals With Cisco ICS 7750 SPEs
CN106714161A (en) Method for cutting off network connection of unauthorized mobile terminal, equipment and system
WO2012156782A1 (en) Safety system and portable filter module with several connection means for reading, virus identification and removal from data transport devices and computers in general
CN102890619A (en) Novel desk computer hard disk selector
CN212966172U (en) Computer software encryption protection device

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee