Please refer to
The method also provides a write program, built in the computer host 10. It communicates with the recording device 20 plugged into the computer host 10, writing the login file produced by the computer host 10 into the recording device 20.
The above-mentioned recording device 20 of the invention is plugged into the computer host 10 via one of the one-way serial port computer connection interfaces 23. Since the serial port computer connection interface 23 is not a plug-n-play interface, the OS of the computer host 10 cannot detect the properties and contents of the recording device 20. Therefore, the recording device is an invisible device for the computer OS. Moreover, the recording device 20 only communicates with the write program in the computer host 10. The controller 21 of the recording device 20 sets the serial port computer connection interface 23 plugged into the computer host to be one-way writing. Once the login file produced by the computer host 10 is written into the recording device 20 by the write program, it is impossible for the login file written in the recording device to be read back into the computer host 10a using the resources or information provided by the computer OS. It is therefore unable for anyone to read or modify the login file. Consequently, the true login file can be safely kept in the disclosed recording device.
The other computer connection interface 24 in the disclosed recording device 20 is used for the connection with an ordinary computer 10a. The controller 20 sets the computer connection interface 24 to be used by the management memory unit 22. That is, when a user plugs the disclosed recording device 20 to a computer 10a, the controller 21 knows that the interface currently connected with the computer 10a is a read-only computer connection interface 24. Therefore, it only receives specific commands given by the computer 10a, such as reading data stored in the memory unit 22. Therefore, if the user wants to obtain data stored in the login file, he/she has to use this computer connection interface 24 to connect with the computer 10a in order to successfully read it out. As a result, the stored login data cannot be read out by the same computer host according to the invention.
With reference to
When some hacker logs into the computer host, the system automatically writes the hacker's login data (including login time, account name, password, and IP address) into the login file. Some experienced computer system hackers may modify the contents of the login file before logging out the system so that the system administrator cannot track the hacker by comparing the login file contents with the breakdown time of the system. In that case, it is impossible for the system administrator to find out the true login information of the hacker.
In accord with the above-mentioned external recording device with along the design of a write program, the login file stored in the invention cannot be read out and modified by the same computer. Each set of login data can therefore be faithfully recorded and stored. Therefore, the invention provides the system administrator with a login file backup. This enables the system administrator to analyze the true login data and avoid the problem that the login file of the computer host is modified by the hacker.