Jump to content

USB


implague

Recommended Posts

TO GET RID OF ALL VIRUSES , JUST FOLLOW THE STEPS.

1. WHEN YOU INSERT ANY PEN DRIVE OR CD, START PRESSING RIGHT SHIFT KEY (PLZ BE CAREFUL ONLY RIGHT SHIFT KEY NOT LEFT KEY).

2. THIS STOPS THE AUTOPLAY OPTION. MOST OF THE VIRUSES HAVE THEIR AUTORUN FILE WITH THEM.

3. NOW OPEN CMD AND SWITCH TO THE PEN DRIVE. TYPE "ATTRIB" AND PRESS ENTER.

4. THIS COMMAND DISPLAYS THE ATTRIBUTES ASSOCIATED WITH EACH FILE IN THE PEN DRIVE.

5. NOW SEARCH FOR FILES THAT HAVE ATTRIBUTES "SHR".IT MEANS THE FILE IS HIDDEN, READ ONLY & SYSTEM FILE.

6. MOST OF THE VIRUSES HAVE SHR ATTRIBUTE.

7. NOW TYPE ATTRIB -S -H -R FILENAME AND REMOVE ALL ATTRIBUTES OF FILES.(DO THIS FOR ALL FILES)

8. NOW OPEN AUTORUN.INF FILE FROM CMD.

9. SEARCH FOR THE NAME OF VIRUS IN THE AUTORUN FILE.

10. DELETE THE VIRUSES FROM THE PEN DRIVE BY USING DEL COMMAND.

11. YOUR PEN DRIVE IS FREE FROM ALL VIRUSES.

HAVE A VIRUS FREE COMPUTER !!!

Link to comment
Share on other sites


  • Replies 19
  • Views 3.8k
  • Created
  • Last Reply

Or you can download Flash Disinfector: Link

It's automated... protects other partitions as well ;)

Link to comment
Share on other sites


i belive in not to install too many apps but sometimes manual work is not enough

well i now the capability of flash disinfector thanx to remind me about the tool.....

Link to comment
Share on other sites


Sl@pSh0ck™

Or you can just disable autorun altogether ....

Link to comment
Share on other sites


I use ID Security Suite's ID USB Lock Key.. When its installed it will shut off autoplay if it isn't already ( some issues may require you turn it off in Windows 7 yourself.. ) After it does this you can insert a USB Key, which then will operate as a HASP Key.. yo must create an encrypted key to the drive. Which will not work on anything else.. Next when you lock the system using it.. it disables all drives. CD, Peripheral Storage, USB.. and so on..so that nothing can actually access your system..

Last but not least I wanted to mention that just disabling the AutoPlay does not keep your system from being infected through this manner. You should also allow the scanning of external devices and drives where possible or have it turned on by default in your security suite, AV, other protection. A system can also be infected and accessed by not protecting your BIOS access.. even though you may have adequate protection; n attacker can boot your system and from disc or USB.. IF ..

1. Your BIOS is configured to do so with your HD last in Boot Order.

2. You do not password protect access to the BIOS and Hardware..

3. Do not secure other settings which may be available.. ( such as DriveLock )

An attacker can also apply passwords which can and may lock you out of accessing these areas which can make it difficult to repair and access... It is also wise to disable any other access or usage of ports and physical access be either disabling or un-installing the device in the Device Management for your system.

EDIT: I was told a horror story once about a Networked printer, one of which was connected via RJ45.. which has FlashDrive ports on the front of the machine.. Through which an entire network was compromised... and then infected..

Link to comment
Share on other sites


  • 1 month later...

There is a much easier way. I have implemented it in all my drives. No tool needed. I am not going to reveal it because I used it in a few of my TRs. :sneaky:

Link to comment
Share on other sites


  • 1 month later...

It's advisable to disable 'autoplay' in all forms - given the high volume of infections that the USB ports and CD/DVD drive are responsible for.

NOD32 Users can exercise control over the USB ports . . . . . . . . in a different manner:-

29prghs.jpg

Link to comment
Share on other sites


  • 1 month later...

It's advisable to disable 'autoplay' in all forms - given the high volume of infections that the USB ports and CD/DVD drive are responsible for.

NOD32 Users can exercise control over the USB ports . . . . . . . . in a different manner:-

29prghs.jpg

deos that disable removeable media or just hte autorun part?

Link to comment
Share on other sites


  • 3 weeks later...
  • 3 weeks later...

deos that disable removeable media or just hte autorun part?

That disables the removeable media and hence the autorun, too.

Link to comment
Share on other sites


thanks for the many infos there, although my autorun is disabled... interesting apps and manual ways

Link to comment
Share on other sites


I like autorun, but mine always autorun in sanboxie.... :sneaky: But what do you guys think am I safe??

Link to comment
Share on other sites


See now this sux for one thing.. and I struggled with it for awhile.. but iHound .. where I have registered most of my devices.. which will call home from other PC's if the correct Autorun is chosen... ( sort of pre-Vista, AV era ) I have them in my flash drives.. and all devices.. Click on the Icon for it and Boom.. in which it states something fancy about it for the device.. BUT then you have to let it through the Firewall if its interactive.. and it gives you this little message to return it to me.. Then I can log on to the site and get a GEO-IP and address to report to the necessary authorities.. to get my property back... All a nice idea right.. but I have since decided on encryption and only having what I need with me... and locking things in a firesafe...

But anyway brought it to mind ... reminds me I need to junk the programs.. and kill the accounts.. unless I am going to rely on people just being stupid as all hell.. but you never know...

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...