Preview

Thumbdrive, Pendrive, Flashdrive or Whatever You Call It: Pendrive Virus

Satisfactory Essays
Open Document
Open Document
507 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Thumbdrive, Pendrive, Flashdrive or Whatever You Call It: Pendrive Virus
We all know that any type of USB Mass Storage Device is susceptible to a virus infection. Yes we do have Antivirus,you have [Insert your best bet AV name],but at some time the virus can and will bypass the security measure that have been placed by our security system software. We also have to remember that the av's rely heavily on its database signature of virus. This means if your system is to be infected by a newly crafted virus ,chances are your av won't detect it at all eventhough its equipped with a highly advanced heuristic scanner. Enough with the bull. What i'm really trying to say is how dangerous it is for us to double click/"Open" your pendrive's drive in "My Computer" right after you plugged in your USB storage device. When you double click or "Open" ,you are actually trying to launch the virus itself embedded in the USB storage device or more specifically you are actually excuting the program stated in the file named autorun.inf.example of the content of the autorun.inf file: [autorun] open=yxcm.exe This is the only way a virus can move,run or to be excecuted. So this method of propagation highly depends if the host has the following.. etc weak av,unupdated av,computer illiterate user. We can safely say that every infected USB storage device have both autorun.inf and atleast an executable. Usually these two files are extra hidden and can only be seen using the Command Prompt. To see the hidden files using the command prompt. Launch the command prompt by clicking the Start button and in the text box type "cmd" and press enter(without the quotes). From there type the letter of your pendrive (assuming that you have already plugged in your pendrive) then colon (stacked full-stop sign) proceed by pressing enter , for example
F:

it should now display F:\> now you are at the root. to see the hidden files type
DIR /AH This will list all the files that are extra hidden. In our case(an infected pendrive) would usually show something like this

You May Also Find These Documents Helpful

  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. Deactivate all CD, DVD, and USB ports; then enable an automatic antivirus scan for the CD’s, DVD’s, and USB ports to prevent any harmful, or malicious files that may be on the drives.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Discussed in “How The First Plants Came to Be”, by David Biello, Earth is the planet of the plants, full of the most lush photosynthesizers. Biello strongly expresses his beliefs on how the first plant evolved from the merging of precise factors more specifically known as a host, Cyanobacteria and denoted parasitic gene. Basically, what Biello is trying to infer is how many years ago an alga ate a cyanobacteria and the first internal solar power plant was formed. In complete agreement with Biello, many can believe that genes evolve over time, all modern plants derived from a symbiotic union of merging factors and how survival conditions effect the environment.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You write some files to a flash drive and then share the drive with a classmate. That classmate opens an application that lists the contents (folders and files) of what is on the flash drive. The classmate sees all the files you had placed onto the flash drive. How does your classmate’s computer know what is on the flash drive?…

    • 605 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    2. When an antivirus application identifies a virus and quarantines this file, does this mean the computer is free of the virus and any malicious software?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    * Scan all files and information contained on portable media and storage devices (such as DVDs, USB drives, floppy disks, etc.) for malware and malicious code prior to being used on any department information systems (such as laptops, PDAs, desktop computers, etc.).…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The obnoxious virus is exceptionally unsafe and perilous and can change interior settings of the Windows System.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Flash Memory

    • 4081 Words
    • 17 Pages

    The Board of Directors, Flash Memory Inc. The Finance Team October 11, 2012 Investment in New Product Line…

    • 4081 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Living is more valuable than dying and threatening to diminish the value of life is dangerous. Euthanasia, also called mercy killing, is the practice of doctors intentionally ending a terminally ill patient’s life in what is purportedly a gentle and dignified manner. The term originated in ancient Greek and means “easy death.” Doctors perform euthanasia by administering lethal drugs or by withholding treatment that would prolong the patient’s life. Physician-assisted suicide is also a form of euthanasia, but the difference between the two methods is that in euthanasia, doctors end the patient’s life with lethal injections, whereas, in physician-assisted suicide, patients kill themselves with a lethal amount of drugs prescribed by the doctors.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Virus

    • 1318 Words
    • 6 Pages

    • Viral genomes can be either DNA or RNA • This genome, once inside a host cell, directs synthesis of new viral proteins, and also replication of new viral genomes • Viral genomes come in all kinds:…

    • 1318 Words
    • 6 Pages
    Better Essays

Related Topics