Today we are sharing 2 absolutely FREE tools to prevent this Autorun-based malware attack. The most recent examples of this are the W32/Sality, W32/Virutas and also the W32/Conficker worm which, in addition to spreading via a vulnerability and network shares, also spreads via USB drives. ![]() The malware achieves this by copying a malicious executable in the drive and modifying the AUTORUN.INF file so that Windows opens the malicious file silently as soon as the drive is mounted. The problem is that this feature is also used by malware in order to spread by infecting as soon as a new drive is inserted in a computer. ![]() How to prevent this ?Īctually Windows OS uses “ AUTORUN.INF” file from removable drives in order to know which actions to perform when a new external storage device, such as a USB drive or CD/DVD, is inserted into PC. Now, if the PC is affected by the autorun.inf virus it will then be transferred to the pen drive. We all use the pen drive or usb these days for transferring data from PC to removable disk. I want to know if there is any software that will prevent virus from PC being transferred to pen drive?
0 Comments
Leave a Reply. |