Jump to content
Posted 09 November 2012 - 08:28 PM
Posted 09 November 2012 - 09:55 PM
USB Scanning Tools:
Tip: As an extra precaution, hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present. Then perform your scans.
- ClamWin Portable Antivirus
- Malwarebytes' Anti-Malware. For usb flash drives and/or other removable drives, perform a Full scan. The option for a Flash Scan will analyze memory and autorun objects but that option is only available to licensed users in the paid version.
- Norman Malware Cleaner. For usb flash drives and/or other removable drives to scan, use the Add button to browse to the drives location, click on the drive to highlight and choose Ok.
- Dr.Web CureIt. Choose Custom Scan after the Express Scan has finished to add your usb or external drive to the scan.
- McAfee Avert Stinger Tool.
USB Protection Tools:
- Autorun Eater
- Autorun Protector
- Autorun USB Virus Finder
- Ariad (AutoRun.Inf Access Denied)
- USB Protector
- Autorun Deleter
- USB Flash Drives Control
- USB Defender, USB Format, USB Pen, USB Disk, USB Key
- Flash_Disinfector for XP
- Panda USB Vaccine.
- Computer Vaccination will prevent any AutoRun file from running, regardless of whether the removable device is infected or not.
- USB Vaccination disables the autorun file so it cannot be read, modified or replaced and creates an Autonrun.inf as protection against malicious code. The Panda Resarch Blog advises that once USB drives have been vaccinated, they cannot be reversed except with a format. If you do this, be sure to back up your data files first or they will be lost during the formatting process.
Posted 11 November 2012 - 12:00 AM
Microsoft Security Advisory (967940): Update for Windows Autorun (Feb 22, 2011)
Microsoft is announcing the availability of updates to the Autorun feature that help to restrict AutoPlay functionality to only CD and DVD media on supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. Restricting AutoPlay functionality to only CD and DVD media can help protect customers from attack vectors that involve the execution of arbitrary code by Autorun when inserting a USB flash drive, network shares, or other non-CD and non-DVD media containing a file system with an Autorun.inf file.
Microsoft Article ID: 971029: Update to the AutoPlay functionality in Windows (Aug 25, 2009)
In Windows XP, Windows Vista, and Windows Server 2003, AutoRun entries were populated for all devices that had mass storage and had a validly formatted AutoRun.inf file in the root directory. This included CDs, DVDs, USB thumb drives, external hard disks, and any volume that exposed itself as mass storage. This update disables AutoRun entries in AutoPlay, and displays only entries that are populated from CD and DVD drives. Effectively, this prevents AutoPlay from working with USB media.
0 members, 0 guests, 0 anonymous users