473,386 Members | 1,801 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Block threats from USB storage device

USB storage devices have gained popularity. It can be host to viruses,
Trojans, hacker toolkits, worms or other forms of malicious programs.
For example, when you plug your USB disk into a computer that is
infected by viruses, viruses will create a file named AUTORUN.INF and
malicious programs on your USB disk. Then, when you plug the USB disk
to another computer, the one will be at risk. Threats from USB storage
devices to computer have been a huge security risk for businesses and
individuals.
So, how does one protect against threats from USB storage devices?
Well, here are my suggestions.
1. The AUTORUN.INF file is a text file located in the root directory.
It enables malicious programs to automatically run when the USB
storage device is plugged into a computer. Fortunately, you can
disable the AUTORUN in the registry. There are many instructions for
doing this online. But one of the flaws is that people must be
familiar with registry. The second flaw is that it can't delete the
malicious programs on your USB disk, so the malicious programs still
have threats against other computers.
2. You can use antivirus software to scan removable storage media, but
the flaws of the method are the antivirus software based on database
of signature can't find new malicious programs, and scanning USB disk
is time consuming.
3. The best way of blocking threats from USB storage device is to
choose the software Removable Storage Guard. It turns the AUTORUN off
and uses new technology to quickly and exactly find all the threats on
the removable storage media. You needn't worry about threats from USB
storage as soon as you install the software.
The key feature of Removable Storage Guard:
1. Block all the threats via AutoRun of removable storage.
2. Use new technology to find threats and have no needs in database of
signature.
3. Show you all the programs running on your computer and tell you
which programs are safe or unknown.
4. Repair your registry destroyed by viruses.
5. Clean your system rubbish.
6. Shutdown windows by timer.
7. Occupancy rate of CPU and memory is very low.
8. List all the programs (except system programs) running with the
startup of windows in the registry.
9. Support and upgrade are free.
You can find the software on http://www.download.com
Download link:
http://www.download.com/Removable-St...ml?tag=lst-0-2
http://www.tucows.com/software_detail.html?id=513961

Jul 17 '07 #1
0 2008

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Kevin Altis | last post by:
Does anyone have experience running Python from a USB storage device? Whether it is the need for doing a demo of your application, doing a bit of consulting, or just showing off Python, it would be...
5
by: Ben Finney | last post by:
Howdy all, I'm experimenting with carrying my personal computing environment around on a keychain USB flash storage device. I have the usual suspects on there: SSH keys, GPG keys, program...
5
by: Graham Stevenson | last post by:
Hi, I have a USB mass storage device being developed by colleagues, and need to interface that to a Windows Forms application (C#). The device is neither purely a storage device nor an HID...
0
by: Geoff | last post by:
I am looking for a Win 2003 version of the Microsoft Storage Device Registry Cleaner Scrubber Tool. I have the one for Windows 2000 but need one that works for 2003. This is to clean the registry...
1
by: John Rauhe | last post by:
Hello, Does anybody know how to detect if an mass-storage device has been added to the system ? I am making a program that will (should) detect when a CompactFlash memory card has been inserted...
0
by: Zorba.GR | last post by:
IBM DB2 Connect Enterprise Edition v8.2, other IBM DB2 (32 bit, 64 bit) (MULTiOS, Windows, Linux, Solaris), IBM iSoft Commerce Suite Server Enterprise v3.2.01, IBM Tivoli Storage Resource Manager...
0
by: Ivan | last post by:
Hi, all, How to get BusRelations of a USB Mass Storage Device in C#? Or, do we have any function to get BusRelations of a USB Mass Storage Device, even not in C#? Any information is...
14
by: Greg Copeland | last post by:
I am running python on VxWorks. In the course of operation, a vxworks tasks writes to a reserved area of memory. I need access to this chunk of memory from within python. Initially I thought I...
8
by: ma740988 | last post by:
Consider this statement in Excel's text Thinking in C++, Vol 2: /// 1 " A vector starts by grabbing a block of storage, as if it's taking a guess at how many objects you plan to put into it. ...
0
by: zhensoftware | last post by:
USB storage devices have gained popularity. It can be host to viruses, Trojans, hacker toolkits, worms or other forms of malicious programs. For example, when you plug your USB disk into a computer...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.