473,405 Members | 2,445 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,405 software developers and data experts.

pen drive virus problem

3
Hi all,

I am facing a problem in my pen drive.When i am putting any DVD RIP file in my pen drive the file has corrupted after some time.But scanning with Symantac antivirus pen drive has not shown any virus in it.

Please help.
Writam.
Mar 7 '08 #1
4 3273
debasisdas
8,127 Expert 4TB
Try formatting the Pen drive and check again.
Mar 7 '08 #2
writam
3
Hi all,

I am facing a problem in my pen drive.When i am putting any DVD RIP file in my pen drive the file has corrupted after some time.But scanning with Symantac antivirus pen drive has not shown any virus in it.

Please help.
Writam.


i formatted it many times.but i don't understand it is pen drive's problem or virus problem.
Mar 7 '08 #3
What about other files is they can copied?
Feb 23 '11 #4
There is one software called usbdisksecurity, download it from the internet and installed it in your system. Its very efficient software which protect the system from virus to pass into the system when we insert in the usbport.
Its mainly disable the Autorun of our pendrive, Hence it restrict the viruses to penitrate into the system.

Note: Its not a Anti-virus program its just the tool. So you better use the good antivirus software. I recommand Avira Antivirus, its really works well togethere with this usbdisksecurity.

Regards,
Bluesathish.
Apr 8 '11 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: | last post by:
My ASP.NET application needs read/write permissions for drive "Z:", which is mapped to my Linksys Gigadrive (Network Attached Storage...if anyone is familiar with that). If I configure the...
12
by: Charles Law | last post by:
This is a bit of a vague question, but I am just starting on this, and wonder if anyone has ideas of where to start. I have a program that controls some external equipment. It sends messages in...
4
by: cmrchs | last post by:
Hi, executing the following on a local drive works fine : FileStream wLog; wLog=File.OpenRead(@"d:\Log.txt"); but executing the same code on a network drive creates a...
3
by: James N | last post by:
My ASP.NET application needs read/write permissions for drive "Z:", which is mapped to my Linksys Gigadrive (Network Attached Storage...if anyone is familiar with that). If I configure the...
16
by: Otie | last post by:
Hi, Is there a way for VB5 to determine exactly where on a hard drive a .exe file is stored upon the .exe file's first copying to the hard drive? What I need to know is the exact hard drive...
0
by: Satya | last post by:
I am trying to load a Html into a HTML Docuemt Object in my client widow. Everything works fine if i used a mapped drive. But the application breaks if i use the UNC directly. Looks like when the...
10
by: jon | last post by:
I am a beginner C programmer, this is actually my first programming lanugage, besides html, cgi, and javascript. I am looking for a way to make an .exe file, or a copy of my own file. I have tried...
12
Loismustdie129
by: Loismustdie129 | last post by:
I was wondering if there is any way I can completely take everything off your Hard Drive. I need to take everything off my Hard Drive because of a virus on it that will not get off no matter what I...
26
subashini Thiyagarajan
by: subashini Thiyagarajan | last post by:
I got a very good pendrive. Without knowing me my pen drive was spreading virus ravon.exe file is running as soon as i plug my pendrive in any system. Then it started giving nose from floppy...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.