473,403 Members | 2,338 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,403 software developers and data experts.

Security in Pen Drive

164 100+
Hi all

Am using Imation Pen Drive..

Its frequently attacked by some viruses. Each and everytime am formatting my pendrive

How to prevent itfrom attacking viruses.

Some exe files are being copied into my system.

If am creating a folder into the pendrive suddenly an exe file with the name of that folder created.

Though I did formatting my pendrive it works well only for few days.

And are there any limitations with formatting the pendirve?

Thanx
Oct 18 '07 #1
3 1650
bartonc
6,596 Expert 4TB
Have you seen Dealing with USB flash drive issues in the Articles section?
Oct 18 '07 #2
arunbalait
164 100+
Have you seen Dealing with USB flash drive issues in the Articles section?
Ya I have seen it. I found there only about how to connect and disconnect USB Pendrive.

But I need explainations about clearing Viruses.

Thanx
Oct 19 '07 #3
bartonc
6,596 Expert 4TB
Ya I have seen it. I found there only about how to connect and disconnect USB Pendrive.

But I need explainations about clearing Viruses.

Thanx
There are some good links in this thread. Hopefully, those are helpful to you.
Oct 19 '07 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: Brian Loesgen | last post by:
The next San Diego .Net User Group meeting is Tuesday, November 25, 2003 at the Scripps Ranch Library. Scripps Ranch Library 10301 Scripps Lake Drive San Diego, CA 92131-1026 Please join us...
0
by: Michael Hauer | last post by:
Hi, First my system(s): We want to migrate one server from NT 4.0 to Linux (small company). Clients are NT + XP. The application is .NET 1.0 and all clients run 1.0 SP3. A network drive...
4
by: Chris Tyson | last post by:
My problem is this: I have created a database, using Workgroup security features. Unique Workgroup. New users added. Permissions to Admins, Admin, and Users revoked. 'Ownership' of database...
5
by: David W. Fenton | last post by:
I am posting this to the newsgroup because I wasted some time on Friday troubleshooting a problem of my own making. Other people might benefit from hearing about it. I'm working on the final...
2
by: Steven | last post by:
I have developed an application using VB.NET, it works fine in my local drive. However, security exception is flowed when I try to run the release program under a network drive. I have signed the...
10
by: Richard MSL | last post by:
I am having problems working with .net security. I have been attempting to use the Microsoft .Net Framework 2.0 Configuration tool (version 2.0.50727.42), but it won't work for me. I have a simple...
6
by: alex | last post by:
Hi, this always works: private ConsoleToTextbox myConsole; Console.SetOut(myConsole); But now (a few weeks later i started this project again) i get a non handeld security exception from...
2
by: Kathy | last post by:
One of my customers is running an Access 2003 application. They have the Macro Security Level set to Low. When the .mde app is executed directly from the C: drive on their server, they get into...
7
by: GMiller | last post by:
I am fairly new to .NET programming so this may be a simplistic question. I wrote a C# application that reads and writes files. If the program resides on a local drive everything is fine. If...
18
by: Earl Anderson | last post by:
First, I feel somewhat embarrassed and apologetic that this post is lengthy, but in an effort to furnish sufficient information (as opposed to too little information) to you, I wanted to supply all...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.