Nowadays, USB flash drives are very popular. Many friends have one or several USB flash drives on hand, and even MP3, MP4, card reader, and other USB devices that are the same as USB flash drives. In order to facilitate future descriptions, we will introduce the USB flash drive, MP3, MP4, and card reader.It is collectively referred to as a USB flash drive. As an important data storage warehouse, USB flash drives store a large number of personal files and images, including confidential files, such as office documents, photos, emails, and so on. If these important data files fall into the hands of others, the consequences can be imagined. However, we often use our own USB flash drives on different computers, such as computers in the home, unit, or other places. As we all know, during the use of the USB flash drive, a pair of greedy eyes are staring at the valuable data on the USB flash drive, with the help of the flash drive, thieves can take valuable data from others' flash drives as their own.
Secrets of attacking ultra-disk thieves
The "USB flash drive thief" monitors the USB interface of the computer in real time in the background. Once a USB flash drive is connected to the USB interface, the files in the flash drive are immediately stolen to the specified destination folder, what's even worse is that it can be directly sent to a hacker's specified email address or FTP server, which is invisible to the user. In order to further reveal the techniques used to commit crimes, we will download the Butterfly "youpan thieves" for demonstration.
The software is installed in green without installation. After downloading the software, decompress it to any directory. Double-click the executable file to open the program configuration interface. Configure and generate a Server File just like a Trojan horse. Enter the path and folder name of the target file in the "copy the USB flash drive file to the target folder" text box. In the future, the files stolen by thieves will be stored here. Therefore, this target is usually set in a disk partition with a large available space. To enable the thief to run automatically upon startup, check the check box "whether to run automatically upon startup. "Secret" file, which is the thief we configured to generate (1 ).
Now, execute ut.exe on the computer and the "thief" will be active 24 hours a day. Once you find that the USB flash drive is connected, you can take all the data in the USB flash drive as your own.
Two-pronged defense measures will not allow thieves to succeed
In the face of the crazy crime of "Flash thieves", how should ordinary users tighten their "Data pockets" to prevent data loss? Although the "ultra-high-volume thieves" will quietly run in the background and cannot see their icons in the tray area, they still cannot escape the eyes of the task manager. Pipeline is running. It is much safer to drop the process result and insert it into the USB flash drive.
In addition, we can also encrypt important documents with ultra-encrypted 2008 (: http://hzcnc1.skycn.com/down/skyUDE.zip) to avoid data loss or theft. After downloading, extract the ude.exe file in the compressed package to the root directory of the USB flash drive, double-click the file, and enter your own password in the password verification box to log on. The default value is "888888 ". After entering the main interface, the "unencrypted data on the disk" list box displays the files not encrypted in the current USB flash drive. Select the files to be encrypted, click "single encryption" or "full encryption". After encryption, the encrypted document will appear in the "encrypted data" list box on the right (2 ).
In the future, when you encounter a "Flash thief", the thief can only steal unencrypted files. After encryption, the thief cannot sniff Encrypted documents to ensure security. Select the encrypted file in the encrypted file list as needed, and click "single encryption" or "Full decryption". After decryption, the encrypted file can be used normally. (Ice water)