What you know:Creating autorun. inf files with various tricks prevents the virus from automatically playing on the USB flash drive.
What you don't know:You can create and delete files in Windows.
I have been looking for ways to enhance the security of Mobile storage media (which can be understood as USB flash drives) in Windows. As we all know, the vast majority of security questions about the USB flash drive are concentrated on the "autorun. inf" file. As long as the file can be controlled without being modified by hacker programs, it can effectively prevent virus running caused by automatic playback problems.
Previously, I tried various methods to prevent hackers from deleting and re-creating the file, including:
- Create the autorun. inf file and set the NTFS permission to reject anyone's read and write;
- Create an autofun. inf folder and create a folder similar to s. in the folder to prevent the folder from being deleted;
- Create an autofun. inf folder and use special tools to create con and other special files in the folder to prevent the folder from being deleted;
- ......
Unfortunately, these measures are ultimately hard to escape. In Windows, you can create and delete files. Some time ago I was summing up a document (please refer to: Windows how to open the file with invalid file name, http://www.bkjia.com/ OS /201301/184666.html) suddenly had a new idea: why not use the features of Linux to cut off the black hands that extend to the USB flash disk under Windows, further improving the difficulty of using virus programs?
Based on the above ideas, the new USB flash drive virus enhanced immunity method is as follows:
- Back up your USB flash drive file in Windows and format it in NTFS format;
- Find a Ubuntu system and mount your USB flash drive;
- Create a folder named autorun. inf under the root directory of the U disk, you know;
- Go to the autorun. inf folder and create a file with special characters, such as: screen .png at 16:49:31;
- Detach your USB flash drive.
Okay, so far, go to the Windows system and challenge yourself! According to the visual test, 360 cannot delete this folder ~~
One foot tall ......, So I believe that smart hackers still have a way to deal with this trick!
//!!!!!!!!!!!!!!!!!!!!!!!!!!!
Thanks to kvllz {-AT-} sina.com! You can bypass this mechanism by modifying the name of the autorun. inf folder. It seems that the solution is not thorough enough. Continue to study! All interactions are welcome!
Autorun.inf-delete.png
// 2012-09-18
According to the tip of kvllz, I improved the USB flash drive Virus Immune solution and created a heterogeneous folder. This solution allows the Windows system to see different names than the files actually stored in the disk partition. This avoids Folder deletion or renaming and further enhances the USB flash drive immunity!
The implementation method is as follows:
1. Create an ntfs u disk;
2. Create an autorun. inf folder in the USB flash drive;
3. Use WinHex software to open the USB flash drive partition;
4. Right-click the export run. inf folder and choose Position> Go go beginning of directory from the shortcut menu ].
Edit USB device with WinHex
5. Modify the file name of autorun. inf in the disk partition to "autorun.: nf" (note that there is a colon in the file name ).
6. Save the partition modification after modification. That's all!
7. Challenge!
VcnVuLmluZs7EvP680LG7yb6z/bvy0N64xKOh "width =" 300 "type =" codeph "text ="/>