Protecting and procuring from viruses is ever a ambitious undertaking. Lot of viruses occupy infinite in disc and degrades the public presentation. USB Hard Disk and Flash Drive play a major function in distributing viruses. In this paper we discussed approximately preventative steps to avoid distributing viruses from USB Hard Disk and Flash Drive to system. Initially we discussed about base entirely system protection and so Anti – virus package for virus sensing. Third is taking no action while linking USB thrust and manual omission of viruses. Finally we discussed Preventive steps to avoid distributing viruses from USB Hard Disk and Flash Drive.
Preventive steps from viruses distributing, USB Hard Disk and Flash Drive virus bar
Many of our PC/laptop ‘s usually gets virus because of Pen Drives or USB devices ( Even PC ‘s who are non connected to web ) . Some Virus like Ravmon Virus, Heap41a worm which are non detected by anti virus usually spreads largely by the Pen Drives. In such a instance what can we make to forestall our Personal computer from acquiring infected with Virus that spreads through USB devices or Pen Drives? Prevention is better than remedy. in this paper we are concentrating how to forestall our system by infecting viruses from USB Hard Disk and Flash Drive.
A computing machine virus is a computing machine plan that can copy itself and infect a computing machine without the permission or cognition of the proprietor. The term “ virus ” is besides normally but mistakenly used to mention to other types of malware, adware, and spyware plans that do non hold the generative ability. A true virus can merely distribute from one computing machine to another ( in some signifier of feasible codification ) when its host is taken to the mark computing machine ; for case because a user sent it over a web or the Internet, or carried it on a removable medium such as a floppy disc, Cadmium, DVD, or USB thrust. Viruss can increase their opportunities of distributing to other computing machines by infecting files on a web file system or a file system that is accessed by another computing machine.
The term “ computing machine virus ” is sometimes used as a catch-all phrase to include all types of malware. Malware includes computing machine viruses, worms, Trojan Equus caballuss, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted package ) , including true viruses. Viruss are sometimes confused with computing machine worms and Trojan Equus caballuss, which are technically different. A worm can work security exposures to distribute itself to other computing machines without necessitating to be transferred as portion of a host, and a Trojan Equus caballus is a plan that appears harmless but has a concealed docket. Worms and Trojans, like viruses, may do injury to either a computing machine system ‘s hosted information, functional public presentation, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computing machine user, but many are furtive.
II. Operating system reinstallation
Reinstalling the operating system is another attack to virus remotion. It involves merely reformatting the OS divider and put ining the OS from its original media, or imaging the divider with a clean backup image ( Taken with Ghost or Acronis for illustration ) . This method has the benefits of being simple to make, being faster than running multiple antivirus scans, and is guaranteed to take any malware. Downsides include holding to reinstall all other package, reconfiguring, reconstructing user penchants. User informations can be backed up by booting off of a Live Cadmium or seting the difficult thrust into another computing machine and booting from the other computing machine ‘s operating system ( though attention must be taken non to reassign the virus to the new computing machine ) .
III. Preventive steps to avoid spreading viruses
A. Stand entirely system.
The lone best manner to avoid viruses is maintaining the system as base entirely with out pass oning with any other system. Even diskettes, pen thrusts and bluish tooth are should non used for computing machine. But in to-days universe it is non at all possible because communicating plays a critical function in modern universe.
B. Anti – virus package.
Many users install anti-virus package that can observe and extinguish known viruses after the computing machine downloads or runs the feasible. There are two common methods that an anti-virus package application uses to observe viruses. The first, and by far the most common method of virus sensing is utilizing a list of virus signature definitions. This works by analyzing the content of the computing machine ‘s memory ( its RAM, and boot sectors ) and the files stored on fixed or removable thrusts ( difficult thrusts, floppy thrusts ) , and comparing those files against a database of known virus “ signatures ” . The disadvantage of this sensing method is that users are merely protected from viruses that pre-date their last virus definition update. The 2nd method is to utilize a heuristic algorithm to happen viruses based on common behaviours. This method has the ability to observe viruses that anti-virus security houses have yet to make a signature for.
Some anti-virus plans are able to scan opened files in add-on to direct and received e-mails ‘on the fly ‘ in a similar mode. This pattern is known as “ on-access scanning. ” Anti-virus package does non alter the implicit in capableness of host package to convey viruses. Users must update their package on a regular basis to piece security holes. Anti-virus package besides needs to be on a regular basis updated in order to forestall the latest menaces.
One may besides understate the harm done by viruses by doing regular backups of informations ( and the operating systems ) on different media, that are either kept unconnected to the system ( most of the clip ) , read-only or non accessible for other grounds, such as utilizing different file systems. This manner, if informations is lost through a virus, one can get down once more utilizing the backup ( which should sooner be recent ) . If a backup session on optical media like Cadmium and DVD is closed, it becomes read-only and can no longer be affected by a virus ( so long as a virus or infected file was non copied onto the CD/DVD ) . Likewise, an operating system on a bootable Cadmium can be used to get down the computing machine if the installed operating systems become unserviceable. Backups on removable media must be carefully inspected before Restoration. The Gammima virus, for illustration, propagates via removable flash thrusts
C. Take no action while linking USB thrust
We can protect your Personal computer by merely following the simple stairss below while linking USB thrust.
Connect Pen Drive or USB thrust to Computer.
Then a duologue window will popup inquiring to take among the options as shown in the figure 1.
Fig.1 Take no action while linking USB thrust
Do n’t take any of them, merely merely click Cancel.
Now go to Start — & gt ; Run and type cmd to open the Command Prompt window.
Now go to My Computer and Check the Drive missive of your USB thrust or Pen Drive. ( E.g. If it is written Kingston ( I: ) , so I: will be the drive missive. )
In the Command Window ( cmd ) , type the drive missive: and Hit Enter ( I: ) .
Now type dir/w/o/a/p and Hit Enter.
You will acquire a list of files. In the list, hunt if anyone of the undermentioned do be.
RVHost.exe or any other files with.exe Extension.
If there is any one of the files above, Run the bid attrib -h -r -s -a * . * and Hit Enter.
Now Delete each File utilizing the undermentioned Command del file name ( E.g del autorun.inf ) .
Now scan USB thrust with the anti virus we have to guarantee that we made our Pen Drive free of Virus.
Now we removed the viruses manually and confirmed with Antivirus package.
D. Disable Write Access to USB Hard Disk and Flash Key Drives
There is a register drudge that able to disenable the USB thrust entree to USB mass storage device such as brassy thrust, USB key, thumb thrust, pen thrust and portable difficult disc while maintaining the USB hardware device such as webcam, mouse, keyboard, pressman and scanner connected to USB ports working as usual. However, the drudge disables the USB entree to harrow thrust wholly. User can non copy informations to the USB disc storage, nor able to read any files and paperss from the USB thrust.
For user who merely want to disenable write entree to the external removable USB mass storage disc thrust, there is another register drudge of WriteProtect in StorageDevicePolicies register key that able to curtail Windows system from composing to the USB disc thrust, and therefore efficaciously user to copy any sensitive or private informations from the Personal computer to USB cardinal stick. The fast one works in a similar manner to write-protect characteristic used in floppy disc and backup tape which make the disc read-only, merely that in this instance, it ‘s system broad execution that block any authorship and recording of informations to USB mass storage device.
To disenable composing entree to USB thrusts and do all USB thrusts has merely read-only entree, follow these stairss:
Run Registry Editor ( regedit ) .
Fig.2. run regedit.exe.
Navigate to the undermentioned register key:
Fig.3. Navigate to the register key.
Make a New Key named as StorageDevicePolicies.
Fig.4. Make a new key
Highlight StorageDevicePolicies, and so make a New DWORD ( 32-bit ) Value.
Fig.5. Add DWORD value
Named new DWORD value as WriteProtect.
Fig.6 name is given for new DWORD value.
6. Double chink on WriteProtect, and set its value informations to 1.
Fig.7 Edit DWORD value.
Once set, all users on the computing machine is now blocked and prevented from copying, reassigning or composing any files, paperss and informations to the USB disc thrusts, without the demand to re-start or bring up computing machine. Any effort to download or transcript files to USB thrust will return the undermentioned mistake message:
The disc is write protected.
The media is write-protected.
Remove the write protection or utilize another disc.
While making a new Microsoft Word Document we get error message “ The media is write-protected ” .
Fig.8 Error message: The media is write-protected.
While making a new Microsoft Word Document we get error message “ Remove the write protection or utilize another disc ” .
Fig.9 Error message: Remove the write protection or utilize another disc.
To return and take the out of use write entree to USB drivers, merely cancel the StorageDevicePolicies register key, or cancel the WriteProtect register entry, or alter the value informations for WriteProtect to zero ( that is 0 ) .
For user who does n’t desire to manually redacting the register, merely the undermentioned codification to enable or disenable the write protection ( block composing effort ) to USB removable thrust.
A. Disable the write protection
Type the undermentioned codification and salvage to DisableWriteToUSB.reg file
Fig. 10 DisableWriteToUSB.reg file
Double click the DisableWriteToUSB.reg file
Fig. 11 DisableWriteToUSB.reg file icon
B. Disable the write protection
Type the undermentioned codification and salvage to EnableWriteToUSB.reg file
Fig. 12 EnableWriteToUSB.reg file
Double click the EnableWriteToUSB.reg file
Fig. 13 EnableWriteToUSB.reg file icon
This method works in Windows XP SP2 and SP3, Windows Vista, Windows Server 2003 and 2008.
Lot of viruses occupy infinite in disc and degrades the public presentation. Using these preventative steps infinite and clip jobs are solved to some extent. Public service systems besides get protection from viruses. Thousands of DTP centres will acquire profit by forestalling from distributing viruses.