Preview

Removal of Virus in USB Drives

Good Essays
Open Document
Open Document
693 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Removal of Virus in USB Drives
How to remove Virus from USB Drives
One of the ways by which a virus can infect your PC is through USB/Pen drives. Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB drives.
1. Whenever you plug a USB drive in your system, a window will appear similar to the one shown below
2. Don’t click on Ok , just choose ‘Cancel’.
3. Open the Command Prompt by typing ‘cmd‘ in the run box.
4. In the command prompt type the drive letter: and press enter.
5. Now type dir /w/a and press enter.
6. This will display a list of the files in the pen drive. Check whether the following files are there or not:
• Autorun.inf
• Ravmon.exe
• New Folder.exe
• svchost.exe
• Heap41a
• or any other exe file which may be suspicious.
7. If any of the above files are there, then probably the USB drive is infected.
8. In command prompt type attrib -r -a -s -h *.* and press enter.
9. This will remove the Read Only, Archive, System and hidden file attribute from all the files.
10. Now just delete the files using the command del filename. --
Example del Ravmon.exe. -
Delete all the files that are suspicious.
Example:
• Microsoft Windows XP [Version 5.1.2600]
• (C) Copyright 1985-2001 Microsoft Corp.

• L:\Documents and Settings\kayzg>o:
• O:\>

• O:\>dir /w/ac
• Volume in drive O is KAYZGPEKEE2
• Volume Serial Number is D834-F037
• Directory of O:\
• [untitled folder] [System]
• [Documents] winzip90.exe
• sdat5277.exe LaunchU3.exe
• ethereal-setup-0.99.0.exe ethereal 1.doc
• PROJECT NETWORK MANAGEMENT.doc About the Raila Virus 1.doc
• About the Raila Virus.doc KAYUMBO G.doc
• 9 File(s) 63,575,709 bytes
• 3 Dir(s) 547,983,360 bytes free
• O:\>
• O:\>del Autorun.inf
• Could Not

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3110

    • 382 Words
    • 2 Pages

    Installing antivirus on workstations will lessen the chance of infections from virus but it will not completely eliminate.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 NT1430

    • 377 Words
    • 2 Pages

    4. The df utility displays all mounted filesystems along with information about each. Use the df utility with the –h (human-readable) option to answer the following questions…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    7. Terry stores all her files in the Documents folder on her C drive. She finds that the C drive is getting low on disk space, so she has a new disk installed. She wants to continue using her Documents folder as the location for organizing all her files, and most of her applications use this folder as the default location for opening and saving files. What is the best course of action for Terry to continue working as usual?…

    • 1020 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    These are related to malware and Viruses. Users can bring malware from home on Universal Serial Bus (USB) flash disks. They can accidentally download malware from Web sites. They can also install malware from malicious e-mails. The primary protection is to ensure that you install antivirus (AV) software. Additionally, you need to update AV signatures regularly. You can’t depend on the users to keep their signatures up to date. Instead, you must take control of the process. Many AV…

    • 600 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CGS 3300 exam II

    • 439 Words
    • 2 Pages

    Anti-virus first thing you need to do to protect your computer it detects and eliminates the virus…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430 UNIT 2

    • 565 Words
    • 3 Pages

    10) Experiment by calling the ‘file’ utility with names of files in /usr/bin. How many different types of files can you find there?…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Once a file is found malicious on your computer what are the default settings for USB/removable device scanning?What should organization do regarding use of USB hard drives and slots on existing computers and devices?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    4. What are the names of the files on the floppy? Each was hidden or obscured in a different way; indicate how you found the files and how you recovered the information.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays