It must be that today most often flash drives are affected, being the most common devices. Any viruses, rootkits, and trojans primarily attack this type of media. Often, after a drive is infected, a user notices that folders and files on the flash drive have become shortcuts. In this case, it is not possible to extract or read information from a directory or file. Of course, no one will forbid to format the drive and get rid of the problem in one fell swoop, but if the file system stores important data, this option is impossible. Why did all the folders on the flash drive become shortcuts and how to deal with this problem? This will be described in the article.
About viruses and users
, , : . - , , ( ), .
, . , , . , , . , , . , , . , - .
, , , . , . , .
:
Before restoring the original type of directories, you must remove the malware. You can do this manually or in automatic mode. In the first case, you need to find out where the virus program file is located.
Right-click on the shortcut and select the "Properties" line. Pay attention to the area called "Object". Here is the full path to the program that launches the virus. It was because of him that the files on the flash drive became shortcuts. In almost all cases, each label will refer to the same data area on the storage medium. It should be removed. If the malware is located in a directory that it created itself (that is, there was no such directory on the flash drive before), you can delete all its contents.In addition to the flash drive, check also the directory roots:- C: \ Users \ UserName \ AppData \ Roaming.
- :\Documents and Setting\UserName\Local Settings\Applications Data.
- ( exe), , , .
, , , , , . , , . .
CD
. :
- Dr.Web LiveDisk .
- UltraISO . , .
- LiveDisk. UltraISO. "", DVD-ROM.
- .
, , , , -. . , CD.
- Dr.Web LiveDisk USB-.
- "drwebliveusb.exe" ( ).
- - USB-.
- , LiveDisk.
- "" " LiveUsb"
- "".
BIOS. , "DEL" ( - "F12"). , , , BIOS. : "Press [ ] to enter setup".
BIOS "Advanced" "Boot", "First Boot Device" "CD-ROM" "USB". "Queet" "Exit and Save". , .
, . , , , , . , "" .
LiveDisk :
- Default ( ).
- Safe mode ( , , ).
- Start local HDD ( ).
- Testing Memory ( ).
, .
, . Control Center. , "", , "Control Center".
"Tools" "Settings". , . "Delete".
"Scanner". . . "0", . . "5". "Scan archives". .
"Control Center" "Scanner" "Custom Scan". "Scan".
. . "Exit". BIOS , LiveDisk.
, . . , , . , . . , .
Windows. :
- "" "".
- "cmd" "" ( "ENTER" ). .
- "cd /d X:\" "ENTER". "X" , .
- "attrib -s -h /d /s".
. , .
, . :
- . "", " - ", "notepad" "".
- "attrib –s –h /d /s".
- "" "".
- , : "name.bat". : "bat", , .
- -.
- , .
- , , .
, , , USB-, , DVD-.
, , . , , , , . "autorun.inf", , . , , . , , , .
The proposed prevention option is perfect if the flash drive is often used on different computers. That is, malicious code located on a foreign machine can be written to the drive, but it will not be distributed on the local computer. It remains only to check the USB flash drive with antivirus tools and restore the directory attributes.
In the Windows OS, starting with Vista, autorun can be disabled in two ways. The first option, which is not suitable for owners of Windows XP, is as follows:- Open the "Start" menu and select "Control Panel" in it.
- Here, find the item with the saying "Startup".
- Uncheck the checkbox next to the line "Use autorun for all media."
, , , Windows XP:
- "" "".
- "gpedit.msc" "" "ENTER". .
- " " - " " - " Windows" - " ".
- . " ", "".
- , , . .
- Open the Run window and enter the gpupdate command in it. A command line will appear on the screen with the inscription "Update Policy". The operation will take several minutes, after closing the window, the changes will be applied.