Skip to main content

How to Protect your USB Drive from Virus by using Dummy File.

Major Problem:
The main source which cause to spread the virus is our Pen Drive other than the Internet.  When we insert our Pen drive in any other system, the malicious softwares(worm,virus,…) will copy them itself to your folder.  No matter whatever you do,you can not stop the infection of malicious softwares when insert your pen drive in infected system.
How to prevent that?
So Here is simple and most effective Hack to protect your Pen drive from infection.
      The main concept of this trick is to fill the Pen drive space with file so that no other files(malicious softwares) can not be to your Pen Drive. 
To fill the Pen drive space what you need to do,  are you need to copy the lot of files to your pen Drive?  or copy a big size file?
The answer is that you don’t need to above things in order to fill the Pen drive Space.  At the same time you can not fill the Pen drive space completely. 
Then What should you do?
 Follow my steps:
Step 1:
Download this file.
Step 2:
Extract the zip file.  There will be a file “usbdummyprotect.exe”.  Copy the file to your USB.
Step 3:
Whenever you bring your pen drive to outside place click the EXE file.  It will create a dummyfile.txt

The dummyfile.txt will occupy the Pen drive memory.  So it will  prevent from virus copied to your Pen drive.   If you like to un infected files to your pen drive then deltete the dummyfile.txt

Posted by Nagesh ;)

Comments

Popular posts from this blog

These are the precautions you have to take, When your E-MAIL has been Hacked.

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out by suggesting some of the steps that you need to take as soon as you realize that your  email account is hacked . Here is a list of steps and procedures that you need to follow in order to initiate the password recovery process: Steps to Recover Gmail Password: It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try: Step-1:  Try resetting your password! This is the fir...

Block or Redirect Unwanted Websites Using HOSTS File.

The  hosts file  is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the  hosts  file to block  annoying ads, pop-ups, banners, porn sites, or even redirect one website to another. In this post I will show you how to play around with the  hosts  file to accomplish some of the above mentioned jobs. What is a hosts File? The  hosts  file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses. In other words, when you type “google.com” on your browser’s address bar, your computer will look for the  hosts  file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present in the  hosts  file, the request is then passed on to the DN...

Wifite : Hacking Wifi the easy way : Kali Linux.

Wifite While the aircrack-ng suite is a well known name in the wireless hacking , the same can't be said about Wifite. Living in the shade of the greatness of established aircrack-ng suite, Wifite has finally made a mark in a field where aircrack-ng failed. It made wifi hacking everyone's piece of cake. While all its features are not independent (eg. it  hacks WPS using reaver ), it does what it promises, and puts hacking on autopilot. I'm listing some features, before I tell you how to use wifite (which I don't think is necessary at all, as anyone who can understand simple English instructions given by Wifite can use it on his own).   Features Of Wifite Sorts targets by signal strength (in dB); cracks closest access points first Automatically de-authenticates clients of hidden networks to reveal SSIDs Numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) Customizable settings (timeouts, packets/se...