Tuesday, October 19, 2010

Security malware etc, free virus scanners, external drives

http://blog.trendmicro.com/new-autorun-worms-utilize-action-key/
Roland Dela Paz Says:
May 26th, 2010 at 2:37 am
@Mpu-elcom
Thanks for sharing us these procedures.
After successfully disabling Autoplay in your machine, it is also a good practice to first open your removable drive via command prompt and look for suspicious files using the command "attrib". Usually, malware files have the following attributes, or any combination of the following:
System
Hidden
Read-only
You may also check hidden folders using the command "dir /ah". I personally practice this since worm malware like the one described above will automatically execute by just merely opening the drive via Windows Explorer (even w/o Autoplay).

Try avast and avg
free for windows - use to check exe files etc
http://www.avast.com/en-au/free-antivirus-download#tab2

http://www.avira.com/

http://housecall.trendmicro.com/au/