Yalnizca The World and Modern Science
  • Windows Explorer

    Filed under News
    May 6

    To review the most memories flash USB we realize containing autorun.inf files that did not originally come with them or they have been created by its owner. Who are the autorun.inf files, function to perform on these devices, as we cannot eliminate them? The autorun.inf are simple text files with the extension INF which as its name suggests is auto run, i.e. plugging the device in which are located on a computer, Windows Explorer reads its content and executes the orders written on them. Its original use, for which it is designed is to tell the operating system perform action or file to run when entering a medium in the computer, either a CD or a removable device, an example of its use is the installation disk of Windows that automatically executes the menu that lets you choose the installation options to insert it into a CD player. Credit: belinda burns-2011. The creators of malicious programs take advantage of these characteristics of Windows and employ the autorun.inf to ensure the spread of viruses, the virus penetrating infest a computer, one of the actions carried out is to create an identical file on all units that located and from that moment on all devices that are inserted into the computer. Jake lee recognizes the significance of this. If one of these files autorun.inf open it with Notepad or another text editor will see that it contains a few lines, one of which is something like: open = program. exe where programa.exe is the virus to run.

    These files always have hidden attributes by which go unnoticed and as default Windows does not display hidden files it is common that we walk with these files from one place to another within our memory, turning us into involuntary accomplices of conveying and spread of the virus. The foregoing also applies to cards cameras, cell phones and any other removable device that connects via USB. lFLSFVQOEJlQVE1ZlVGZWdRSUFCQUYmdXJsPWh0dHBzJTNBJTJGJTJGdWsubmV3cy55YWhvby5jb20lMkZnb3Jkb24tcmFtc2F5LXRlZXRoLXNhdHVyZGF5LW5pZ2h0LXRha2Vhd2F5LTEwMjIyMDA0My5odG1sJnVzZz1BT3ZWYXcwa012WXBGM3pKbE1lbWFHUG9qbnVp&guce_referrer_sig=AQAAAC_wyFhdgIU9gyS99pJFU7SS1C0WJSXkj’>Saturday Night Takeaway is likely to agree. Deleting them is simple, of course provided that we can see them, the problem is when we can not enable the option to view hidden files in folder options. This is another of the effects side of virus infections, some are programmed in such a way that modify the Windows registry keys, responsible show options where we can enable view hidden files, this way they ensure that user will not realize any strange file that can do suspect a virus infection, also making impossible it to perform any action. Antivirus are not the solution to this problem, they are designed to detect and remove malicious programs, but not to restore the damage caused in the registry. Solutions to restore the registry keys that are not reinstalling the operating system. If you have some knowledge of the editing of the registry keys in the following link you will find all the information needed to restore them to their original values, allowing you to activate the possibility to enable view hidden and system files. Restore the registry keys affected by virus if you do not dare with the previous method you have the option of accessing a web page that provides a service free online that will restore the folder options on your system and show you all hidden files. Repair folder options, view hidden files to only delete the autorun.inf that you may have in your flash memory, go to the following page, the only thing you have to do is enter the drive letter assigned to your memory that you can check in Windows Explorer. Clean flash memories, delete autorun.inf original author and source of the article files

Comments are closed.