SlideShare a Scribd company logo
UNIT TEKNOLOGI MAKLUMAT
POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM


How to prevent virus in your Pendrive/Flash Memory/MMC
from infecting your PC
Just follow through these 12 steps…


   1. When you connect a pendrive to your PC or laptop a prompt window will appear.




   2. Immediately close the prompt window by pressing the               button or
      button.




Created by
AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
UNIT TEKNOLOGI MAKLUMAT
POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM

   3. Next open a command prompt by clicking:




                           type “cmd” and press             button.



   4. A command prompt window will appear on your screen.




Created by
AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
UNIT TEKNOLOGI MAKLUMAT
POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM


   5. Next minimize your command prompt window by clicking         button and click on


                  icon on your desktop or start menu.



   6. When your Windows Explorer window shows up, look for your pendrive drive letter. For
      instance, referring from the picture below my pendrive drive letter is G.




Created by
AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
UNIT TEKNOLOGI MAKLUMAT
POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM

    7. Then, maximize your command prompt window and type the following command:
              1) “G:” without the double quote and press <enter>
              2) “dir/w/o/a/p” without the double quote and press <enter>

*refer to the illustration below




    8. On the command prompt screen, look for filename with the following name:
              i.    Autorun.inf
              ii.   New Folder.exe
              iii.  Bha .vbs
              iv.   Iexplore.vbs
              v.    Info.exe
              vi.   New_Folder.exe
              vii.  RavMon.exe
              viii. RVHOST.EXE




Created by
AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
UNIT TEKNOLOGI MAKLUMAT
POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM

    9. If you found any of the mention filenames please perform the following command:

               “attrib –h –r –s –a *.*” without the double quote and press <enter>


*refer to the illustration below




Created by
AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
UNIT TEKNOLOGI MAKLUMAT
POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM

    10. Then delete the file using the following command:

                                         del <filename>

        example:

                                         del autorun.inf
                                               or
                                      del “New Folder.exe”

* refer to the illustration below




    11. And now you are free to scan your pendrive using your favorite antivirus software. If
        you don’t have any try download the antivirus software from the internet.

        Nod32 – http://www.eset.com
        Symantec – http://www.symantec.com
        AVG – http://www.grisoft.com/us/us_dwnl_free.php
        Mcafee – http://www.macfee.com

    12. Finally after finish scanning using your antivirus software, please eject your
        pendrive/flash memory/MMC and plug it back to your PC/Laptop before using it.



Created by
AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)

More Related Content

What's hot

Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
kingh05
 
4 Ways to Make UAC Less Annoying on Windows 7 / Vista
4 Ways to Make UAC Less Annoying on Windows 7 / Vista4 Ways to Make UAC Less Annoying on Windows 7 / Vista
4 Ways to Make UAC Less Annoying on Windows 7 / Vista
yeenaroth
 
Manually remove win tune pro
Manually remove win tune proManually remove win tune pro
Manually remove win tune pro
haroNaroum
 
Delete hack tool win64 gendows: how to delete HackTool:Win64/Gendows
Delete hack tool win64 gendows: how to delete HackTool:Win64/GendowsDelete hack tool win64 gendows: how to delete HackTool:Win64/Gendows
Delete hack tool win64 gendows: how to delete HackTool:Win64/Gendows
Bradalex26
 
Manually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by stepManually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by step
haroNaroum
 
What is print.exe?
What is print.exe?What is print.exe?
What is print.exe?
FileInspect
 
Remove bronze aid pop up ads extension from chrome, ie and firefox
Remove bronze aid pop up ads extension from chrome, ie and firefoxRemove bronze aid pop up ads extension from chrome, ie and firefox
Remove bronze aid pop up ads extension from chrome, ie and firefox
haroNaroum
 
How to Remove DNS Unlocker Adware
How to Remove DNS Unlocker AdwareHow to Remove DNS Unlocker Adware
How to Remove DNS Unlocker Adware
Deborah Hopkins
 
Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?
kolden
 
Remove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYRemove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXY
jennyaniston
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virus
coseanonans
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_sality
Gustav Kato
 
Windows 10: How to reset default settings
Windows 10: How to reset default settings Windows 10: How to reset default settings
Windows 10: How to reset default settings
Xoom Telecom
 
Root-Unroot Huawei P7 using Root Genius_2016
Root-Unroot Huawei P7 using Root Genius_2016Root-Unroot Huawei P7 using Root Genius_2016
Root-Unroot Huawei P7 using Root Genius_2016
Atiqa khan
 
ROM Flashing of Huawei P7 (Lollipop 5.1.1)
ROM Flashing of Huawei P7 (Lollipop 5.1.1)ROM Flashing of Huawei P7 (Lollipop 5.1.1)
ROM Flashing of Huawei P7 (Lollipop 5.1.1)
Atiqa khan
 

What's hot (17)

Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
4 Ways to Make UAC Less Annoying on Windows 7 / Vista
4 Ways to Make UAC Less Annoying on Windows 7 / Vista4 Ways to Make UAC Less Annoying on Windows 7 / Vista
4 Ways to Make UAC Less Annoying on Windows 7 / Vista
 
Manually remove win tune pro
Manually remove win tune proManually remove win tune pro
Manually remove win tune pro
 
Delete hack tool win64 gendows: how to delete HackTool:Win64/Gendows
Delete hack tool win64 gendows: how to delete HackTool:Win64/GendowsDelete hack tool win64 gendows: how to delete HackTool:Win64/Gendows
Delete hack tool win64 gendows: how to delete HackTool:Win64/Gendows
 
Manually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by stepManually remove surfvox.com from computer step by step
Manually remove surfvox.com from computer step by step
 
What is print.exe?
What is print.exe?What is print.exe?
What is print.exe?
 
Remove bronze aid pop up ads extension from chrome, ie and firefox
Remove bronze aid pop up ads extension from chrome, ie and firefoxRemove bronze aid pop up ads extension from chrome, ie and firefox
Remove bronze aid pop up ads extension from chrome, ie and firefox
 
Netextender mac
Netextender macNetextender mac
Netextender mac
 
How to Remove DNS Unlocker Adware
How to Remove DNS Unlocker AdwareHow to Remove DNS Unlocker Adware
How to Remove DNS Unlocker Adware
 
Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 
Remove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYRemove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXY
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virus
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_sality
 
Windows 10: How to reset default settings
Windows 10: How to reset default settings Windows 10: How to reset default settings
Windows 10: How to reset default settings
 
Root-Unroot Huawei P7 using Root Genius_2016
Root-Unroot Huawei P7 using Root Genius_2016Root-Unroot Huawei P7 using Root Genius_2016
Root-Unroot Huawei P7 using Root Genius_2016
 
ROM Flashing of Huawei P7 (Lollipop 5.1.1)
ROM Flashing of Huawei P7 (Lollipop 5.1.1)ROM Flashing of Huawei P7 (Lollipop 5.1.1)
ROM Flashing of Huawei P7 (Lollipop 5.1.1)
 

Viewers also liked

Korean insights_emilio_pila_planerpila
Korean insights_emilio_pila_planerpilaKorean insights_emilio_pila_planerpila
Korean insights_emilio_pila_planerpila
Planerpila Decks
 
Share point look like lego peices
Share point look like lego peicesShare point look like lego peices
Share point look like lego peicesSaman Coliaie
 
Governance Overview - Iran SharePoint Academy
Governance Overview  - Iran SharePoint AcademyGovernance Overview  - Iran SharePoint Academy
Governance Overview - Iran SharePoint AcademySaman Coliaie
 
La paz perpetua - Inmanuel Kant
La paz perpetua - Inmanuel KantLa paz perpetua - Inmanuel Kant
La paz perpetua - Inmanuel Kant
Javier Merino
 
1AF2 Jolien Taghon BMW
1AF2 Jolien Taghon BMW1AF2 Jolien Taghon BMW
1AF2 Jolien Taghon BMW
Koedie
 
InkijKdec09
InkijKdec09InkijKdec09
InkijKdec09Robober
 
Nintex Workflow
Nintex WorkflowNintex Workflow
Nintex Workflow
Saman Coliaie
 
SharePoint Overview 2/2 - Iran SharePoint Academy
SharePoint Overview 2/2 - Iran SharePoint AcademySharePoint Overview 2/2 - Iran SharePoint Academy
SharePoint Overview 2/2 - Iran SharePoint Academy
Saman Coliaie
 
Sydney Opera House – Tapak Warisan Dunia Unesco
Sydney Opera House – Tapak Warisan Dunia UnescoSydney Opera House – Tapak Warisan Dunia Unesco
Sydney Opera House – Tapak Warisan Dunia Unesco
Politeknik Transkrian
 
Onderweg
OnderwegOnderweg
Onderweg
Robober
 
Slideshare Test
Slideshare TestSlideshare Test
Slideshare Test
guestd51832
 
Tallinna Ülikool
Tallinna ÜlikoolTallinna Ülikool
Tallinna Ülikoolellukas
 

Viewers also liked (17)

Cost control format
Cost control formatCost control format
Cost control format
 
Korean insights_emilio_pila_planerpila
Korean insights_emilio_pila_planerpilaKorean insights_emilio_pila_planerpila
Korean insights_emilio_pila_planerpila
 
Who I Am Makes A Difference
Who I Am Makes A DifferenceWho I Am Makes A Difference
Who I Am Makes A Difference
 
Share point look like lego peices
Share point look like lego peicesShare point look like lego peices
Share point look like lego peices
 
Governance Overview - Iran SharePoint Academy
Governance Overview  - Iran SharePoint AcademyGovernance Overview  - Iran SharePoint Academy
Governance Overview - Iran SharePoint Academy
 
La paz perpetua - Inmanuel Kant
La paz perpetua - Inmanuel KantLa paz perpetua - Inmanuel Kant
La paz perpetua - Inmanuel Kant
 
1AF2 Jolien Taghon BMW
1AF2 Jolien Taghon BMW1AF2 Jolien Taghon BMW
1AF2 Jolien Taghon BMW
 
InkijKdec09
InkijKdec09InkijKdec09
InkijKdec09
 
Nintex Workflow
Nintex WorkflowNintex Workflow
Nintex Workflow
 
Chap01
Chap01Chap01
Chap01
 
SharePoint Overview 2/2 - Iran SharePoint Academy
SharePoint Overview 2/2 - Iran SharePoint AcademySharePoint Overview 2/2 - Iran SharePoint Academy
SharePoint Overview 2/2 - Iran SharePoint Academy
 
Sydney Opera House – Tapak Warisan Dunia Unesco
Sydney Opera House – Tapak Warisan Dunia UnescoSydney Opera House – Tapak Warisan Dunia Unesco
Sydney Opera House – Tapak Warisan Dunia Unesco
 
Indian Economy
Indian EconomyIndian Economy
Indian Economy
 
Onderweg
OnderwegOnderweg
Onderweg
 
Slideshare Test
Slideshare TestSlideshare Test
Slideshare Test
 
Tallinna Ülikool
Tallinna ÜlikoolTallinna Ülikool
Tallinna Ülikool
 
Tallinn
TallinnTallinn
Tallinn
 

Similar to How To Prevent Virus Part1

Dell Venue 7 3740
Dell Venue 7 3740Dell Venue 7 3740
Dell Venue 7 3740
Kojo King
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
Mehedi Hasan
 
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan   set up in windows 8Windows defender scheduled scan   set up in windows 8
Windows defender scheduled scan set up in windows 8Trường Tiền
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
Vinay Soni
 
Auto sanbox technology a complete overview
Auto sanbox technology a complete overviewAuto sanbox technology a complete overview
Auto sanbox technology a complete overview
William hendric
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
Avanzo net
 
Readme
ReadmeReadme
Readme
inkydinkyoh
 
Diyobd2 how to install op com via computer
Diyobd2 how to install op com via computerDiyobd2 how to install op com via computer
Diyobd2 how to install op com via computer
spobd2
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
 
Orangescrum In App Chat Add-on User Manual
Orangescrum In App Chat Add-on User ManualOrangescrum In App Chat Add-on User Manual
Orangescrum In App Chat Add-on User Manual
Orangescrum
 
How to create an identifeye ar game – tech specs
How to create an identifeye ar game – tech specsHow to create an identifeye ar game – tech specs
How to create an identifeye ar game – tech specs
Onno Hansen-Staszyński
 
Windows Command Line Tools
Windows Command Line ToolsWindows Command Line Tools
Windows Command Line Toolslove4upratik
 
Technical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a ServiceTechnical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a Service
Wonderware InTouch Machine Edition
 
Lab-12 Social Engineering and Physical Security The firs.docx
Lab-12 Social Engineering and Physical Security        The firs.docxLab-12 Social Engineering and Physical Security        The firs.docx
Lab-12 Social Engineering and Physical Security The firs.docx
pauline234567
 
How to install vag com vcds software
How to install vag com vcds softwareHow to install vag com vcds software
How to install vag com vcds software
aciscan2014
 
MicroPython for LEGO Spike - introduction
MicroPython for LEGO Spike - introductionMicroPython for LEGO Spike - introduction
MicroPython for LEGO Spike - introduction
sdoro58
 
Nullbyte 6ed. 2019
Nullbyte 6ed. 2019Nullbyte 6ed. 2019
Nullbyte 6ed. 2019
Ricardo L0gan
 

Similar to How To Prevent Virus Part1 (20)

Dell Venue 7 3740
Dell Venue 7 3740Dell Venue 7 3740
Dell Venue 7 3740
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan   set up in windows 8Windows defender scheduled scan   set up in windows 8
Windows defender scheduled scan set up in windows 8
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Auto sanbox technology a complete overview
Auto sanbox technology a complete overviewAuto sanbox technology a complete overview
Auto sanbox technology a complete overview
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
 
Readme
ReadmeReadme
Readme
 
Readme
ReadmeReadme
Readme
 
Diyobd2 how to install op com via computer
Diyobd2 how to install op com via computerDiyobd2 how to install op com via computer
Diyobd2 how to install op com via computer
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
 
Orangescrum In App Chat Add-on User Manual
Orangescrum In App Chat Add-on User ManualOrangescrum In App Chat Add-on User Manual
Orangescrum In App Chat Add-on User Manual
 
How to create an identifeye ar game – tech specs
How to create an identifeye ar game – tech specsHow to create an identifeye ar game – tech specs
How to create an identifeye ar game – tech specs
 
Windows Command Line Tools
Windows Command Line ToolsWindows Command Line Tools
Windows Command Line Tools
 
Technical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a ServiceTechnical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a Service
 
Download idm
Download idmDownload idm
Download idm
 
Download idm
Download idmDownload idm
Download idm
 
Lab-12 Social Engineering and Physical Security The firs.docx
Lab-12 Social Engineering and Physical Security        The firs.docxLab-12 Social Engineering and Physical Security        The firs.docx
Lab-12 Social Engineering and Physical Security The firs.docx
 
How to install vag com vcds software
How to install vag com vcds softwareHow to install vag com vcds software
How to install vag com vcds software
 
MicroPython for LEGO Spike - introduction
MicroPython for LEGO Spike - introductionMicroPython for LEGO Spike - introduction
MicroPython for LEGO Spike - introduction
 
Nullbyte 6ed. 2019
Nullbyte 6ed. 2019Nullbyte 6ed. 2019
Nullbyte 6ed. 2019
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

How To Prevent Virus Part1

  • 1. UNIT TEKNOLOGI MAKLUMAT POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM How to prevent virus in your Pendrive/Flash Memory/MMC from infecting your PC Just follow through these 12 steps… 1. When you connect a pendrive to your PC or laptop a prompt window will appear. 2. Immediately close the prompt window by pressing the button or button. Created by AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
  • 2. UNIT TEKNOLOGI MAKLUMAT POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM 3. Next open a command prompt by clicking: type “cmd” and press button. 4. A command prompt window will appear on your screen. Created by AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
  • 3. UNIT TEKNOLOGI MAKLUMAT POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM 5. Next minimize your command prompt window by clicking button and click on icon on your desktop or start menu. 6. When your Windows Explorer window shows up, look for your pendrive drive letter. For instance, referring from the picture below my pendrive drive letter is G. Created by AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
  • 4. UNIT TEKNOLOGI MAKLUMAT POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM 7. Then, maximize your command prompt window and type the following command: 1) “G:” without the double quote and press <enter> 2) “dir/w/o/a/p” without the double quote and press <enter> *refer to the illustration below 8. On the command prompt screen, look for filename with the following name: i. Autorun.inf ii. New Folder.exe iii. Bha .vbs iv. Iexplore.vbs v. Info.exe vi. New_Folder.exe vii. RavMon.exe viii. RVHOST.EXE Created by AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
  • 5. UNIT TEKNOLOGI MAKLUMAT POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM 9. If you found any of the mention filenames please perform the following command: “attrib –h –r –s –a *.*” without the double quote and press <enter> *refer to the illustration below Created by AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)
  • 6. UNIT TEKNOLOGI MAKLUMAT POLITEKNIK SULTAN SALAHUDDIN ABDUL AZIZ SHAH, SEKSYEN U1, PERSIARAN USAHAWAN, 40150 SHAH ALAM 10. Then delete the file using the following command: del <filename> example: del autorun.inf or del “New Folder.exe” * refer to the illustration below 11. And now you are free to scan your pendrive using your favorite antivirus software. If you don’t have any try download the antivirus software from the internet. Nod32 – http://www.eset.com Symantec – http://www.symantec.com AVG – http://www.grisoft.com/us/us_dwnl_free.php Mcafee – http://www.macfee.com 12. Finally after finish scanning using your antivirus software, please eject your pendrive/flash memory/MMC and plug it back to your PC/Laptop before using it. Created by AHMAD AZWAN BIN MAT YATIM (aazwan [at] psa.edu.my)