Avgsmoe
Member
- Reaction score
- 1
- Location
- Washington
I have been using this setup for a while, and it works great for me, hopefully some of you will benefit as well.
I use a 4GB flash drive dedicated for malware clean up.
I disabled autorun malware by using this
I created a hidden folder called TrueCrypt. Inside is portable truecrypt, and a 3GB truecrypt container.
On the root of the flash drive I have 3 batch files.
1) mounts truecrypt container with read only permissions
2) mounts truecrypt container with read/write - for updating
3) unmounts truecrypt volume
**cleaner is the name of my truecrypt container** **infected is the password**
I also have rkill on the root, and a back up of truecrypt file compressed, and passworded.
You can imagine what to put n the true crypt container. I have all my normal anti-spyware/virus/malware/rootkit software. I also have a Windows system control center setup there also, because AV's love to delete those files
I use a 4GB flash drive dedicated for malware clean up.
I disabled autorun malware by using this
Code:
@echo off
cls
echo MKAUTORN.BAT is an autorun.inf folder maker
echo.
echo This batch file will do the following:
echo 1) Remove hidden, system, and read-only attribute of autorun.inf FILE
echo 2) Delete autorun.inf FILE
echo 3) Create autorun.inf FOLDER
echo 4) Create a CON folder inside the autorun.inf folder
echo 5) Hide the autorun.inf folder
echo.
echo This batch file should be executed from your USB drive's root directory to
echo function properly. Make sure you copy this batch file to the root of your USB drive
echo first. If not, press Ctrl+C NOW to terminate this job then run this batch file
echo again from there.
echo.
echo If there's any error messages or Yes or No
echo question that appears, simpy anwser YES by pressing "Y".
echo.
pause
echo.
attrib autorun.inf -r -h -s
del autorun.inf
md autorun.inf
cd autorun.inf
md .\con\
cd\
attrib autorun.inf +r +h +s
echo.
dir autorun.* /a
echo.
echo DONE!
pause
I created a hidden folder called TrueCrypt. Inside is portable truecrypt, and a 3GB truecrypt container.
On the root of the flash drive I have 3 batch files.
1) mounts truecrypt container with read only permissions
Code:
TrueCrypt\TrueCrypt.exe /q background /l /e /m ro /v "cleaner" /p "infected"
2) mounts truecrypt container with read/write - for updating
Code:
TrueCrypt\TrueCrypt.exe /q background /l /e /m rm /v "cleaner" /p "infected"
3) unmounts truecrypt volume
Code:
TrueCrypt\TrueCrypt.exe /q /d
**cleaner is the name of my truecrypt container** **infected is the password**
I also have rkill on the root, and a back up of truecrypt file compressed, and passworded.
You can imagine what to put n the true crypt container. I have all my normal anti-spyware/virus/malware/rootkit software. I also have a Windows system control center setup there also, because AV's love to delete those files
