Free Essay

Autorun, What Is It?

In: Computers and Technology

Submitted By Brooke84
Words 421
Pages 2
Autorun, What is it?
Autorun, or "Autoplay", are extended automatic functions associated with removable media such as CDs, DVDs and USB Drives. The foundation of this feature is the insert notification support in the device driver. Most, if not all, removable devices available today support this feature. After Windows detects that a disk has been inserted, it looks in the disk's root directory, finds, reads, and follows specific instructions defined in a text based configuration file, Autorun.inf.
In short, a computer looks for an "autorun.inf" file within any removable media inserted into it, such as a USB, CD, or DVD, and if such a file is found, treats the media as an Autorun device. This is the essence of applications automatically launching when a CD/DVD is inserted into a computer. A prime example of this would be the "setup" application executing when a product's CD is inserted.
USB Flash Drive: the Autorun feature for this medium was introduced with Windows Vista. Autorun on a USB Drive will not automatically run an Application as it does on a CD/DVD. Autorun installed on a USB Drive will only create a Menu Item and Icon. Enabling you start the Startup Utility of the NCO Leaders Book from there you will have access to the NCO Leaders Book and other Utilities.
Military Computers: Most Computer Systems in the Work Place will have Autorun Disabled by default, However this does not prevent you from using the NCO Leaders Book on these computers. You will have to access the NCO Leaders Book by selecting and running the Software directly:
StartUpUtility.exe = This is the Autorun startup program, from here you can run all of the NCO Leaders Book’s Programs and Utilities from one central location. (Simply Put a Start Menu)
NCO Leaders Book.exe = The Main Program
TransferIn.exe = The NCO Leaders Book Transfer In Utility, used to transfer in data from backup copies or from other NCO Leaders Book’s.
TransferOut.exe = The NCO Leaders Book Transfer Out Utility, used to create backup copies of the Database or transfer data over to another NCO Leaders Book’.
The Autorun.inf file defines the process or application that will automatically run when a disk is inserted. The Autorun file can also define the following, among other things:
The Icon that will represent your NCO Leaders Book when the drive is viewed with My Computer or Explorer.
Menu commands displayed when the user right-clicks the NCO Leaders Book icon from My Computer or Explorer.

Similar Documents

Premium Essay

Comp

...Hw Lab 1. What is the main difference between a virus and a Trojan? A virus is a program that is capable of replicating with little or no user intervention, and the replicated programs also replicate further. There is typically a piece of code that causes an unexpected, usually malicious, event (payload) to occur. Viruses are often disguised as games or images with clever marketing titles. A Trojan horse is a program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. True Trojan horses are not technically viruses, since they do not replicate, however many viruses and worms use Trojan horse tactics to infiltrate a system. Although Trojans are not technically viruses, they can be just as destructive.   2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well. Virus maybe can send files to other people that don’t allow reading these files. It will affect Confidentiality. Some virus will break program. Then these programs cannot run. This wills effect Availability. Some virus will change some file in a program. This wills effect Integrity.   3. Once a malicious file is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing computers and devices? Besides Vendor IDs and Product IDs, some devices...

Words: 331 - Pages: 2

Free Essay

Thumbdrive, Pendrive, Flashdrive or Whatever You Call It: Pendrive Virus

...Storage Device is susceptible to a virus infection. Yes we do have Antivirus,you have [Insert your best bet AV name],but at some time the virus can and will bypass the security measure that have been placed by our security system software. We also have to remember that the av's rely heavily on its database signature of virus. This means if your system is to be infected by a newly crafted virus ,chances are your av won't detect it at all eventhough its equipped with a highly advanced heuristic scanner. Enough with the bull. What i'm really trying to say is how dangerous it is for us to double click/"Open" your pendrive's drive in "My Computer" right after you plugged in your USB storage device. When you double click or "Open" ,you are actually trying to launch the virus itself embedded in the USB storage device or more specifically you are actually excuting the program stated in the file named autorun.inf.example of the content of the autorun.inf file: [autorun] open=yxcm.exe This is the only way a virus can move,run or to be excecuted. So this method of propagation highly depends if the host has the following.. etc weak av,unupdated av,computer illiterate user. We can safely say that every infected USB storage device have both autorun.inf and atleast an executable. Usually these two files are extra hidden and can only be seen using the Command Prompt. To see the hidden files using the command prompt. Launch the command prompt by clicking the Start button and in the text box...

Words: 507 - Pages: 3

Premium Essay

Stuxnet Virus

...Stuxnet Virus According to counterterrorism czar Richard Clarke, Stuxnet was a weaponized malware computer worm. Stuxnet was launched in mid-2009, it did major damage to Iran’s nuclear program in 2010 and then spread to computers all over the world (Clarke, 2012). Type of Breach The Stuxnet is a computer worm, “it is a digital ghost with countless lines of code… it was able to worm its way into Iran’s nuclear fuel enrichment facility in Natanz, Iran” (Clarke, 2012). A worm is a program that spreads copies of itself through a network and a worm can also spread copies of itself as a stand-alone program (Pfleeger & Pfleeger, 2007). How the Breach Occurred On June 17, 2010, Sergey Ulasen, head of a small computer security firm called VirusBlokAda, was going his through e-mail when a report caught his attention. A computer belonging to an Iranian customer was caught in a reboot loop; it was “shutting down and restarting repeatedly despite efforts by operators to take control of it. It appeared the machine was infected with a virus” (Zetter, 2011). Ulasen’s research team got hold of the virus infecting their client’s computers. They realized it was using a “zero-day” exploit to spread (Zetter, 2011). Zero-days are the hacking world’s most potent weapons: The virus exploits vulnerabilities in software that are not yet known to the software maker or antivirus vendors. They’re also exceedingly rare; it takes considerable skill and persistence to find such vulnerabilities and...

Words: 1195 - Pages: 5

Premium Essay

Hw Lab

...1. What is the main difference between a virus and a Trojan? A virus is a program that is capable of replicating with little or no user intervention, and the replicated programs also replicate further. There is typically a piece of code that causes an unexpected, usually malicious, event (payload) to occur. Viruses are often disguised as games or images with clever marketing titles. A Trojan horse is a program that either pretends to have, or is described as having, a set of useful or desirable features, but actually contains a damaging payload. True Trojan horses are not technically viruses, since they do not replicate, however many viruses and worms use Trojan horse tactics to infiltrate a system. Although Trojans are not technically viruses, they can be just as destructive. 2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well. Virus maybe can send files to other people that don’t allow reading these files. It will affect Confidentiality. Some virus will break program. Then these programs cannot run. This wills effect Availability. Some virus will change some file in a program. This wills effect Integrity. 3. Once a malicious file is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing computers and devices? Besides Vendor IDs and Product IDs, some devices also have...

Words: 1736 - Pages: 7

Free Essay

It Guide

...[pic] Step-by-Step Guide to Getting Started with Hyper-V Microsoft Corporation Published: December 2007 Author: Kathy Davies Editor: Ron Loi Abstract This guide helps you become familiar with Hyper-V™ by providing instructions on installing this new technology and creating a virtual machine. [pic] Copyright Information This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release, and is the confidential and proprietary information of Microsoft Corporation. It is disclosed pursuant to a non-disclosure agreement between the recipient and Microsoft. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document...

Words: 1544 - Pages: 7

Premium Essay

Computer and Network Security

...first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture, 2009, p. 6). Ways to migrate this issue is by gluing shut the ports, disable USB ports in BIOS, prevent users from installing a USB device by denying permission on files called usbstor.pnf and usbstor.inf, making USB ports read only, disable USB ports in Group Policy, or disable Autorun (Couture, 2009, p. 11). In the second article it discusses the vulnerabilities of the BIOS. The BIOS performs power up test amongst the hardware components and memory and without this program the computer wouldn’t know what to do after it was turned on. The BIOS can be accessed by the use of backdoor passwords, cracking the BIOS password, deleting the contents of the CMOS RAM by software and/or hardware (Allgeuer, 2001, p. 4). Ways to mitigate the risk of users accessing the BIOS is to use BIOS passwords to protect the BIOA configuration utility, for the more critical systems different BIOS password should be used than less critical systems, boot only from hard drives, computer cases should be...

Words: 1760 - Pages: 8

Free Essay

Passport User Manual

...® Essential™ and Essential SE Ultra-Portable Hard Drives User Manual My Passport Essential and Essential SE User Manual External Portable My Passport WD Service and Support Should you encounter any problem, please give us an opportunity to address it before returning this product. Most technical support questions can be answered through our knowledge base or e-mail support service at support.wdc.com. If the answer is not available or if you prefer, please contact WD® at the best telephone number shown below. Your product includes 30 days of free telephone support during the warranty period. This 30day period starts on the date of your first telephone contact with WD Technical Support. E-mail support is free for the entire warranty period and our extensive knowledge base is available 24/ 7. To help us keep you informed of new features and services, remember to register your product online at http://register.wdc.com. Accessing Online Support Visit our product support website at support.wdc.com and choose from these topics: • Downloads—Download drivers, software, and updates for your WD product. • Registration—Register your WD product to get the latest updates and special offers. • Warranty & RMA Services—Get warranty, product replacement (RMA), RMA status, and data recovery information. • Knowledge Base—Search by keyword, phrase, or answer ID. • Installation—Get online installation help for your WD product or software. Contacting WD Technical...

Words: 16742 - Pages: 67

Free Essay

Operation Manual

...Premium operating system (OS). Always install the latest OS version and Because motherboard settings and hardware options vary, use the setup procedures presented in this chapter for general reference only. Refer to your OS documentation for more information. 3.2 Support CD information The support CD that came with the motherboard contains useful software and several utility drivers that enhance the motherboard features. The contents of the support CD are subject to change at any time without notice. Visit the ASUS website for updates. 3.2.1 Running the support CD To begin using the support CD, simply insert the CD into your CD-ROM drive. The CD automatically displays the Drivers menu if Autorun is enabled in your computer. Click on an item to install. If Autorun is NOT enabled in your computer, browse the contents of the click the ASSETUP.EXE to run the CD. 3.2.2 Drivers menu The drivers menu shows the available device drivers if the system detects installed devices. Install the necessary drivers to activate the devices. 3-2 Chapter 3: Starting up Intel Chipset Inf Update Program This item installs the Intel® Chipset INF Update Program. This driver enables Plug-n-Play INF support for the Intel® chipset components on the motherboard. When installed to the target system, this driver provides the You can install this utility using three different modes: interactive, silent, or unattended preload. Installing the driver in interactive mode requires...

Words: 5285 - Pages: 22

Free Essay

Securing the Usb Drive

...Technical Writing Project Coversheet Capstone Proposal Project Name: Securing the Universal Serial Bus Interface for the Enterprise Environment Student Name: Steve Wild _ Degree Program: Bachelor of Science in Information Technology – Security Emphasis _ Mentor Name: Yolanda DuPree____________________________________________________ Signature Block: Student’s Signature: _______________________________________________________ Mentor’s Signature: _______________________________________________________ Running head: SECURING THE USB INTERFACE                                                                                                       1    Securing the Universal Serial Bus Interface for the Enterprise Environment Steve Wild Western Governor’s University SECURING THE USB INTERFACE                                                                                                                                  2    Summary The USB interface is one vector of possible attack against a company and must be proactively defended against data theft, data loss, and corporate espionage in order for a company to maintain a secure enterprise environment, minimize downtime, and maximize productivity. Project Goals and Objectives There are several goals that will be accomplished during this project: explore the hardware problems, explore the software problems, explore the policy problems, and give real world examples. The objectives are: provide example...

Words: 3010 - Pages: 13

Premium Essay

Oh Yea

...document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. ii v1.0, 2006-03 Contents Wireless Router Setup Manual Chapter 1 Connecting the Router to the Internet What’s in the Box? ..........................................................................................................1-1 The Wireless Router Label .......................................................................................1-1 The Front of the Wireless Router .............................................................................1-2 The Back of the Wireless Router .............................................................................1-3 What You Need Before You Begin ..................................................................................1-3 Two Setup Methods: 1) Smart Wizard Setup 2) Manual Setup ......................................1-4 Smart Wizard Setup .......................................................................................................1-4 Manual Setup .................................................................................................................1-5 To Connect Your Wireless Router...

Words: 5358 - Pages: 22

Premium Essay

Microsoft Windows 7 Configurations Test 70-680

...70-680 Exam 70-680 Title TS: Windows 7, Configuring Updated Product Type Version: 10.3 106 Q & A with Explanation “Best Material, Great Results”. www.certkingdom.com 1 70-680 QUESTION 1 You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com and includes a Direct Access infrastructure. ABC.com has purchased a new laptop named ABC-WS680. You join ABC-WS680 to a domain after performing a clean installation Windows 7. How can you make sure the connectivity to the domain from ABC-WS680 using Direct Access connections? A. By installing a computer certificate on ABC-WS680. B. By disabling User Account Control (UAC) on ABC-WS680. C. By modifying the network connection properties on ABC-WS680. D. By adding the computer account for ABC-WS680 to the RAS and IAS Servers group in the domain. Answer: A Explanation: QUESTION 2 You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The network contains a data file server named ABCSR03 which contains ABC_Data shared folder and running Windows Server 2008 operation system.. You have been assigned a client computer named ABC-WS680 running Windows 7 operating system. You need to ensure the availability of the files in ABC_Data share and maintain encryption even when ABC-SR03 has been disconnected from the network. How you can accomplish this...

Words: 15733 - Pages: 63

Free Essay

Yeah

...H61M-VGS R2.0 / H61M-VS R2.0 User Manual Version 1.0 Published September 2011 Copyright©2011 ASRock INC. All rights reserved. 1 Copyright Notice: No part of this manual may be reproduced, transcribed, transmitted, or translated in any language, in any form or by any means, except duplication of documentation by the purchaser for backup purpose, without written consent of ASRock Inc. Products and corporate names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies, and are used only for identification or explanation and to the owners’ benefit, without intent to infringe. Disclaimer: Specifications and information contained in this manual are furnished for informational use only and subject to change without notice, and should not be constructed as a commitment by ASRock. ASRock assumes no responsibility for any errors or omissions that may appear in this manual. With respect to the contents of this manual, ASRock does not provide warranty of any kind, either expressed or implied, including but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall ASRock, its directors, officers, employees, or agents be liable for any indirect, special, incidental, or consequential damages (including damages for loss of profits, loss of business, loss of data, interruption of business and the like), even if ASRock has been advised of the possibility of such damages...

Words: 10792 - Pages: 44

Free Essay

Nvidia780I

...User Guide EVGA nForce 780i SLI Motherboard 780i 3-Way SLI Motherboard EVGA ii nForce 780i SLI Motherboard Table of Contents Before You Begin… ..................................................................................................... ix Parts NOT in the Kit .................................................................................................ix Intentions of the Kit ...................................................................................................x EVGA nForce 780i Motherboard..................................................................................1 Motherboard Specifications...................................................................................... 1 Unpacking and Parts Descriptions...............................................................................4 Unpacking ................................................................................................................ 4 Equipment ................................................................................................................ 4 EVGA nForce 780i SLI Motherboard ....................................................................... 5 Hardware Installation ....................................................................................................9 Safety Instructions.................................................................................................... 9 Preparing the Motherboard .........

Words: 12933 - Pages: 52

Free Essay

Hacking

...way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. Neither writer of this book, review analyzers, the publisher, nor anyone else affiliated in any way, is going to admit any responsibility for your proceedings, actions or trials. About The Author Anurag Dwivedi is a 13 year old computer geek. Who likes to find vulnerabilities Doing Hacking , Programming , editing , cracking , web designing and writing books He Wants To Be An Software Designer..!!!! Join His Blog: Computer Expert Join Him On FB: Anurag Dwivedi Greetz : Hack The Universe Computer Expert Introduction What are Hackers Hackers Hierarchy Hacking Facebook Accounts using Tabnapping Hacking FB Accounts using Keylogger 10 Security Enhancements 5 Reasons Why PC Crash Delete An undeletable File Converting Movies To Psp Format Make Your Pc Faster Hacking Yahoo Messenger Multi Login Yahoo Chat Commands...

Words: 20358 - Pages: 82

Premium Essay

Itsc 2439 Ch.1-12 Study Guides

...Chapter 1 Study Guide True/False Indicate whether the statement is true or false. ____ ____ ____ 1. End-user computing refers to the use of computers for both business and personal use. 2. The first computers used widely in businesses were available during the 1940s. 3. The goal of transaction processing on early computers was to replace as much manual processing of business information as possible with automated processing. 4. Among the reasons for the growth in decentralized computing was the availability of inexpensive personal computer hardware and productivity software. 5. The applications development backlog was due to the inability of computer professionals to design and write programs fast enough to keep up with the demand for new applications. 6. All knowledge workers are computer professionals. 7. A knowledge worker is another name for a computer user. 8. Use of a computer’s graphical user interface means that users no longer have to remember which command to enter to perform a task. 9. To operate a graphical user interface, a user types keyboard commands to tell a computer which tasks to perform. ____ ____ ____ ____ ____ ____ ____ 10. The Information Technology department is a modern name for the Data Processing department. ____ 11. Distributed computing links large-scale systems and personal computers to meet both organizational and individual worker needs. ____ 12. Computer departments in most organizations today are called data processing departments...

Words: 28017 - Pages: 113