Help protect Windows from malware with No Autorun

What is AutoRun?

AutoRun, a feature of Windows Explorer (actually of the shell32 dll) introduced in Windows 95, enables media and devices to launch programs by use of commands listed in a file called autorun.inf.

Default behavior for Autorun

Autorun commands are generally stored in Autorun.inf files. These commands enable applications to start, start installation programs, or start other routines. In versions of Windows that are earlier than Windows Vista, the system automatically executes the program without requiring user intervention. Because code may be executed without user’s knowledge or consent, users may want to disable this feature because of security concerns.

It would appear that AutoPlay, by transferring control of what were previously automatic and invisible actions to AutoPlay, acts to increase user control and safety. This applies especially from Windows Vista, where all media and devices fall under AutoPlay control.

Why this topic?

The USB flash drive or pen drives are very useful portable storage devices which are very commonly used for transferring or transporting personal data or work files from one computer to another. However, as the storage device is so common and easily used the percentage of the drive being infected by viruses has also increased substantially. In this situation, what can a user do in order to prevent or reduce the risk of being infected by viruses while transporting data via the portable USB drive? Dont use autorun.

How turn off Autorun.

  1. Click Start, Run and type Gpedit.msc, and then press ENTER.
    If you are prompted for an administrator password or for confirmation, type the password, or click  Allow.
  2. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Autoplay Policies.
  3. In the Details pane, double-click Turn off Autoplay.
  4. Click Enabled, and then select All drives in the Turn off Autoplay box to disable Autorun on all drives.
  5. Restart the computer.
This entry was posted in IT Security, Week 14. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s