arungeek
Hacks and Tweaks



Uncategorized

October 19, 2009

How To Write Protect Your USB

More articles by »
Written by: arunenigma


USB drives have completely replaced CDs and floppies. Most of the users prefer to use USB drive as it is available at cheap price with high storage capacity. USB drives are also becoming medium of spreading of viruses and worms due to auto run functionally of Windows.

Also when you connect your clean USB drive to infect machine your USB drive may get infected and subsequently infecting all the machines on which this USB drive is used. One way to protect and prevent virus spreading via USB drive is by disabling USB drive write meaning making it “read only”.

By default Windows doesn’t provide any option to Write Protect USB drives and you need to edit Windows registry to achieve this. To make it easier for you here is third party freeware tool Thumbscrew.

Thumbscrew allows you to quickly enable or disable writing to all USB mass storage devices on your Windows system. In other words you can use it to make a USB flash drive, hard drive or IDE / SATA drive in an enclosure read only.

Thumbscrew is my attempt at a poor man’s USB write blocker. When used it allows you to quickly enable or disable writing to all USB mass storage devices on your Windows system. In other words, you can use it to make a USB flash drive, hard drive or IDE / SATA drive in an enclosure read only. However, I make no guarantees as to its forensic validity.

Still, if your poor and you want to play around with making forensic images of thumb drives and other USB mass storage devices it may come in handy. You will see one of two icons in your system tray to indicate whether or not USB mass storage devices are set to be read only:

USB Write Enabled


USB Write Disabled

Simply click on the icon and choose the menu item to toggle write access.

All Thumbscrew really does is flip a bit in the registry at:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\StorageDevicePolicies\WriteProtect

Thumbscrew has a few limitations:

1. I can’t guarantee it’s 100% forensically sound. Buy a proven USB hardware write blocker if you want to be sure.

2. USB mass storage devices that are already mounted as writable will stay writable until they are removed and reinserted. The same applies if you turn off read only protection while a USB mass storage device is active, it will become writable and stay that way until removed and reinserted.


Hope you all find this program useful.




About the Author

arunenigma
Computer Science Graduate Student @ Case Western Reserve University, Cleveland, USA




 
 

 
Factory_1

Python Factory Design Patterns using Switch Case

I googled for Factory Method Design Pattern in Python but couldn’t find a good resource. So, I  am sharing an example program to demonstrate this design pattern in Python which I frequently use. The factory method pattern is...
by arunenigma
 

 
 
Gospers_glider_gun

Conway’s Game of Life Implemetation in Python with cool patterns

he Game of Life (or simply Life) is not a game in the conventional sense. There are no players, and no winning or losing. Once the “pieces” are placed in the starting position, the rules determine everything that ha...
by arunenigma
 

 
 
bin-tree

Python AVL Tree Implementation with ASCII visualization

n computer science, an AVL tree is a self-balancing binary search tree. It was the first such data structure to be invented. In an AVL tree, the heights of the two child subtrees of any node differ by at most one; if at any tim...
by arunenigma
 

 

 
bst

Binary Search Tree in Python with ASCII art visualization

Binary search tree implementation in Python with: in, post and pre-order traversals. Also includes methods for insertion, deletion and search of nodes. Deletion is fairly complex and is made possible by keeping track of parents...
by arunenigma
 

 
 
fibonacci

Python, Memoization, Dynamic Programming, Fibonacci Series and some Fun!

ython can implement the recursive formulation directly, caching return values. Memoization is a method where if a call is made more than once with the same arguments, and the result is returned directly from the cache. For exam...
by arunenigma
 

 




0 Comments


Be the first to comment!


You must be logged in to post a comment.