View Single Post
Old 03-03-2010, 10:57 AM   #3
theducks
Well trained by Cats
theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.
 
theducks's Avatar
 
Posts: 29,804
Karma: 54830978
Join Date: Aug 2009
Location: The Central Coast of California
Device: Kobo Libra2,Kobo Aura2v1, K4NT(Fixed: New Bat.), Galaxy Tab A
Was M: the main memory or SDcard?
There is no Autorun file on a normal PEz distribution. A Worm could have placed one there if the device came in contact.

An Autorun file is just a "Startup" direction file that tells what to do if triggered when a device is attached AND you have left your system with Autorun processing enabled. Safe way is either disable Autorun or "ALWAYS ASK ME WHAT TO DO"
So the big question is where this got placed upon your PEz (BTW the real payload is an EXE file that the autorun calls to be run)
theducks is offline   Reply With Quote