Control USB Device rights with Phrozen Safe USB

Status
Not open for further replies.

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Hackers know of different ways to bypass Antivirus detection (crypting API calls as long they got the source code or using crypter program to obfuscate the virus and run it through another safe process, etc.).

Which means that ‘the more doors you close’ the more secure you will be. Phrozen Safe USB will do exactly that: it will close one of the most favourite vectors for virusses: USB Storage devices.
Normally an USB Device is rather unsafe because it is designed to interact with your computer. Phrozen Safe USB is a tiny tool that allows you to control your USB Device Status and set it in three different modes.

Fully Operational Mode (FOM): USB Storage devices can be used normally (you can copy, modify, move or delete files);

Read Only Mode (ROM): You only can read its contents. Therefore no virus could copy itself to your computer to spread. Other cannot intentionally try damage, delete or modify the contents on your computer;

Disabled Mode: In this mode you are not able to see USB Storage devices anymore. It is in stealth mode. In this instance you don’t want anybody to export data or to import harmful content from your computer to USB Key.

Here are the three modes in action:

psafe1300x215.png

Normal mode

psafe2300x212.png

Read only mode

psafe3300x207.png

Disabled mode

You can also control the devices status from the tray icon.

psafe4.png


Note: Phrozen Safe USB proposes an option to run itself at windows startup. In this case you must have disabled the Microsoft User Account control (UAC) or it won’t start as it requires administrator privilege to modify the Windows registry.

Download Now

Source

Source
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top