System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device
First Claim
Patent Images
1. A non-transitory, tangible, computer readable medium comprising one or more instructions that, when executed on a processor, configure the processor to perform operations comprising:
- monitoring, by a security system, file copy or create operations directed to a removable storage device to detect an attempt by a program on a first device to store a configuration file and an executable file on the removable storage device; and
,in response to detecting the attempt, displaying, by the security system, an alert including at least a part of text in the configuration file, wherein the part of the text in the configuration file identifies that the executable file is to be executed via the configuration file.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device. In use, a first device removably coupled to a second device is identified. Additionally, an attempt to store on the first device a configuration file for the first device and an executable file is detected. Further, a reaction is performed in response to the detection of the attempt.
-
Citations
19 Claims
-
1. A non-transitory, tangible, computer readable medium comprising one or more instructions that, when executed on a processor, configure the processor to perform operations comprising:
-
monitoring, by a security system, file copy or create operations directed to a removable storage device to detect an attempt by a program on a first device to store a configuration file and an executable file on the removable storage device; and
,in response to detecting the attempt, displaying, by the security system, an alert including at least a part of text in the configuration file, wherein the part of the text in the configuration file identifies that the executable file is to be executed via the configuration file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A device, comprising:
-
a processor, and a memory having instructions stored thereon, wherein the instructions are executable by the processor to cause the device to monitor, by a security system, file copy or create operations directed to a removable storage device to detect an attempt by a program on the device to store a configuration file and an executable file on the removable storage device; and
,in response to detecting the attempt, display, by the security system, an alert including at least a part of text in the configuration file, wherein the part of the text in the configuration file identifies that the executable file is to be executed via the configuration file. - View Dependent Claims (17)
-
-
18. A method, comprising:
-
monitoring, by a security system, file copy or create operations directed to a removable storage device to detect an attempt by a program on a device to store a configuration file and an executable file on the removable storage device; and
,in response to detecting the attempt, displaying, by the security system, an alert including at least a part of text in the configuration file, wherein the part of the text in the configuration file identifies that the executable file is to be executed via the configuration file. - View Dependent Claims (19)
-
Specification