Skip to main content

USBkill – Code That Turns USB Drives Into PC Killing Weapon

 

SBkill turns your USB into a kill switch once activated. It’s a program – a computer code that will disable the computer if there’s any activity at the USB port. This weapon could be kept in the USB drives and attached to the computers with sensitive information.

Recommended for you:
This “Killer USB” Flash Drive Will Explode Your Computer
Hephaestos, the programmer who wrote the USBkill script, says that USBkill is an anti-forensic USB. He says that it will be of utmost important in case the police busts your bunker, or steals your laptop. USB waits for some change at USB ports and then suddenly kills your computer. He writes:
The police will use a mouse jiggler to keep the screensaver and sleep mode from activating. If this happens you would like your computer to shut down immediately. Additionally, you may use a cord to attach a USB key to your wrist. Then insert the key into your computer and start USBkill. If they then steal your computer, the USB will be removed and the computer shuts down immediately.
If the police catches you, you would want your PC to shut down immediately. He advises the users to tie the USB drive to your wrist and instantly start the USBkill by removing the USB when cops knock down your door.
He adds that users must use full disk encryption, otherwise law enforcement agencies will have their party anyway.
It’s an unfinished work and will be improved by Hephaestos. But, it does work effectively.
See the USBkill code here on GitHub: USBkill on GitHub

 

Comments

Popular posts from this blog

The Best Web Hosting Services

Are you looking for the best web  hosting  services for your needs? Whether you need a place to host your small personal blog or a major corporate website, the following list will help you identify the best hosts to use. Finding the best web hosting service isn’t quite as straightforward as searching Google and choosing the one with the lowest price. There are a lot of issues to consider, including the reasons for  why  you need hosting and  how  you intend to use it. Once you have a handle on that, finding the right host becomes much easier. Choose one that’s undersized and you’ll end up with website outages and slow page loads, but choose one that’s oversized and you’ll be throwing money away. Defining Your Web Hosting Needs Before choosing your web host, you’ll need to think about your requirements. Consider the following concerns and decide the importance of each item on a scale of 0 to 10 (with 0 being not at all...

Now You Can Use Reliance Jio 4G Services On 2G And 3G Smartphones

Indians will always be at the top in availing any free internet facility. As, Reliance Jio aims to offer free 4G internet to the 90% of Indians, hence, with one of its services now you can use Jio 4G services on 2G and 3G smartphones. Now You Can Use Reliance Jio 4G Services On 2G And 3G Smartphones Who doesn’t want the free internet? Of course, we all want, Indians will always be at the top in availing any free internet facility. Jio, which is also known as Reliance Jio and officially as Reliance Jio Infocomm Limited has already given its users free unlimited 4G data for 90 days. As the Reliance Jio aims to offer free 4G internet to the 90% of Indians along with the free voice calls and messaging services. So, we all must agree that Indians are always at the peak when it comes about available any internet facility. We all know Jio, which is also known as Reliance Jio Infocomm Limited has previously given its users free unlimited 4G data for 90 days. Not only that but even th...

10 Essential Tips To Keep In Mind While Surfing The Internet

BENGALURU: Internet is an amazing resource which is stapled in many people’s day-to-day lives. It is very much informative but at the same time encircled with many dangers. Listed below are the strategies you can follow to stay safe on the internet as stated by Tech Radar India. Use your discretion on social media Online scams crops up almost everywhere in webpage such as an e-mail, tweet, Facebook post, or many other places. Never click on links that do not look like a real address or pop-ups that claim you have won millions of dollars—all these are scams in which one can easily get trapped. Also don’t fall prey to e-mails which ask you to help someone transfer a large amount of money out of their country delineating their long sad story. Hackers can access data through various innovative ways like sharing links of content that they feel the targeted person is likely to click. Be careful of what you are sharing Limit the content that you share on social media. Facebook...