Auto start failed on DVD dive

R

Robin Chapple

My DVD drive no longer recognises a program disk when inserted. I have
to find the EXE file myself. Then it will load the program.

How do I fix that?

Robin Chapple
 
T

Tony

Hold down the Shift key when you insert devices or media into your
computer to open AutoPlay, regardless of the default setting.

Robin said:
My DVD drive no longer recognises a program disk when inserted. I have
to find the EXE file myself. Then it will load the program.

How do I fix that?

Robin Chapple
--
The Grandmaster of the CyberFROG

Come get your ticket to CyberFROG city

Nay, Art thou decideth playeth ye simpleton games. *Some* of us know
proper manners

Very few. I used to take calls from *rank* noobs but got fired the first
day on the job for potty mouth,

Bur-ring, i'll get this one: WHAT'S YOUR PROBLEM JERK!!? We're here to
help you dickweed, ok, ok give the power cord the jiggily piggily wiggily
all the while pushing the power button repeatedly now take everything out
of your computer except the power supply and *one* stick of ram. Ok get
the next sucker on the phone.

Deirdre Straughan (Roxio) is a LIAR (Deirdre McFibber)

There's the employer and the employee and the FROGGER and the FROGEE,
which one are you?

Hamster isn't a newsreader it's a mistake!

El-Gonzo Jackson FROGS both me and Chuckcar (I just got EL-FROG-OED!!)

I hate them both, With useless bogus bullshit you need at least *three*
fulltime jobs to afford either one of them

I'm a fulltime text *only* man on usenet now. The rest of the world
downloads the binary files not me i can't afford thousands of dollars a
month

VBB = Volume based billing. How many bytes can we shove down your throat
and out your arse sir?

UBB = User based bullFROGGING

Master Juba was a black man imitating a white man imitating a black man

Always do incremental backups of your data or you'll end up like the
arseholes at DSL Reports. Justin says i made a boo-boo. Yeah boo-who.

Adrian "jackpot" Lewis is a mama's boy!

Using my technical prowess and computer abilities to answer questions
beyond the realm of understandability

Regards Tony... Making usenet better for everyone everyday

This sig file was compiled via my journeys through usenet
 
P

Paul

Robin said:
My DVD drive no longer recognises a program disk when inserted. I have
to find the EXE file myself. Then it will load the program.

How do I fix that?

Robin Chapple
This won't answer the question as such, but have a read through the articles,
and see what ingredients are needed. For example, one article mentions
that "Shell Hardware Detection" service needs to be running.

http://www.sevenforums.com/tutorials/161443-autorun-inf-files-completely-block.html

http://www.sevenforums.com/tutorials/183209-autoplay-enable-disable-non-volume-devices.html

http://www.sevenforums.com/tutorials/174838-autoplay-turn-off.html

If you see a registry file (.reg) offered for download, open it in Notepad.
What I do with files like that, is if they're ZIPped, I open them with 7ZIP and
extract the .reg file. I rename the file to example.reg.txt or example.txt so
that I won't click the file by accident and load it into the Registry.
Once loaded in Notepad as a text file, you can then review what the
file is changing, and do additional Google searches to find out the
consequences of making those changes.

The reason I won't touch the question with a barge pole, is Microsoft policy
seems to change on a whim, and they push out changes to this feature
via Windows Update. It would be hopeless for me to guess how it works
this week... But if you study what the ingredients are (what services
need to be running, what registry entries are claimed to control it),
you may figure out why yours broke.

Have fun,
Paul
 
J

Joe Morris

Robin Chapple said:
My DVD drive no longer recognises a program disk when inserted. I have
to find the EXE file myself. Then it will load the program.

How do I fix that?
Are you complaining that the system is not opening the folder for the root
of the disk, or that it's not automatically executing a program from the
disk?

If the latter, I'll recommend being thankful that it's working the way it
does. I'll note that my work involves enterprise-level IT but from any
viewpoint the autorun "feature" is a security problem that's quite popular
among malware distributors [*]. It's certainly a convenience *if* you are
absolutely certain that *any* disk (including USB key) you insert is
uninfected...but are you willing to make that assumption for every disk in
your future?

OK...that being said, you might want to look at KB967715
http://support.microsoft.com/kb/967715 where about a third of the way
through the article you'll find instructions on configuring autorun for
Windows 7. You've probably guessed that my strong recommendation is that
you ensure that it's disabled for all media.

[*] A common, and (sadly) usually successful, attack used by pen testers is
to create what might be called "proof of concept" malware that makes its
presence known but doesn't do anything bad, then put that malware on several
USB drives and scatter them in the parking lot of the organization that
hired them to test its security. Even if company policy requires that
autorun be turned off one can usually find a few rogue machines where it's
enabled, and where the user gives no thought to inserting a drive he has
picked up from the pavement.

As your mother probably told you, "Don't put anything into your computer if
you don't know where it's been."

Joe
 
J

J. P. Gilliver (John)

Interesting the point from another poster that you can force autorun
regardless of its setting - I didn't know that.

But it does sound as if you have autorun turned off.
Are you complaining that the system is not opening the folder for the root
of the disk, or that it's not automatically executing a program from the
disk?

If the latter, I'll recommend being thankful that it's working the way it
does. I'll note that my work involves enterprise-level IT but from any
viewpoint the autorun "feature" is a security problem that's quite popular
among malware distributors [*]. It's certainly a convenience *if* you are
absolutely certain that *any* disk (including USB key) you insert is
uninfected...but are you willing to make that assumption for every disk in
your future?
Yes, but CD distribution of malware is _probably_ quite rare these days
(though I guess it does still happen). And isn't it possible to enable
autorun only on some drives (such as the optical drive but not pen
drives)?
OK...that being said, you might want to look at KB967715
http://support.microsoft.com/kb/967715 where about a third of the way
through the article you'll find instructions on configuring autorun for
Windows 7. You've probably guessed that my strong recommendation is that
you ensure that it's disabled for all media.

[*] A common, and (sadly) usually successful, attack used by pen testers is
to create what might be called "proof of concept" malware that makes its
presence known but doesn't do anything bad, then put that malware on several
USB drives and scatter them in the parking lot of the organization that
hired them to test its security. Even if company policy requires that
autorun be turned off one can usually find a few rogue machines where it's
enabled, and where the user gives no thought to inserting a drive he has
picked up from the pavement.
Isn't that also used by real malware (such as spying) agents?
As your mother probably told you, "Don't put anything into your computer if
you don't know where it's been."
(-:

Joe
--
J. P. Gilliver. UMRA: 1960/<1985 MB++G.5AL-IS-P--Ch++(p)Ar@T0H+Sh0!:`)DNAf

I think we'd all qualify for Heaven - even Richard Dawkins, if only to
severely p*ss him off. Imagine? An eternity of knowing you were wrong.
- Nick Odell, in UMRA 2011-5-22
 
J

Joe Morris

J. P. Gilliver (John) said:
My DVD drive no longer recognises a program disk when inserted. I have
to find the EXE file myself. Then it will load the program.
How do I fix that?
Are you complaining that the system is not opening the folder for the root
of the disk, or that it's not automatically executing a program from the
disk?
If the latter, I'll recommend being thankful that it's working the way it
does. I'll note that my work involves enterprise-level IT but from any
viewpoint the autorun "feature" is a security problem that's quite popular
among malware distributors [*]. It's certainly a convenience *if* you are
absolutely certain that *any* disk (including USB key) you insert is
uninfected...but are you willing to make that assumption for every disk in
your future?
Yes, but CD distribution of malware is _probably_ quite rare these days
(though I guess it does still happen). And isn't it possible to enable
autorun only on some drives (such as the optical drive but not pen
drives)?
I'll agree that the risk of infection from optical disks ** commercially
manufactured by a well-known company ** is low - nonzero, but low. If
you're using pirated software (knowingly or otherwise) the risk goes up,
sometimes significantly.

If you're inserting a field-burned disk, unless you personally burned it -
and maybe not even then - you're in a crapshoot. (Consider downloading an
ISO file and burning it to a disk - do you routinely look at the contents of
the ISO file beforehand?)


And yes, you can specify the drive letters that are permitted to invoke
autorun (see the KB article I cited for details).


Incidentally, I'll concede before anyone points it out that a good
signature-based antivirus program will scan the file read from the optical
disk before allowing it to be given control for execution. Unfortunately,
while I'll agree that signature-scanning antivirus programs should be
installed, malware writers have for some time been using code sequences that
produce the same result with several different instruction sequences
("polymorphic code"). For example, the three trivial pseudocode examples
below generate the same functional result (ignoring boundary cases):

Load register X from abc
Add 3 to X

Load register X from abc
Subtract -3 from X

Load register X from abc
nop
nop
nop
nop
Add 3 to X


so if malware is detected based on the signature of the first example, the
second and third will not be detected.

I've recently noted elsewhere in a.f.c that some of the malware writers are
clearly capable of producing incredibly sophisticated attacks; I've seen
some incidents where investigators who are among the best in the field
haven't figured out everything the malware does even after a couple of years
of reverse engineering.

A bit of paranoia on the part of computer users isn't a bad idea.
OK...that being said, you might want to look at KB967715
http://support.microsoft.com/kb/967715 where about a third of the way
through the article you'll find instructions on configuring autorun for
Windows 7. You've probably guessed that my strong recommendation is that
you ensure that it's disabled for all media.
[*] A common, and (sadly) usually successful, attack used by pen testers
is
to create what might be called "proof of concept" malware that makes its
presence known but doesn't do anything bad, then put that malware on
several
USB drives and scatter them in the parking lot of the organization that
hired them to test its security. Even if company policy requires that
autorun be turned off one can usually find a few rogue machines where it's
enabled, and where the user gives no thought to inserting a drive he has
picked up from the pavement.
Isn't that also used by real malware (such as spying) agents?
Absolutely. That's why the pen testers need to rub the noses of their
customer's managers in the dirt to get them to recognize the vulnerability.

Joe
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top