Microsoft: "You've got questions. We've got dancing paperclips."
All articles
Last comments
You can choose Avdshare Audio Converter to Convert APE to MP3 for playing APE on iTunes, iPhone, iPad, iPod, Android, Samsung, etc on Mac/PC.
Ok, Shekin, after taking a long investigation I found the issue! It's not related to Mint itself, but my feeling of slack was only due to firefox. I don't really know what kind of changes Mozilla did in the browser in the last 2 releases,
good article
Magno Sivlestre
God bless you man!
In mate, when I try to add background image in my selection, the new images are always lost when I reopen the mate backgroung setting.
«    October 2016    »
» » USBkill - Self-destructing operating system

USBkill - Self-destructing operating system

USBkill - Self-destructing operating system

Riot police planted the door, beating a citizen with a boot in the face and takes away the computer. This is a sample script of detention of dangerous cyber criminals. In this algorithm, the most unpleasant for the detainee? Of course, the seizure of the computer, because the results of the examination will be the basis for placing a hacker in places of deprivation of liberty for many, many years.

Sorry for the spelling and phonetic errors in the text.
Owner and main writer of is not a native English speaker.

To delete the last paragraph, the security professionals have proposed an interesting technology USBKill. The point is simple: the working operating system inside a virtual container and is encrypted. All operations hacker produces through this guest OS. Another program running on the primary system monitors the activity of the USB ports and other features:

  • If the computer turns off, data access will require a password.
  • If the laptop connects or disconnects the charger, USBKill deletes a virtual OS.
  • If the computer will be connected to an external device through the USB connectorUSBKill destroy virtual working OS with all the evidence.

The last point is particularly important, because any examination begins with download special intelligence SOFTWARE, for removing the image to disc. Once the flash drive, is connected, USBKill destroy the data and copy will be nothing left.


The authors USBKill reveal other interesting gadgets used by secret services in the cyber operations. In particular, there are devices like Mouse jiggler and Keyboard jiggler.

USBkill - Self-destructing operating systemUSBkill - Self-destructing operating system

These USB devices are recognized by the OS as a normal mouse and keyboard. Used jiggler in order to simulate the activity on your computer and prevent actuation of the lock screen due to downtime. USBKill will regard the attempt to connect such devices as a direct signal to the destruction of data.

You can download the source code USBKill on GitHub.


The author of the program Hephaestos reports that the tool will help to prevent a repetition of the history of Ross Ulbricht, Creator of underground platforms to sell drugs Silk Road. Laptop Ulbricht was seized by law enforcement agencies, and the computer is left on for a long time.
Hephaestos says that USBKill waiting for changes in the USB port, and then instantly turns off the computer. In USBKill will be added more commands and functions. The author States that the program can be very effective when run on virtual machines that disappear when you reboot.


From USBKill more harm or good? On the one hand, such programs can help protect the constitutional right of every person to privacy. On the other hand, these programs help to avoid responsibility for the crimes committed. So to resolve them or deny?

Tags: security

Related articles

Add a comment

  • bowtiesmilelaughingblushsmileyrelaxedsmirk
Login via