If you have a mobile disk, you can actually check the content of the autorun.inf file to verify if it's really calling a legitimate file by viewing it's content using Notepad.
The worm writer modifies or creates their own "autorun.inf" file on your mobile disks. So whenever you insert an infected USB storage device, the worm can be transferred to that machine automatically.
The worm writer modifies or creates their own "autorun.inf" file on your mobile disks. So whenever you insert an infected USB storage device, the worm can be transferred to that machine automatically.
There are some Anti-virus that can easily blocked a suspicious autorun.inf file from running. Though, i suggest following the procedure below to disable autorun.
Windows 2003 Active Directory Group Policy
2. Right click select on the domain where you want this policy to be implemented and select "Create or Link a GPO here". Or if you have an existing GPO that you want to use, you can go to step 5.
4. Write click the newly created or an existing GPO and select Edit.
5. Go to Computer Configuration >>> Administrative templates >>> System and double-click Turn-Off Autoplay. Select "Enabled" and select "All Drives" on the drop-down list.