Skip to main content

FORMAT A USB IN LINUX

​Run the below commands to format the usb to fat32 filesystem from terminal,

Type in:
lsblk
It gives the list of the filesystems on your device. Select the partition. It will be something like /dev/sdbx

umount /dev/sdxx

then format your device to FAT32

mkdosfs -F 32 -I /dev/sdx

There are also inbuilt packages/softwares which comes with almost all the Linux distributions  which can be used for formatting drives.

Comments

Popular posts from this blog

SNIFF GSM USING HACKRFX

​TOOLS  USED: •  ha ckrf_kali • brategnuradio-companion • gr-gsmgqrx • wireshark INSTALL REQUIREMENTS: First thing, you want to make sure you have all the required software installed, you can install most of them and their dependencies using your distribution package manager. Let’s start with the libraries and tools for the hackrf itself, on a Debian/Ubuntu distro you’ll install them like so: sudo  apt-get install  hackrf   libhackrf -dev libhackrf0 Once these libraries are installed, you can plug your hackrf into one of your USB ports and execute the  hackrf_info  command, at this point you should see something like the following: # hackrf_info Found  HackRF  board. Board ID Number: 2 ( HackRF  One) Firmware Version: 2014.08.1 Part ID Number: 0x00574746 0x00574746 Serial Number: 0x00000000 0x00000000 0x14d463dc 0x2f4339e1 You will now install  gnuradio  which is the software we’ll use to decode the RF signals,...

MORE ABOUT RANSOMWARES. PART 1

 Not long ago, a man committed suicide after an automatically generated notice from a computer virus threatened him with jail unless he paid a ransom thousands of dollars. The year was 2014. As incredible as the story seems, it marked the first known time a computer virus actually killed somebody. The next generations stole cash from users around the globe, and Cryptolocker raised the stakes – holding data of hundreds of thousands of users hostage. Despite successive short-lived take downs, the malware has made a comeback as CTB (Curve-Tor-Bitcoin) Locker. This challenging breed of malware is continuously improving, reaching new levels of complexity as smartphones and tablets are increasingly used to store crucial personal and enterprise-level documents. Bitdefender, the anti-malware solutions provider, zooms in on the subject to show how this type of virus works and to tell users how to prevent being locked out and extorted. What is ransomware? Ransomware is a type of malware th...

LOCK OR UNLOCK YOUR PC USING A USB

​If you prevent access to your computer with just a password, you are missing out on an alternate (and more secure) way to lock down your computer. Predator, a free Windows program, turns your USB drive into a key that locks your computer when it’s removed. To unlock your computer, you’ll have to plug the USB drive back in. (Talk about having secret-agent-style security.) Anyone who attempts to access your computer without the USB flash drive will be hit with an epic “Access Denied” message. To get started, follow this guide: Step 1: Download and install Predator. Step 2: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive. When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue. Step 3: In the Preferences window, take note of a few key settings. First, enter a secure, unique pass...