Jump to content

Recommended Posts

Posted

So basically I have a older U3 drive which I passworded...

Long story short I am trying to run U3 so I could enter my pass and get access to my U3 drive...

Tried - Wine (latest version).

  • 1 month later...
Posted

A U3 drive will show up as two devices, both a CD drive and a hard drive (of sorts).

As far as I'm aware there are no auto-mounting daemons that actually pay any attention to windows auto run files (I think Linux developers are a little smarter then that) and other systems not having any auto mounting at all.

In what way did you password it?

Posted

A side question, but under *nix I have to set +x to run a program. What permissions do win32 exe's need to run under wine and whats the default setting?

Posted

wine just has to be able to read the file to run it (so executable permission is not essential).

This is where wine's security falls down. Really, wine should check for executablity. If it did that, a user who was the target of "Click here for FREE XXX" trojan would have to actually set the exe they downloaded to +x (unless they received a tar that maintains fs permissions).

Posted
A U3 drive will show up as two devices, both a CD drive and a hard drive (of sorts).

As far as I'm aware there are no auto-mounting daemons that actually pay any attention to windows auto run files (I think Linux developers are a little smarter then that) and other systems not having any auto mounting at all.

In what way did you password it?

I passworded through the U3 application on a windows machine. I mainly use it on windows machines at school so I wanted a password on it. I only run Linux at home so I cannot access it. I have tried running the U3 application through Wine and Crossover, both failed to load it.

Posted
If your brave you can try the following app:

u3-tool. sourceforge. net

Should be able to unlock your device, Although it still takes some effort to get it working.

Very nice! I just compiled it.

u3_tool 0.1
U3 USB stick manager

Usage: ./u3_tool_sg [options] <device name>

Options:
        -c                Change password
        -d                Disable device security
        -D                Dump all raw info(for debug)
        -e                Enable device security
        -h                Print this help message
        -i                Display device info
        -l <cd image>     Load CD image into device
        -p <cd size>      Repartition device
        -u                Unlock device
        -v                Use verbose output
        -V                Print version information

The device name depends on the used subsystem.
Examples: '/dev/sda0'(sg), 'scan'(USB),'vid:pid'(USB), 'e'(Windows)

Ultra thanks for your suggestion.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...