I'm fairly happy I have the right answer on this, but would like to get confirmation from the community for my own peace of mind. Here's the situation:
I have 3 USB memory stick that are all showing up on Windows machines as a folder, not a USB drive. As a result it is inaccessible. On suspicion of a virus, I have examined it using Mac OS X and found the presence of an autorun.inf file, which is 'locked', and a suspicious looking executable called cafgm.exe in the RECYCLER folder on the stick. The autorun.inf is displayed as a unix executable file in Mac OS X. I can delete the files fine, even though the autofun.inf is showing up as 'locked'
My understanding is that Linux/unix machines are immune to Windows viruses so I can just delete the files from the stick (since it is FAT32) and all will be well again. What I would like to do however is examine the autorun.inf to confirm that it is indeed causing the abnormal mounting behaviour observed in Windows.
So what I would like confirmation of is that using cat to display the contents of the autorun.inf file in Terminal is perfectly safe to do. Ordinarily I wouldn't worry one bit about this, it's just that Mac OS X displays the file as a unix executable in Finder, which had me somewhat puzzled.
Can someone please confirm using cat to view the file is ok to do?