Skip to main content

What is Malware?


Malware:

When we think about malware, we say it’s a sort of virus, which not true in technical point of view.

So, terminology is “Virus is type of Malware”.

You would have encounter unexpected ads on your screen will surfing on web or sudden sound played, they are malware so stay always from this type of site.

Malware is malicious code which is created with an intended of harming your computer system or stealing your personal data as well as for creating money through the malware by selling it to at highest bid on the dark web or by asking directly to from the victim for get rid of the malware.

Common Type of malware:



1. Ransomware

This malware gets into the system, encrypt and block access of the data and the key is sent to the hacker. To regain the access hacker, ask for an amount of money from the victim.
The payment for this type pf things is done through cryptocurrency because they are untraceable.

2.Spyware.

Spyware spy your activity and steal your data from the computer such as login credential, credit card number or financial information.

3.Adware.

There job is to create revenue for the developers. This Adware trick the user to install software on your PC tablet and mobile device.

4.Trojans

This type of malware present itself as legitimate software. Once installed the Trojan get activated and attacker gets unauthorized access to the affected computer, that’s why I recommend you to use local user account. If haven’t seen the how to stay secure? blog read it 

after this gets completed.

5. Key logger.
It records all the user’s keystrokes on the keyboard typically storing the gathered information and sending it to the attacker.

6. Cryptojacking.
This malware uses victim’s computer to mine cryptocurrency. This happen by click on a malicious link in an E-Mail or in website which load crypto mining code on the computer

How to prevent malware getting to our system?

Malware are everywhere and being safe from malware is nearer impossible but if don’t use internet and don’t inject any pen drive into system them you are safe, but that’s not possible in your world.

But we can’t take some precaution to remain somewhat safe from Malware.

1.Get Ad-Blocker to avoid pop-up ads.

2.Double-check the file you download from site is genuine.

3.Delete temporary file:
1.First go to the safe-mode (Press right shift and restart the PC)
2.Search for Disk clean-up software (available in windows).
3.Tick all the thing.

4.Hit the OK button.


That's it for this Blog.

Thanks for reading.If you like the content share it with your friend.


Don't forget to subscribe our Blog

Comments

Popular posts from this blog

Hustle

The innate hunger to build,create,do something & try. Hustle isn't just working on the things you like,it means doing the things you don't enjoy so you can do the things you love. Hustle:The ability to make things happen in light of knowing,how to get there ,but operate with the general principle that action breed results. Hustle stands for: H - How U - U  S -  Survive T -  The L - life  E - Everyday Some days I'm Humble. Some days I  Struggle. But everyday I Hustle. Remember Every Boss started as a worker.

TCP Segment

A TCP segment is made up of a TCP header and a data section. Source Port :  A source port is a high numbered port chosen from a special section of ports known as ephemeral ports. A source port is needed so that when the web server replies, the computer making the original request can send this data to the program that was actually requesting it. It is in this way that when it web server responds to your requests to view a web page that this response gets received by your web browser and not your word processor. Destination Port : port on which the client in request the data( The destination port is the port of the service the traffic is intended for ) Sequence Number :This is a 32-bit number that's used to keep track of where in a sequence of TCP segments this one is expected to be.There are limits to the total size of what we send across the wire. In Ethernet frame, it's usually limited in size to 1,518 bytes, but we usually need to send way more data than that. At the transp...

Troubleshooting and debugging

Troubleshooting is the process of identifying, analyzing, and solving problems.  Debugging is the process of identifying, analyzing, and removing bugs in a system. We sometimes use troubleshooting and debugging interchangeably.  But generally, we say troubleshooting when we're fixing problems in the system running the application, and debugging when we're fixing the bugs in the actual code of the application. Debuggers let us follow the code line by line, inspect changes in variable assignments, interrupt the program when a specific condition is met, and more. System calls are the calls that the programs running on our computer make to the running kernel.   A reproduction case is a way to verify if the problem is present or not. Where to check for log file in OS? On Linux , you'd read system logs like /var/log/syslog and user-specific logs like the .xsession-errors file located in the user's home directory. On MacOs , on top of the system logs, you'd go through...