In the current technological era, coming
across different computer problems
related to malware and cyber tax is
common.
According to AV test institute, there are
more than one billion malware programs
available.
And new malware programs are detected
regularly.
Hi guys, and welcome to yet another
interesting video by simply learn but
before we begin. If you love watching
tech videos, subscribe to our channel and
hit the bell icon to never miss an
update.
In this video, we'll understand what is a
malware program?
Then, we'll see what exactly are viruses
and trojans.
Then, we will see how they operate in a
system.
And then different types of viruses and
trojan,
and how to detect the activity of such
programs.
And lastly, we will see how to prevent
our system from getting infected by such
programs.
Malware is a malicious software that is
programmed to cause damage to a computer.
System network and hardware devices.
Many malicious programs like trojan
viruses worms and bots which cause
damage to the system are known as
malware. Most of the malware programs are
designed to steal information from the
targeted user
or to steal money from the target by
stealing sensitive data.
Let's take a look at the introduction
for two different types of malware virus,
and trojan.
Firstly, let's take a look what exactly
is a virus program.
A computer virus is a type of malicious
program that on execution replicates
itself.
They get attached to different files and
programs, which are termed as host
programs by inserting their code. If the
attachment succeeds, the targeted program
is termed as infected with a computer
virus.
Now, let's take a look at the trojan
horse.
Trojan horse program is a program that
disguises itself as a legitimate program,
but harms the system on installation.
They hide within the attachments and
emails then transfer from one system to
another they create bad doors into a
system to allow the cyber criminal to
steal our information.
Let's take a look how they function
after getting installed into our system.
Firstly, we have virus programs the
computer virus must contain two parts to
infect the system.
First is a surge routine which locates
new files and data that is to be
infected by the virus program.
And the second part is known as the copy
routine, which is necessary for the
program to copy itself into the targeted
file, which is located by the search
routine now let's take a look at the
trojan horse functioning
for trojan horses entryway into our
system is through emails that may look
legitimate, but may have unknown
attachments. And when such files are
downloaded into the device, the trojan
program gets installed and infects the
system.
They also infect the system on the
execution of infected application or the
executable file and attacks the system.
Now, that we understand what virus and
trojans are let's understand different
types of virus androgens.
Let's take a look at different types of
viruses.
The first one is known as the booth
sector virus. This type of virus damages
the booting section of the system by
infecting the master bot record, which is
also known as MBR.
This damages the boot sector section by
targeting the hard disk of the system.
Then we have the macro virus.
Micro virus is a type of virus that gets
embedded into the document related data,
and is executed when the file is opened.
They also are designed to replicate
themselves, and infect the system on a
larger scale.
And lastly, we have the direct action
virus.
This type of virus gets attached to
executable files, which on execution
activates the virus program and infects
the system. Once the infection of the
file is completed, they exit the system
which is also the reason it is known as
a non-resident virus.
Let's take a look at different types of
trojans.
The first type of trojan is the backdoor
trojan.
They are designed to create a backdoor
in the system on execution of an
infected program.
They provide remote access of our system
to the hacker. This way, the cyber
criminal can steal our system data and
may use it for illegal activities. Next,
we have
quick source trojan.
They enter the system by clicking the
random pop-ups which we come across on
the internet.
They attempt a user to give their
personal details for different
transactions or schemes,
which may provide remote access of a
system to the cyber criminal.
And the last trojan type is ransom
trojan
this type of trojan program after
entering the system blocks the user from
accessing
its own system and also affects the
system functioning
the cyber criminal demands a ransom from
the targeted user for the removal of the
trojan program from the device
now that we understand some details
regarding viruses and trojan let's solve
a question
the question is jake was denied access
to his system and he wasn't able to
control the data and information in his
system
now
the actual question is what could be the
reason behind his system's problem
option a macro virus option b ransom
trojan option c backward version
give your answers in the comment section
now let's understand how to detect the
activity of viruses and trojan in our
system
to detect virus or trojan activity in a
system we can refer to the following
points
for viruses we have
slowing down of the system and frequent
application freeze shows that the
infection of the virus is present in the
system
then we have the viruses can also steal
sensitive data including passwords
account details
which may lead to unexpected log out
from the accounts or corruption of the
sensitive data
and lastly we have frequent system
crashes due to virus infection which
damages the operating system
for trojan we have frequent system
crashes and system also faces slow
reaction time
then we have there are more random
pop-ups from the system which may
indicate trojan activity
and lastly we have modification in the
system application and change of the
desktop appearance can be also due to
the infection of a trojan program
next let's take a look at a famous cyber
attack for virus and a trojan horse
for virus we have
the my doom virus which was identified
in the er 2004 which affected over 50
million systems by creating a network of
sending spam emails
which was to gain backdoor access into
our systems
next for the trojan horse we have the
emote trojan program
which is specifically designed for
financial theft and for stealing bank
related information
next we have few points for how to
prevent virus entry or trojan attack for
a system
the most basic way of virus protection
is to using antivirus and do regular
viruses can
this will prevent virus entry in the
system and also having more than one
antivirus provides much better
protection
then avoid visiting uncertified websites
can also prevent virus entry into our
system
then we have
using regular driver updates and system
updates to prevent virus entry for
trojan we have using certified softwares
from legal sites to prevent any trojan
activity in our system
and also avoid clicking random pop-ups
that we often see on the internet
and lastly using antivirus and firewalls
for protection against trojan horses is
a good habit
now that we have reached the end of the
video let's take a look what we learnt
for the first part we saw the main
objective of the virus is to harm the
data and information in a system whereas
for the trojan we have stealing of the
data files and information
effect of viruses is more drastic in
comparison to the trojan horses
then we have viruses which are
non-remote programs whereas trojan
horses are remote accessed
and lastly
viruses have the ability to replicate
itself to harm multiple files whereas
trojan does not have the
replication ability
if you have any questions you can ask
them on the comment section thank you
for watching
hi there if you like this video
subscribe to the simply learn youtube
channel and click here to watch similar
videos to nerd up and get certified
click here