0:00:08.080,0:00:10.480 In the current technological era, coming 0:00:10.480,0:00:12.320 across different computer problems 0:00:12.320,0:00:14.320 related to malware and cyber tax is 0:00:14.320,0:00:15.360 common. 0:00:15.360,0:00:17.840 According to AV test institute, there are 0:00:17.840,0:00:19.840 more than one billion malware programs 0:00:19.840,0:00:20.960 available. 0:00:20.960,0:00:23.039 And new malware programs are detected 0:00:23.039,0:00:24.560 regularly. 0:00:24.560,0:00:26.480 Hi guys, and welcome to yet another 0:00:26.480,0:00:28.640 interesting video by simply learn but 0:00:28.640,0:00:30.640 before we begin. If you love watching 0:00:30.640,0:00:33.280 tech videos, subscribe to our channel and 0:00:33.280,0:00:34.960 hit the bell icon to never miss an 0:00:34.960,0:00:36.800 update. 0:00:36.800,0:00:39.360 In this video, we'll understand what is a 0:00:39.360,0:00:41.280 malware program? 0:00:41.280,0:00:43.920 Then, we'll see what exactly are viruses 0:00:43.920,0:00:45.520 and trojans. 0:00:45.520,0:00:47.520 Then, we will see how they operate in a 0:00:47.520,0:00:49.120 system. 0:00:49.120,0:00:51.120 And then different types of viruses and 0:00:51.120,0:00:52.800 trojan, 0:00:52.800,0:00:54.719 and how to detect the activity of such 0:00:54.719,0:00:56.000 programs. 0:00:56.000,0:00:58.079 And lastly, we will see how to prevent 0:00:58.079,0:01:00.160 our system from getting infected by such 0:01:00.160,0:01:02.719 programs. 0:01:03.120,0:01:05.280 Malware is a malicious software that is 0:01:05.280,0:01:07.280 programmed to cause damage to a computer. 0:01:07.280,0:01:10.479 System network and hardware devices. 0:01:10.479,0:01:12.479 Many malicious programs like trojan 0:01:12.479,0:01:14.640 viruses worms and bots which cause 0:01:14.640,0:01:16.560 damage to the system are known as 0:01:16.560,0:01:19.040 malware. Most of the malware programs are 0:01:19.040,0:01:21.119 designed to steal information from the 0:01:21.119,0:01:22.640 targeted user 0:01:22.640,0:01:25.280 or to steal money from the target by 0:01:25.280,0:01:27.920 stealing sensitive data. 0:01:27.920,0:01:29.840 Let's take a look at the introduction 0:01:29.840,0:01:32.479 for two different types of malware virus, 0:01:32.479,0:01:35.040 and trojan. 0:01:36.320,0:01:38.159 Firstly, let's take a look what exactly 0:01:38.159,0:01:40.479 is a virus program. 0:01:40.479,0:01:42.640 A computer virus is a type of malicious 0:01:42.640,0:01:44.880 program that on execution replicates 0:01:44.880,0:01:45.920 itself. 0:01:45.920,0:01:48.159 They get attached to different files and 0:01:48.159,0:01:50.320 programs, which are termed as host 0:01:50.320,0:01:53.040 programs by inserting their code. If the 0:01:53.040,0:01:55.600 attachment succeeds, the targeted program 0:01:55.600,0:01:57.840 is termed as infected with a computer 0:01:57.840,0:01:58.880 virus. 0:01:58.880,0:02:00.640 Now, let's take a look at the trojan 0:02:00.640,0:02:01.840 horse. 0:02:01.840,0:02:04.159 Trojan horse program is a program that 0:02:04.159,0:02:06.880 disguises itself as a legitimate program, 0:02:06.880,0:02:09.520 but harms the system on installation. 0:02:09.520,0:02:11.440 They hide within the attachments and 0:02:11.440,0:02:13.760 emails then transfer from one system to 0:02:13.760,0:02:16.400 another they create bad doors into a 0:02:16.400,0:02:18.800 system to allow the cyber criminal to 0:02:18.800,0:02:21.520 steal our information. 0:02:21.520,0:02:23.280 Let's take a look how they function 0:02:23.280,0:02:27.520 after getting installed into our system. 0:02:27.520,0:02:30.080 Firstly, we have virus programs the 0:02:30.080,0:02:32.400 computer virus must contain two parts to 0:02:32.400,0:02:34.000 infect the system. 0:02:34.000,0:02:36.720 First is a surge routine which locates 0:02:36.720,0:02:38.560 new files and data that is to be 0:02:38.560,0:02:41.040 infected by the virus program. 0:02:41.040,0:02:43.120 And the second part is known as the copy 0:02:43.120,0:02:45.440 routine, which is necessary for the 0:02:45.440,0:02:48.080 program to copy itself into the targeted 0:02:48.080,0:02:50.560 file, which is located by the search 0:02:50.560,0:02:52.400 routine now let's take a look at the 0:02:52.400,0:02:54.640 trojan horse functioning 0:02:54.640,0:02:56.720 for trojan horses entryway into our 0:02:56.720,0:02:59.440 system is through emails that may look 0:02:59.440,0:03:01.200 legitimate, but may have unknown 0:03:01.200,0:03:03.680 attachments. And when such files are 0:03:03.680,0:03:06.080 downloaded into the device, the trojan 0:03:06.080,0:03:08.159 program gets installed and infects the 0:03:08.159,0:03:09.920 system. 0:03:09.920,0:03:11.840 They also infect the system on the 0:03:11.840,0:03:14.159 execution of infected application or the 0:03:14.159,0:03:17.599 executable file and attacks the system. 0:03:17.599,0:03:19.840 Now, that we understand what virus and 0:03:19.840,0:03:22.239 trojans are let's understand different 0:03:22.239,0:03:25.840 types of virus androgens. 0:03:25.840,0:03:27.599 Let's take a look at different types of 0:03:27.599,0:03:28.959 viruses. 0:03:28.959,0:03:30.720 The first one is known as the booth 0:03:30.720,0:03:33.280 sector virus. This type of virus damages 0:03:33.280,0:03:35.519 the booting section of the system by 0:03:35.519,0:03:37.680 infecting the master bot record, which is 0:03:37.680,0:03:39.680 also known as MBR. 0:03:39.680,0:03:42.239 This damages the boot sector section by 0:03:42.239,0:03:45.360 targeting the hard disk of the system. 0:03:45.360,0:03:48.000 Then we have the macro virus. 0:03:48.000,0:03:50.640 Micro virus is a type of virus that gets 0:03:50.640,0:03:53.360 embedded into the document related data, 0:03:53.360,0:03:56.080 and is executed when the file is opened. 0:03:56.080,0:03:57.920 They also are designed to replicate 0:03:57.920,0:04:00.319 themselves, and infect the system on a 0:04:00.319,0:04:02.000 larger scale. 0:04:02.000,0:04:04.319 And lastly, we have the direct action 0:04:04.319,0:04:06.159 virus. 0:04:06.159,0:04:08.080 This type of virus gets attached to 0:04:08.080,0:04:10.720 executable files, which on execution 0:04:10.720,0:04:12.879 activates the virus program and infects 0:04:12.879,0:04:15.760 the system. Once the infection of the 0:04:15.760,0:04:18.799 file is completed, they exit the system 0:04:18.799,0:04:21.359 which is also the reason it is known as 0:04:21.359,0:04:23.520 a non-resident virus. 0:04:23.520,0:04:25.199 Let's take a look at different types of 0:04:25.199,0:04:27.360 trojans. 0:04:27.360,0:04:29.520 The first type of trojan is the backdoor 0:04:29.520,0:04:30.800 trojan. 0:04:30.800,0:04:32.800 They are designed to create a backdoor 0:04:32.800,0:04:34.880 in the system on execution of an 0:04:34.880,0:04:36.720 infected program. 0:04:36.720,0:04:39.360 They provide remote access of our system 0:04:39.360,0:04:41.360 to the hacker. This way, the cyber 0:04:41.360,0:04:43.759 criminal can steal our system data and 0:04:43.759,0:04:46.000 may use it for illegal activities. Next, 0:04:46.000,0:04:47.280 we have 0:04:47.280,0:04:49.440 quick source trojan. 0:04:49.440,0:04:51.199 They enter the system by clicking the 0:04:51.199,0:04:53.440 random pop-ups which we come across on 0:04:53.440,0:04:54.720 the internet. 0:04:54.720,0:04:56.400 They attempt a user to give their 0:04:56.400,0:04:58.320 personal details for different 0:04:58.320,0:05:00.720 transactions or schemes, 0:05:00.720,0:05:03.199 which may provide remote access of a 0:05:03.199,0:05:05.919 system to the cyber criminal. 0:05:05.919,0:05:08.240 And the last trojan type is ransom 0:05:08.240,0:05:09.280 trojan 0:05:09.280,0:05:11.360 this type of trojan program after 0:05:11.360,0:05:14.000 entering the system blocks the user from 0:05:14.000,0:05:15.120 accessing 0:05:15.120,0:05:17.759 its own system and also affects the 0:05:17.759,0:05:19.759 system functioning 0:05:19.759,0:05:22.080 the cyber criminal demands a ransom from 0:05:22.080,0:05:24.800 the targeted user for the removal of the 0:05:24.800,0:05:27.199 trojan program from the device 0:05:27.199,0:05:28.880 now that we understand some details 0:05:28.880,0:05:31.199 regarding viruses and trojan let's solve 0:05:31.199,0:05:32.880 a question 0:05:32.880,0:05:35.440 the question is jake was denied access 0:05:35.440,0:05:37.280 to his system and he wasn't able to 0:05:37.280,0:05:39.120 control the data and information in his 0:05:39.120,0:05:41.039 system 0:05:41.039,0:05:42.080 now 0:05:42.080,0:05:44.160 the actual question is what could be the 0:05:44.160,0:05:46.560 reason behind his system's problem 0:05:46.560,0:05:49.520 option a macro virus option b ransom 0:05:49.520,0:05:52.560 trojan option c backward version 0:05:52.560,0:05:55.840 give your answers in the comment section 0:05:55.840,0:05:58.080 now let's understand how to detect the 0:05:58.080,0:06:00.240 activity of viruses and trojan in our 0:06:00.240,0:06:02.400 system 0:06:02.400,0:06:04.639 to detect virus or trojan activity in a 0:06:04.639,0:06:06.800 system we can refer to the following 0:06:06.800,0:06:07.680 points 0:06:07.680,0:06:09.440 for viruses we have 0:06:09.440,0:06:11.680 slowing down of the system and frequent 0:06:11.680,0:06:13.680 application freeze shows that the 0:06:13.680,0:06:15.840 infection of the virus is present in the 0:06:15.840,0:06:17.360 system 0:06:17.360,0:06:20.400 then we have the viruses can also steal 0:06:20.400,0:06:22.800 sensitive data including passwords 0:06:22.800,0:06:24.240 account details 0:06:24.240,0:06:26.800 which may lead to unexpected log out 0:06:26.800,0:06:28.800 from the accounts or corruption of the 0:06:28.800,0:06:30.400 sensitive data 0:06:30.400,0:06:32.880 and lastly we have frequent system 0:06:32.880,0:06:35.360 crashes due to virus infection which 0:06:35.360,0:06:38.000 damages the operating system 0:06:38.000,0:06:40.000 for trojan we have frequent system 0:06:40.000,0:06:42.319 crashes and system also faces slow 0:06:42.319,0:06:44.080 reaction time 0:06:44.080,0:06:46.240 then we have there are more random 0:06:46.240,0:06:48.400 pop-ups from the system which may 0:06:48.400,0:06:50.479 indicate trojan activity 0:06:50.479,0:06:52.800 and lastly we have modification in the 0:06:52.800,0:06:54.800 system application and change of the 0:06:54.800,0:06:56.960 desktop appearance can be also due to 0:06:56.960,0:07:00.000 the infection of a trojan program 0:07:00.000,0:07:02.479 next let's take a look at a famous cyber 0:07:02.479,0:07:06.720 attack for virus and a trojan horse 0:07:07.520,0:07:09.280 for virus we have 0:07:09.280,0:07:11.840 the my doom virus which was identified 0:07:11.840,0:07:14.880 in the er 2004 which affected over 50 0:07:14.880,0:07:17.599 million systems by creating a network of 0:07:17.599,0:07:19.680 sending spam emails 0:07:19.680,0:07:22.400 which was to gain backdoor access into 0:07:22.400,0:07:24.160 our systems 0:07:24.160,0:07:26.560 next for the trojan horse we have the 0:07:26.560,0:07:28.639 emote trojan program 0:07:28.639,0:07:30.800 which is specifically designed for 0:07:30.800,0:07:33.199 financial theft and for stealing bank 0:07:33.199,0:07:35.599 related information 0:07:35.599,0:07:37.759 next we have few points for how to 0:07:37.759,0:07:40.319 prevent virus entry or trojan attack for 0:07:40.319,0:07:42.800 a system 0:07:42.960,0:07:45.520 the most basic way of virus protection 0:07:45.520,0:07:47.919 is to using antivirus and do regular 0:07:47.919,0:07:49.199 viruses can 0:07:49.199,0:07:50.960 this will prevent virus entry in the 0:07:50.960,0:07:52.960 system and also having more than one 0:07:52.960,0:07:54.960 antivirus provides much better 0:07:54.960,0:07:57.199 protection 0:07:57.199,0:07:59.759 then avoid visiting uncertified websites 0:07:59.759,0:08:02.240 can also prevent virus entry into our 0:08:02.240,0:08:04.639 system 0:08:05.680,0:08:07.039 then we have 0:08:07.039,0:08:09.440 using regular driver updates and system 0:08:09.440,0:08:12.080 updates to prevent virus entry for 0:08:12.080,0:08:15.199 trojan we have using certified softwares 0:08:15.199,0:08:17.759 from legal sites to prevent any trojan 0:08:17.759,0:08:20.080 activity in our system 0:08:20.080,0:08:22.479 and also avoid clicking random pop-ups 0:08:22.479,0:08:25.039 that we often see on the internet 0:08:25.039,0:08:28.160 and lastly using antivirus and firewalls 0:08:28.160,0:08:30.560 for protection against trojan horses is 0:08:30.560,0:08:33.199 a good habit 0:08:33.839,0:08:35.360 now that we have reached the end of the 0:08:35.360,0:08:38.320 video let's take a look what we learnt 0:08:38.320,0:08:41.200 for the first part we saw the main 0:08:41.200,0:08:43.200 objective of the virus is to harm the 0:08:43.200,0:08:45.920 data and information in a system whereas 0:08:45.920,0:08:47.839 for the trojan we have stealing of the 0:08:47.839,0:08:50.480 data files and information 0:08:50.480,0:08:53.040 effect of viruses is more drastic in 0:08:53.040,0:08:56.640 comparison to the trojan horses 0:08:56.959,0:08:58.880 then we have viruses which are 0:08:58.880,0:09:01.680 non-remote programs whereas trojan 0:09:01.680,0:09:03.839 horses are remote accessed 0:09:03.839,0:09:05.200 and lastly 0:09:05.200,0:09:07.440 viruses have the ability to replicate 0:09:07.440,0:09:10.080 itself to harm multiple files whereas 0:09:10.080,0:09:11.920 trojan does not have the 0:09:11.920,0:09:13.680 replication ability 0:09:13.680,0:09:15.600 if you have any questions you can ask 0:09:15.600,0:09:17.600 them on the comment section thank you 0:09:17.600,0:09:20.760 for watching 0:09:22.080,0:09:23.920 hi there if you like this video 0:09:23.920,0:09:25.600 subscribe to the simply learn youtube 0:09:25.600,0:09:28.240 channel and click here to watch similar 0:09:28.240,0:09:30.399 videos to nerd up and get certified 0:09:30.399,0:09:33.720 click here