[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:08.08,0:00:10.48,Default,,0000,0000,0000,,In the current technological era, coming Dialogue: 0,0:00:10.48,0:00:12.32,Default,,0000,0000,0000,,across different computer problems Dialogue: 0,0:00:12.32,0:00:14.32,Default,,0000,0000,0000,,related to malware and cyber tax is Dialogue: 0,0:00:14.32,0:00:15.36,Default,,0000,0000,0000,,common. Dialogue: 0,0:00:15.36,0:00:17.84,Default,,0000,0000,0000,,According to AV test institute, there are Dialogue: 0,0:00:17.84,0:00:19.84,Default,,0000,0000,0000,,more than one billion malware programs Dialogue: 0,0:00:19.84,0:00:20.96,Default,,0000,0000,0000,,available. Dialogue: 0,0:00:20.96,0:00:23.04,Default,,0000,0000,0000,,And new malware programs are detected Dialogue: 0,0:00:23.04,0:00:24.56,Default,,0000,0000,0000,,regularly. Dialogue: 0,0:00:24.56,0:00:26.48,Default,,0000,0000,0000,,Hi guys, and welcome to yet another Dialogue: 0,0:00:26.48,0:00:28.64,Default,,0000,0000,0000,,interesting video by simply learn but Dialogue: 0,0:00:28.64,0:00:30.64,Default,,0000,0000,0000,,before we begin. If you love watching Dialogue: 0,0:00:30.64,0:00:33.28,Default,,0000,0000,0000,,tech videos, subscribe to our channel and Dialogue: 0,0:00:33.28,0:00:34.96,Default,,0000,0000,0000,,hit the bell icon to never miss an Dialogue: 0,0:00:34.96,0:00:36.80,Default,,0000,0000,0000,,update. Dialogue: 0,0:00:36.80,0:00:39.36,Default,,0000,0000,0000,,In this video, we'll understand what is a Dialogue: 0,0:00:39.36,0:00:41.28,Default,,0000,0000,0000,,malware program? Dialogue: 0,0:00:41.28,0:00:43.92,Default,,0000,0000,0000,,Then, we'll see what exactly are viruses Dialogue: 0,0:00:43.92,0:00:45.52,Default,,0000,0000,0000,,and trojans. Dialogue: 0,0:00:45.52,0:00:47.52,Default,,0000,0000,0000,,Then, we will see how they operate in a Dialogue: 0,0:00:47.52,0:00:49.12,Default,,0000,0000,0000,,system. Dialogue: 0,0:00:49.12,0:00:51.12,Default,,0000,0000,0000,,And then different types of viruses and Dialogue: 0,0:00:51.12,0:00:52.80,Default,,0000,0000,0000,,trojan, Dialogue: 0,0:00:52.80,0:00:54.72,Default,,0000,0000,0000,,and how to detect the activity of such Dialogue: 0,0:00:54.72,0:00:56.00,Default,,0000,0000,0000,,programs. Dialogue: 0,0:00:56.00,0:00:58.08,Default,,0000,0000,0000,,And lastly, we will see how to prevent Dialogue: 0,0:00:58.08,0:01:00.16,Default,,0000,0000,0000,,our system from getting infected by such Dialogue: 0,0:01:00.16,0:01:02.72,Default,,0000,0000,0000,,programs. Dialogue: 0,0:01:03.12,0:01:05.28,Default,,0000,0000,0000,,Malware is a malicious software that is Dialogue: 0,0:01:05.28,0:01:07.28,Default,,0000,0000,0000,,programmed to cause damage to a computer. Dialogue: 0,0:01:07.28,0:01:10.48,Default,,0000,0000,0000,,System network and hardware devices. Dialogue: 0,0:01:10.48,0:01:12.48,Default,,0000,0000,0000,,Many malicious programs like trojan Dialogue: 0,0:01:12.48,0:01:14.64,Default,,0000,0000,0000,,viruses worms and bots which cause Dialogue: 0,0:01:14.64,0:01:16.56,Default,,0000,0000,0000,,damage to the system are known as Dialogue: 0,0:01:16.56,0:01:19.04,Default,,0000,0000,0000,,malware. Most of the malware programs are Dialogue: 0,0:01:19.04,0:01:21.12,Default,,0000,0000,0000,,designed to steal information from the Dialogue: 0,0:01:21.12,0:01:22.64,Default,,0000,0000,0000,,targeted user Dialogue: 0,0:01:22.64,0:01:25.28,Default,,0000,0000,0000,,or to steal money from the target by Dialogue: 0,0:01:25.28,0:01:27.92,Default,,0000,0000,0000,,stealing sensitive data. Dialogue: 0,0:01:27.92,0:01:29.84,Default,,0000,0000,0000,,Let's take a look at the introduction Dialogue: 0,0:01:29.84,0:01:32.48,Default,,0000,0000,0000,,for two different types of malware virus, Dialogue: 0,0:01:32.48,0:01:35.04,Default,,0000,0000,0000,,and trojan. Dialogue: 0,0:01:36.32,0:01:38.16,Default,,0000,0000,0000,,Firstly, let's take a look what exactly Dialogue: 0,0:01:38.16,0:01:40.48,Default,,0000,0000,0000,,is a virus program. Dialogue: 0,0:01:40.48,0:01:42.64,Default,,0000,0000,0000,,A computer virus is a type of malicious Dialogue: 0,0:01:42.64,0:01:44.88,Default,,0000,0000,0000,,program that on execution replicates Dialogue: 0,0:01:44.88,0:01:45.92,Default,,0000,0000,0000,,itself. Dialogue: 0,0:01:45.92,0:01:48.16,Default,,0000,0000,0000,,They get attached to different files and Dialogue: 0,0:01:48.16,0:01:50.32,Default,,0000,0000,0000,,programs, which are termed as host Dialogue: 0,0:01:50.32,0:01:53.04,Default,,0000,0000,0000,,programs by inserting their code. If the Dialogue: 0,0:01:53.04,0:01:55.60,Default,,0000,0000,0000,,attachment succeeds, the targeted program Dialogue: 0,0:01:55.60,0:01:57.84,Default,,0000,0000,0000,,is termed as infected with a computer Dialogue: 0,0:01:57.84,0:01:58.88,Default,,0000,0000,0000,,virus. Dialogue: 0,0:01:58.88,0:02:00.64,Default,,0000,0000,0000,,Now, let's take a look at the trojan Dialogue: 0,0:02:00.64,0:02:01.84,Default,,0000,0000,0000,,horse. Dialogue: 0,0:02:01.84,0:02:04.16,Default,,0000,0000,0000,,Trojan horse program is a program that Dialogue: 0,0:02:04.16,0:02:06.88,Default,,0000,0000,0000,,disguises itself as a legitimate program, Dialogue: 0,0:02:06.88,0:02:09.52,Default,,0000,0000,0000,,but harms the system on installation. Dialogue: 0,0:02:09.52,0:02:11.44,Default,,0000,0000,0000,,They hide within the attachments and Dialogue: 0,0:02:11.44,0:02:13.76,Default,,0000,0000,0000,,emails then transfer from one system to Dialogue: 0,0:02:13.76,0:02:16.40,Default,,0000,0000,0000,,another they create bad doors into a Dialogue: 0,0:02:16.40,0:02:18.80,Default,,0000,0000,0000,,system to allow the cyber criminal to Dialogue: 0,0:02:18.80,0:02:21.52,Default,,0000,0000,0000,,steal our information. Dialogue: 0,0:02:21.52,0:02:23.28,Default,,0000,0000,0000,,Let's take a look how they function Dialogue: 0,0:02:23.28,0:02:27.52,Default,,0000,0000,0000,,after getting installed into our system. Dialogue: 0,0:02:27.52,0:02:30.08,Default,,0000,0000,0000,,Firstly, we have virus programs the Dialogue: 0,0:02:30.08,0:02:32.40,Default,,0000,0000,0000,,computer virus must contain two parts to Dialogue: 0,0:02:32.40,0:02:34.00,Default,,0000,0000,0000,,infect the system. Dialogue: 0,0:02:34.00,0:02:36.72,Default,,0000,0000,0000,,First is a surge routine which locates Dialogue: 0,0:02:36.72,0:02:38.56,Default,,0000,0000,0000,,new files and data that is to be Dialogue: 0,0:02:38.56,0:02:41.04,Default,,0000,0000,0000,,infected by the virus program. Dialogue: 0,0:02:41.04,0:02:43.12,Default,,0000,0000,0000,,And the second part is known as the copy Dialogue: 0,0:02:43.12,0:02:45.44,Default,,0000,0000,0000,,routine, which is necessary for the Dialogue: 0,0:02:45.44,0:02:48.08,Default,,0000,0000,0000,,program to copy itself into the targeted Dialogue: 0,0:02:48.08,0:02:50.56,Default,,0000,0000,0000,,file, which is located by the search Dialogue: 0,0:02:50.56,0:02:52.40,Default,,0000,0000,0000,,routine now let's take a look at the Dialogue: 0,0:02:52.40,0:02:54.64,Default,,0000,0000,0000,,trojan horse functioning Dialogue: 0,0:02:54.64,0:02:56.72,Default,,0000,0000,0000,,for trojan horses entryway into our Dialogue: 0,0:02:56.72,0:02:59.44,Default,,0000,0000,0000,,system is through emails that may look Dialogue: 0,0:02:59.44,0:03:01.20,Default,,0000,0000,0000,,legitimate, but may have unknown Dialogue: 0,0:03:01.20,0:03:03.68,Default,,0000,0000,0000,,attachments. And when such files are Dialogue: 0,0:03:03.68,0:03:06.08,Default,,0000,0000,0000,,downloaded into the device, the trojan Dialogue: 0,0:03:06.08,0:03:08.16,Default,,0000,0000,0000,,program gets installed and infects the Dialogue: 0,0:03:08.16,0:03:09.92,Default,,0000,0000,0000,,system. Dialogue: 0,0:03:09.92,0:03:11.84,Default,,0000,0000,0000,,They also infect the system on the Dialogue: 0,0:03:11.84,0:03:14.16,Default,,0000,0000,0000,,execution of infected application or the Dialogue: 0,0:03:14.16,0:03:17.60,Default,,0000,0000,0000,,executable file and attacks the system. Dialogue: 0,0:03:17.60,0:03:19.84,Default,,0000,0000,0000,,Now, that we understand what virus and Dialogue: 0,0:03:19.84,0:03:22.24,Default,,0000,0000,0000,,trojans are let's understand different Dialogue: 0,0:03:22.24,0:03:25.84,Default,,0000,0000,0000,,types of virus androgens. Dialogue: 0,0:03:25.84,0:03:27.60,Default,,0000,0000,0000,,Let's take a look at different types of Dialogue: 0,0:03:27.60,0:03:28.96,Default,,0000,0000,0000,,viruses. Dialogue: 0,0:03:28.96,0:03:30.72,Default,,0000,0000,0000,,The first one is known as the booth Dialogue: 0,0:03:30.72,0:03:33.28,Default,,0000,0000,0000,,sector virus. This type of virus damages Dialogue: 0,0:03:33.28,0:03:35.52,Default,,0000,0000,0000,,the booting section of the system by Dialogue: 0,0:03:35.52,0:03:37.68,Default,,0000,0000,0000,,infecting the master bot record, which is Dialogue: 0,0:03:37.68,0:03:39.68,Default,,0000,0000,0000,,also known as MBR. Dialogue: 0,0:03:39.68,0:03:42.24,Default,,0000,0000,0000,,This damages the boot sector section by Dialogue: 0,0:03:42.24,0:03:45.36,Default,,0000,0000,0000,,targeting the hard disk of the system. Dialogue: 0,0:03:45.36,0:03:48.00,Default,,0000,0000,0000,,Then we have the macro virus. Dialogue: 0,0:03:48.00,0:03:50.64,Default,,0000,0000,0000,,Micro virus is a type of virus that gets Dialogue: 0,0:03:50.64,0:03:53.36,Default,,0000,0000,0000,,embedded into the document related data, Dialogue: 0,0:03:53.36,0:03:56.08,Default,,0000,0000,0000,,and is executed when the file is opened. Dialogue: 0,0:03:56.08,0:03:57.92,Default,,0000,0000,0000,,They also are designed to replicate Dialogue: 0,0:03:57.92,0:04:00.32,Default,,0000,0000,0000,,themselves, and infect the system on a Dialogue: 0,0:04:00.32,0:04:02.00,Default,,0000,0000,0000,,larger scale. Dialogue: 0,0:04:02.00,0:04:04.32,Default,,0000,0000,0000,,And lastly, we have the direct action Dialogue: 0,0:04:04.32,0:04:06.16,Default,,0000,0000,0000,,virus. Dialogue: 0,0:04:06.16,0:04:08.08,Default,,0000,0000,0000,,This type of virus gets attached to Dialogue: 0,0:04:08.08,0:04:10.72,Default,,0000,0000,0000,,executable files, which on execution Dialogue: 0,0:04:10.72,0:04:12.88,Default,,0000,0000,0000,,activates the virus program and infects Dialogue: 0,0:04:12.88,0:04:15.76,Default,,0000,0000,0000,,the system. Once the infection of the Dialogue: 0,0:04:15.76,0:04:18.80,Default,,0000,0000,0000,,file is completed, they exit the system Dialogue: 0,0:04:18.80,0:04:21.36,Default,,0000,0000,0000,,which is also the reason it is known as Dialogue: 0,0:04:21.36,0:04:23.52,Default,,0000,0000,0000,,a non-resident virus. Dialogue: 0,0:04:23.52,0:04:25.20,Default,,0000,0000,0000,,Let's take a look at different types of Dialogue: 0,0:04:25.20,0:04:27.36,Default,,0000,0000,0000,,trojans. Dialogue: 0,0:04:27.36,0:04:29.52,Default,,0000,0000,0000,,The first type of trojan is the backdoor Dialogue: 0,0:04:29.52,0:04:30.80,Default,,0000,0000,0000,,trojan. Dialogue: 0,0:04:30.80,0:04:32.80,Default,,0000,0000,0000,,They are designed to create a backdoor Dialogue: 0,0:04:32.80,0:04:34.88,Default,,0000,0000,0000,,in the system on execution of an Dialogue: 0,0:04:34.88,0:04:36.72,Default,,0000,0000,0000,,infected program. Dialogue: 0,0:04:36.72,0:04:39.36,Default,,0000,0000,0000,,They provide remote access of our system Dialogue: 0,0:04:39.36,0:04:41.36,Default,,0000,0000,0000,,to the hacker. This way, the cyber Dialogue: 0,0:04:41.36,0:04:43.76,Default,,0000,0000,0000,,criminal can steal our system data and Dialogue: 0,0:04:43.76,0:04:46.00,Default,,0000,0000,0000,,may use it for illegal activities. Next, Dialogue: 0,0:04:46.00,0:04:47.28,Default,,0000,0000,0000,,we have Dialogue: 0,0:04:47.28,0:04:49.44,Default,,0000,0000,0000,,quick source trojan. Dialogue: 0,0:04:49.44,0:04:51.20,Default,,0000,0000,0000,,They enter the system by clicking the Dialogue: 0,0:04:51.20,0:04:53.44,Default,,0000,0000,0000,,random pop-ups which we come across on Dialogue: 0,0:04:53.44,0:04:54.72,Default,,0000,0000,0000,,the internet. Dialogue: 0,0:04:54.72,0:04:56.40,Default,,0000,0000,0000,,They attempt a user to give their Dialogue: 0,0:04:56.40,0:04:58.32,Default,,0000,0000,0000,,personal details for different Dialogue: 0,0:04:58.32,0:05:00.72,Default,,0000,0000,0000,,transactions or schemes, Dialogue: 0,0:05:00.72,0:05:03.20,Default,,0000,0000,0000,,which may provide remote access of a Dialogue: 0,0:05:03.20,0:05:05.92,Default,,0000,0000,0000,,system to the cyber criminal. Dialogue: 0,0:05:05.92,0:05:08.24,Default,,0000,0000,0000,,And the last trojan type is ransom Dialogue: 0,0:05:08.24,0:05:09.28,Default,,0000,0000,0000,,trojan. Dialogue: 0,0:05:09.28,0:05:11.36,Default,,0000,0000,0000,,This type of trojan program after Dialogue: 0,0:05:11.36,0:05:14.00,Default,,0000,0000,0000,,entering the system blocks the user from Dialogue: 0,0:05:14.00,0:05:15.12,Default,,0000,0000,0000,,accessing Dialogue: 0,0:05:15.12,0:05:17.76,Default,,0000,0000,0000,,its own system. And also affects the Dialogue: 0,0:05:17.76,0:05:19.76,Default,,0000,0000,0000,,system functioning Dialogue: 0,0:05:19.76,0:05:22.08,Default,,0000,0000,0000,,the cyber criminal demands a ransom from Dialogue: 0,0:05:22.08,0:05:24.80,Default,,0000,0000,0000,,the targeted user for the removal of the Dialogue: 0,0:05:24.80,0:05:27.20,Default,,0000,0000,0000,,trojan program from the device. Dialogue: 0,0:05:27.20,0:05:28.88,Default,,0000,0000,0000,,Now, that we understand some details Dialogue: 0,0:05:28.88,0:05:31.20,Default,,0000,0000,0000,,regarding viruses and trojan, let's solve Dialogue: 0,0:05:31.20,0:05:32.88,Default,,0000,0000,0000,,a question. Dialogue: 0,0:05:32.88,0:05:35.44,Default,,0000,0000,0000,,The question is Jake was denied access Dialogue: 0,0:05:35.44,0:05:37.28,Default,,0000,0000,0000,,to his system, and he wasn't able to Dialogue: 0,0:05:37.28,0:05:39.12,Default,,0000,0000,0000,,control the data and information in his Dialogue: 0,0:05:39.12,0:05:41.04,Default,,0000,0000,0000,,system. Dialogue: 0,0:05:41.04,0:05:42.08,Default,,0000,0000,0000,,Now, Dialogue: 0,0:05:42.08,0:05:44.16,Default,,0000,0000,0000,,the actual question is what could be the Dialogue: 0,0:05:44.16,0:05:46.56,Default,,0000,0000,0000,,reason behind his system's problem? Dialogue: 0,0:05:46.56,0:05:49.52,Default,,0000,0000,0000,,Option A: macro virus, Option B: ransom Dialogue: 0,0:05:49.52,0:05:52.56,Default,,0000,0000,0000,,trojan, Option C: backward version. Dialogue: 0,0:05:52.56,0:05:55.84,Default,,0000,0000,0000,,Give your answers in the comment section. Dialogue: 0,0:05:55.84,0:05:58.08,Default,,0000,0000,0000,,Now, let's understand how to detect the Dialogue: 0,0:05:58.08,0:06:00.24,Default,,0000,0000,0000,,activity of viruses and trojan in our Dialogue: 0,0:06:00.24,0:06:02.40,Default,,0000,0000,0000,,system Dialogue: 0,0:06:02.40,0:06:04.64,Default,,0000,0000,0000,,to detect virus or trojan activity in a Dialogue: 0,0:06:04.64,0:06:06.80,Default,,0000,0000,0000,,system, we can refer to the following Dialogue: 0,0:06:06.80,0:06:07.68,Default,,0000,0000,0000,,points Dialogue: 0,0:06:07.68,0:06:09.44,Default,,0000,0000,0000,,for viruses. We have Dialogue: 0,0:06:09.44,0:06:11.68,Default,,0000,0000,0000,,slowing down of the system and frequent Dialogue: 0,0:06:11.68,0:06:13.68,Default,,0000,0000,0000,,application freeze shows that the Dialogue: 0,0:06:13.68,0:06:15.84,Default,,0000,0000,0000,,infection of the virus is present in the Dialogue: 0,0:06:15.84,0:06:17.36,Default,,0000,0000,0000,,system. Dialogue: 0,0:06:17.36,0:06:20.40,Default,,0000,0000,0000,,Then, we have the viruses can also steal Dialogue: 0,0:06:20.40,0:06:22.80,Default,,0000,0000,0000,,sensitive data including passwords, Dialogue: 0,0:06:22.80,0:06:24.24,Default,,0000,0000,0000,,account details, Dialogue: 0,0:06:24.24,0:06:26.80,Default,,0000,0000,0000,,which may lead to unexpected log out Dialogue: 0,0:06:26.80,0:06:28.80,Default,,0000,0000,0000,,from the accounts or corruption of the Dialogue: 0,0:06:28.80,0:06:30.40,Default,,0000,0000,0000,,sensitive data. Dialogue: 0,0:06:30.40,0:06:32.88,Default,,0000,0000,0000,,And lastly, we have frequent system Dialogue: 0,0:06:32.88,0:06:35.36,Default,,0000,0000,0000,,crashes due to virus infection which Dialogue: 0,0:06:35.36,0:06:38.00,Default,,0000,0000,0000,,damages the operating system. Dialogue: 0,0:06:38.00,0:06:40.00,Default,,0000,0000,0000,,For trojan, we have frequent system Dialogue: 0,0:06:40.00,0:06:42.32,Default,,0000,0000,0000,,crashes and system also faces slow Dialogue: 0,0:06:42.32,0:06:44.08,Default,,0000,0000,0000,,reaction time. Dialogue: 0,0:06:44.08,0:06:46.24,Default,,0000,0000,0000,,Then, we have there are more random Dialogue: 0,0:06:46.24,0:06:48.40,Default,,0000,0000,0000,,pop-ups from the system which may Dialogue: 0,0:06:48.40,0:06:50.48,Default,,0000,0000,0000,,indicate trojan activity. Dialogue: 0,0:06:50.48,0:06:52.80,Default,,0000,0000,0000,,And lastly, we have modification in the Dialogue: 0,0:06:52.80,0:06:54.80,Default,,0000,0000,0000,,system application and change of the Dialogue: 0,0:06:54.80,0:06:56.96,Default,,0000,0000,0000,,desktop appearance can be also due to Dialogue: 0,0:06:56.96,0:07:00.00,Default,,0000,0000,0000,,the infection of a trojan program. Dialogue: 0,0:07:00.00,0:07:02.48,Default,,0000,0000,0000,,Next, let's take a look at a famous cyber Dialogue: 0,0:07:02.48,0:07:06.72,Default,,0000,0000,0000,,attack for virus and a trojan horse. Dialogue: 0,0:07:07.52,0:07:09.28,Default,,0000,0000,0000,,For virus, we have Dialogue: 0,0:07:09.28,0:07:11.84,Default,,0000,0000,0000,,the my doom virus which was identified Dialogue: 0,0:07:11.84,0:07:14.88,Default,,0000,0000,0000,,in the ER 2004, which affected over 50 Dialogue: 0,0:07:14.88,0:07:17.60,Default,,0000,0000,0000,,million systems by creating a network of Dialogue: 0,0:07:17.60,0:07:19.68,Default,,0000,0000,0000,,sending spam emails, Dialogue: 0,0:07:19.68,0:07:22.40,Default,,0000,0000,0000,,which was to gain backdoor access into Dialogue: 0,0:07:22.40,0:07:24.16,Default,,0000,0000,0000,,our systems. Dialogue: 0,0:07:24.16,0:07:26.56,Default,,0000,0000,0000,,Next for the trojan horse, we have the Dialogue: 0,0:07:26.56,0:07:28.64,Default,,0000,0000,0000,,emote trojan program Dialogue: 0,0:07:28.64,0:07:30.80,Default,,0000,0000,0000,,which is specifically designed for Dialogue: 0,0:07:30.80,0:07:33.20,Default,,0000,0000,0000,,financial theft and for stealing bank Dialogue: 0,0:07:33.20,0:07:35.60,Default,,0000,0000,0000,,related information. Dialogue: 0,0:07:35.60,0:07:37.76,Default,,0000,0000,0000,,Next, we have few points for how to Dialogue: 0,0:07:37.76,0:07:40.32,Default,,0000,0000,0000,,prevent virus entry or trojan attack for Dialogue: 0,0:07:40.32,0:07:42.80,Default,,0000,0000,0000,,a system. Dialogue: 0,0:07:42.96,0:07:45.52,Default,,0000,0000,0000,,The most basic way of virus protection Dialogue: 0,0:07:45.52,0:07:47.92,Default,,0000,0000,0000,,is to using antivirus and do regular Dialogue: 0,0:07:47.92,0:07:49.20,Default,,0000,0000,0000,,viruses can Dialogue: 0,0:07:49.20,0:07:50.96,Default,,0000,0000,0000,,this will prevent virus entry in the Dialogue: 0,0:07:50.96,0:07:52.96,Default,,0000,0000,0000,,system, and also having more than one Dialogue: 0,0:07:52.96,0:07:54.96,Default,,0000,0000,0000,,antivirus provides much better Dialogue: 0,0:07:54.96,0:07:57.20,Default,,0000,0000,0000,,protectionm Dialogue: 0,0:07:57.20,0:07:59.76,Default,,0000,0000,0000,,then avoid visiting uncertified websites Dialogue: 0,0:07:59.76,0:08:02.24,Default,,0000,0000,0000,,can also prevent virus entry into our Dialogue: 0,0:08:02.24,0:08:04.64,Default,,0000,0000,0000,,systemm Dialogue: 0,0:08:05.68,0:08:07.04,Default,,0000,0000,0000,,then we have Dialogue: 0,0:08:07.04,0:08:09.44,Default,,0000,0000,0000,,using regular driver updates and system Dialogue: 0,0:08:09.44,0:08:12.08,Default,,0000,0000,0000,,updates to prevent virus entry for Dialogue: 0,0:08:12.08,0:08:15.20,Default,,0000,0000,0000,,trojan. We have using certified softwares Dialogue: 0,0:08:15.20,0:08:17.76,Default,,0000,0000,0000,,from legal sites to prevent any trojan Dialogue: 0,0:08:17.76,0:08:20.08,Default,,0000,0000,0000,,activity in our system, Dialogue: 0,0:08:20.08,0:08:22.48,Default,,0000,0000,0000,,and also avoid clicking random pop-ups Dialogue: 0,0:08:22.48,0:08:25.04,Default,,0000,0000,0000,,that we often see on the internet Dialogue: 0,0:08:25.04,0:08:28.16,Default,,0000,0000,0000,,and lastly using antivirus and firewalls Dialogue: 0,0:08:28.16,0:08:30.56,Default,,0000,0000,0000,,for protection against trojan horses is Dialogue: 0,0:08:30.56,0:08:33.20,Default,,0000,0000,0000,,a good habit, Dialogue: 0,0:08:33.84,0:08:35.36,Default,,0000,0000,0000,,Now, that we have reached the end of the Dialogue: 0,0:08:35.36,0:08:38.32,Default,,0000,0000,0000,,video, let's take a look what we learnt Dialogue: 0,0:08:38.32,0:08:41.20,Default,,0000,0000,0000,,for the first part. We saw the main Dialogue: 0,0:08:41.20,0:08:43.20,Default,,0000,0000,0000,,objective of the virus is to harm the Dialogue: 0,0:08:43.20,0:08:45.92,Default,,0000,0000,0000,,data and information in a system whereas Dialogue: 0,0:08:45.92,0:08:47.84,Default,,0000,0000,0000,,for the trojan, we have stealing of the Dialogue: 0,0:08:47.84,0:08:50.48,Default,,0000,0000,0000,,data files and information Dialogue: 0,0:08:50.48,0:08:53.04,Default,,0000,0000,0000,,effect of viruses is more drastic in Dialogue: 0,0:08:53.04,0:08:56.64,Default,,0000,0000,0000,,comparison to the trojan horses. Dialogue: 0,0:08:56.96,0:08:58.88,Default,,0000,0000,0000,,Then we have viruses which are Dialogue: 0,0:08:58.88,0:09:01.68,Default,,0000,0000,0000,,non-remote programs whereas trojan Dialogue: 0,0:09:01.68,0:09:03.84,Default,,0000,0000,0000,,horses are remote accessed. Dialogue: 0,0:09:03.84,0:09:05.20,Default,,0000,0000,0000,,And lastly, Dialogue: 0,0:09:05.20,0:09:07.44,Default,,0000,0000,0000,,viruses have the ability to replicate Dialogue: 0,0:09:07.44,0:09:10.08,Default,,0000,0000,0000,,itself to harm multiple files whereas Dialogue: 0,0:09:10.08,0:09:11.92,Default,,0000,0000,0000,,trojan does not have the Dialogue: 0,0:09:11.92,0:09:13.68,Default,,0000,0000,0000,,replication ability. Dialogue: 0,0:09:13.68,0:09:15.60,Default,,0000,0000,0000,,If you have any questions, you can ask Dialogue: 0,0:09:15.60,0:09:17.60,Default,,0000,0000,0000,,them on the comment section. Thank you Dialogue: 0,0:09:17.60,0:09:20.76,Default,,0000,0000,0000,,for watching. Dialogue: 0,0:09:22.08,0:09:23.92,Default,,0000,0000,0000,,Hi there. If you like this video, Dialogue: 0,0:09:23.92,0:09:25.60,Default,,0000,0000,0000,,subscribe to the simply learn YouTube Dialogue: 0,0:09:25.60,0:09:28.24,Default,,0000,0000,0000,,channel, and click here to watch similar Dialogue: 0,0:09:28.24,0:09:30.40,Default,,0000,0000,0000,,videos to nerd up and get certified. Dialogue: 0,0:09:30.40,0:09:33.72,Default,,0000,0000,0000,,Click here.