In the current technological era, coming across different computer problems related to malware and cyber tax is common. According to AV test institute, there are more than one billion malware programs available. And new malware programs are detected regularly. Hi guys, and welcome to yet another interesting video by simply learn but before we begin. If you love watching tech videos, subscribe to our channel and hit the bell icon to never miss an update. In this video, we'll understand what is a malware program? Then, we'll see what exactly are viruses and trojans. Then, we will see how they operate in a system. And then different types of viruses and trojan, and how to detect the activity of such programs. And lastly, we will see how to prevent our system from getting infected by such programs. Malware is a malicious software that is programmed to cause damage to a computer. System network and hardware devices. Many malicious programs like trojan viruses worms and bots which cause damage to the system are known as malware. Most of the malware programs are designed to steal information from the targeted user or to steal money from the target by stealing sensitive data. Let's take a look at the introduction for two different types of malware virus, and trojan. Firstly, let's take a look what exactly is a virus program. A computer virus is a type of malicious program that on execution replicates itself. They get attached to different files and programs, which are termed as host programs by inserting their code. If the attachment succeeds, the targeted program is termed as infected with a computer virus. Now, let's take a look at the trojan horse. Trojan horse program is a program that disguises itself as a legitimate program, but harms the system on installation. They hide within the attachments and emails then transfer from one system to another they create bad doors into a system to allow the cyber criminal to steal our information. Let's take a look how they function after getting installed into our system. Firstly, we have virus programs the computer virus must contain two parts to infect the system. First is a surge routine which locates new files and data that is to be infected by the virus program. And the second part is known as the copy routine, which is necessary for the program to copy itself into the targeted file, which is located by the search routine now let's take a look at the trojan horse functioning for trojan horses entryway into our system is through emails that may look legitimate, but may have unknown attachments. And when such files are downloaded into the device, the trojan program gets installed and infects the system. They also infect the system on the execution of infected application or the executable file and attacks the system. Now, that we understand what virus and trojans are let's understand different types of virus androgens. Let's take a look at different types of viruses. The first one is known as the booth sector virus. This type of virus damages the booting section of the system by infecting the master bot record, which is also known as MBR. This damages the boot sector section by targeting the hard disk of the system. Then we have the macro virus. Micro virus is a type of virus that gets embedded into the document related data, and is executed when the file is opened. They also are designed to replicate themselves, and infect the system on a larger scale. And lastly, we have the direct action virus. This type of virus gets attached to executable files, which on execution activates the virus program and infects the system. Once the infection of the file is completed, they exit the system which is also the reason it is known as a non-resident virus. Let's take a look at different types of trojans. The first type of trojan is the backdoor trojan. They are designed to create a backdoor in the system on execution of an infected program. They provide remote access of our system to the hacker. This way, the cyber criminal can steal our system data and may use it for illegal activities. Next, we have quick source trojan. They enter the system by clicking the random pop-ups which we come across on the internet. They attempt a user to give their personal details for different transactions or schemes, which may provide remote access of a system to the cyber criminal. And the last trojan type is ransom trojan. This type of trojan program after entering the system blocks the user from accessing its own system. And also affects the system functioning the cyber criminal demands a ransom from the targeted user for the removal of the trojan program from the device. Now, that we understand some details regarding viruses and trojan, let's solve a question. The question is Jake was denied access to his system, and he wasn't able to control the data and information in his system. Now, the actual question is what could be the reason behind his system's problem? Option A: macro virus, Option B: ransom trojan, Option C: backward version. Give your answers in the comment section. Now, let's understand how to detect the activity of viruses and trojan in our system to detect virus or trojan activity in a system, we can refer to the following points for viruses. We have slowing down of the system and frequent application freeze shows that the infection of the virus is present in the system. Then, we have the viruses can also steal sensitive data including passwords, account details, which may lead to unexpected log out from the accounts or corruption of the sensitive data. And lastly, we have frequent system crashes due to virus infection which damages the operating system. For trojan, we have frequent system crashes and system also faces slow reaction time. Then, we have there are more random pop-ups from the system which may indicate trojan activity. And lastly, we have modification in the system application and change of the desktop appearance can be also due to the infection of a trojan program. Next, let's take a look at a famous cyber attack for virus and a trojan horse. For virus, we have the my doom virus which was identified in the ER 2004, which affected over 50 million systems by creating a network of sending spam emails, which was to gain backdoor access into our systems. Next for the trojan horse, we have the emote trojan program which is specifically designed for financial theft and for stealing bank related information. Next, we have few points for how to prevent virus entry or trojan attack for a system. The most basic way of virus protection is to using antivirus and do regular viruses can this will prevent virus entry in the system, and also having more than one antivirus provides much better protectionm then avoid visiting uncertified websites can also prevent virus entry into our systemm then we have using regular driver updates and system updates to prevent virus entry for trojan. We have using certified softwares from legal sites to prevent any trojan activity in our system, and also avoid clicking random pop-ups that we often see on the internet and lastly using antivirus and firewalls for protection against trojan horses is a good habit, Now, that we have reached the end of the video, let's take a look what we learnt for the first part. We saw the main objective of the virus is to harm the data and information in a system whereas for the trojan, we have stealing of the data files and information effect of viruses is more drastic in comparison to the trojan horses. Then we have viruses which are non-remote programs whereas trojan horses are remote accessed. And lastly, viruses have the ability to replicate itself to harm multiple files whereas trojan does not have the replication ability. If you have any questions, you can ask them on the comment section. Thank you for watching. Hi there. If you like this video, subscribe to the simply learn YouTube channel, and click here to watch similar videos to nerd up and get certified. Click here.