1 00:00:00,150 --> 00:00:08,010 So we will see some of the witnesses and the types generally these various categories are divided according 2 00:00:08,010 --> 00:00:14,880 to the behavior generally, these are come under the malware, but five function from the functionality 3 00:00:14,880 --> 00:00:15,410 perspective. 4 00:00:15,480 --> 00:00:17,480 These are divided into some few types. 5 00:00:17,940 --> 00:00:20,370 I'm going to explain these three types in this video. 6 00:00:20,730 --> 00:00:27,380 Virus from entrance of virus grows itself are only one that is running on one system. 7 00:00:27,510 --> 00:00:28,620 So it is like offline. 8 00:00:28,620 --> 00:00:32,670 What does it affects only one computer that is running on that system. 9 00:00:33,570 --> 00:00:41,090 If I run this virus on my system and my computer gets infected, but that's not in the case of the wall. 10 00:00:41,190 --> 00:00:43,720 One infects all the computers running on the same night. 11 00:00:43,950 --> 00:00:50,550 So if my company has 100 computers running on the same network and if one computer is affected by one, 12 00:00:50,550 --> 00:00:52,020 then it will infect. 13 00:00:52,020 --> 00:00:53,650 Are the computers running on the same way? 14 00:00:54,150 --> 00:01:02,760 It will, in fact, are the computers within a short amount of time and it will create a botnet scenario 15 00:01:02,760 --> 00:01:05,780 like attacker took over. 16 00:01:05,790 --> 00:01:06,870 And this one. 17 00:01:07,380 --> 00:01:08,070 And you get. 18 00:01:09,370 --> 00:01:12,740 That coming in are the computers running on the same network. 19 00:01:14,170 --> 00:01:21,100 So this is different from the virus and one and this ransomware is more dangerous because it encrypts 20 00:01:21,100 --> 00:01:25,150 are the files and folders of the user and the user has to pay to to them. 21 00:01:26,710 --> 00:01:34,720 So what this ransomware does is it will encrypt every quarter in the system and then it will display 22 00:01:34,720 --> 00:01:40,690 a command from our interface telling that you have to pay to the attacker to recover. 23 00:01:41,200 --> 00:01:49,620 So there is a target to say that we will crack the password and we will do the card key. 24 00:01:49,840 --> 00:01:58,030 And if you enter the entrance of our device, but in general, these ransomware are written in such 25 00:01:58,030 --> 00:02:06,380 a way that it will only encrypts one way so we cannot decrypt all the files and for us to the normal 26 00:02:06,430 --> 00:02:06,760 state. 27 00:02:08,130 --> 00:02:15,170 But the attackers say that we have some advanced items and we have since we have taken ransomware. 28 00:02:15,210 --> 00:02:17,420 We do also have the decryption algorithm. 29 00:02:17,760 --> 00:02:22,300 So you need to pass in 99 percent cases. 30 00:02:22,320 --> 00:02:27,870 User, even if user pays them, the hackers will not send the key. 31 00:02:29,220 --> 00:02:38,010 Are there other kinds of red faced groups, because it's only one way and there is no description in 32 00:02:38,010 --> 00:02:42,720 Walsch, 99 percent of the cases, that's whenever you hit back around somewhere. 33 00:02:43,080 --> 00:02:44,490 It's better not to pay them. 34 00:02:45,000 --> 00:02:47,740 It's better to treat each other. 35 00:02:47,800 --> 00:02:50,320 Oh, yes, that's the efficient way. 36 00:02:51,270 --> 00:02:53,420 So these are the virus, ransomware. 37 00:02:53,430 --> 00:03:00,180 We have to learn virus affects only one computer and one infects all the computers on the same network. 38 00:03:00,190 --> 00:03:02,670 And then it just encrypts everything. 39 00:03:02,670 --> 00:03:03,480 And the computer.