Myvideo

Guest

Login

How Trojan Horse Virus Works

Uploaded By: Myvideo
1 view
0
0 votes
0

This is very simplified, so it’s not precise. ​⁠​⁠@SENTRY456123’s video, gave me an idea and Trojans are my favorite types of viruses :) ~ What’s a Trojan? Trojans disguise themselves as legitimate programs, then basically pull a bait and switch and the damage can range from being a general nuisance, to straight up stealing your identity! They can disguise themselves pretty well, so they can remain on your system for months without you knowing. In my experience, windows defender sucks. You should buy a good antivirus like Mcafee or, if you don’t want to pay 20 bucks a month, you can download Malware bytes! It's free and its very decent. What I explained in the video because this is pretty confusing | | ⬇️ Angry guy wants to watch YouTube video, so he turns on his pc via his input. He boots up the computer and using his client and his router (I didn’t put it in the video sorry) sends a query to the internet which then sends a response to a Web server, In this case, YouTube. The response then goes back through the internet and back to his client which pulls up YouTube. Then using the YouTube server, he sends a search query for Michael P! The servers then respond to his search query, the video results show, Angry guy clicks and his input gets sent back to his pc. Sadly he wasn’t using a vpn and used the same password on all of his accounts. So, while angry guy was distracted by his video, the attacker secretly hacks his YouTube account. Attacker gets a hold of his email then sends him a download that looks very “legitimate”. Unfortunately, it was hiding a very dangrous trojan called “”, however, since it was disguised as a legitimate program, windows defender said calmly to your client “This is a safe file :)”, your pc on the other hand says to its antivirus, “YOU DUMB BIMBO IM LITERALLY DYING!” The trojan then spreads like wildfire! Corrupting and destroying your personal files and the system, all the while collecting your Bank Info, IP address, and registry keys on your system. The virus then replicates and gets sent to your friends and before you know it, people worldwide were infected with the trojan, “”. Now I didn’t explain how http requests work because it’s very complex. In order to get a complete understanding of how the computer (client) and the web servers communicate. You need to learn how http sockets and requsts work, this is a decent explanation I hope you'll enjoy this video! Thank's for watching!!! #trojanhorse #virus #computer #education #yahoo #malwarebytes #malware #explained

Share with your friends

Link:

Embed:

Video Size:

Custom size:

x

Add to Playlist:

Favorites
My Playlist
Watch Later