Every Type of Computer Virus Explained in 8 Minutes
Every famous type of PC virus gets explained in 8 minutes!
Join my Discord to discuss this video:
/ discord
Subscribe and activate the bell!
💼 Business Mail: operamp4@gmail.com
- TIMESTAMPS -
0:00 Malware
0:17 Virus
0:51 Worm
1:28 Trojan
1:59 Malvertising
2:27 RAT
2:44 Backdoor
3:00 Rootkit
3:36 Spyware
3:53 Keylogger
4:07 Ransomware
4:28 Fileless Malware
4:49 Adware
5:09 RAM Scraper
5:19 DDoS Attack
5:44 Browser Hijacking
6:11 Cryptojacking
6:29 Rogue Security Software
6:42 Phishing
7:09 Hybrid Malware
7:22 Brute Force Attack
7:47 Wiper
7:57 Social Engineering
- SOURCES -
en.wikipedia.org/wiki/Malware
en.wikipedia.org/wiki/Compute...
en.wikipedia.org/wiki/Compute...
en.wikipedia.org/wiki/Trojan_...)
www.techtarget.com/searchsecu...
en.wikipedia.org/wiki/Rootkit
www.malwarebytes.com/backdoor
en.wikipedia.org/wiki/Keystro...
www.malwarebytes.com/keylogger
en.wikipedia.org/wiki/Spyware
www.malwarebytes.com/spyware
en.wikipedia.org/wiki/Ransomware
en.wikipedia.org/wiki/Fileles...
en.wikipedia.org/wiki/Adware
en.wikipedia.org/wiki/Memory-...
www.checkpoint.com/cyber-hub/...
en.wikipedia.org/wiki/Malvert...
en.wikipedia.org/wiki/Denial-...
en.wikipedia.org/wiki/Browser...
en.wikipedia.org/wiki/Cryptoj...
en.wikipedia.org/wiki/Rogue_s...
en.wikipedia.org/wiki/Phishing
en.wikipedia.org/wiki/Brute-f....
en.wikipedia.org/wiki/Wiper_(....
en.wikipedia.org/wiki/Social_...)
- DISCLAIMER -
Do not use this video as your only source of information. This video is for entertainment/edutainment purposes, and some information could be too oversimplified or incorrect. This channel's goal is to spark your curiosity and let you do your own research on these topics. I'm not a cybersecurity expert.
Пікірлер: 1 100
Sending this to my grandmother
@bpop2148
Ай бұрын
Haha good one 😂
@verywarriorcat
Ай бұрын
She will get another virus opening this video
@Envy-Animations
Ай бұрын
Lol
@verywarriorcat
Ай бұрын
She will get another one trying to open a laptop
@jlopez4889
Ай бұрын
So she could more efficiently get viruses? Genius
When you open a pirated game and the cmd window appers for a split second: 🤨
@juggged
Ай бұрын
😂😂😂😂😂
@billyjohnson3819
Ай бұрын
Heart skips a beat when that happens.
@JohnathanJohaisen
Ай бұрын
What site u use
@OlympusGames-zv2rs
Ай бұрын
@@JohnathanJohaisen TotallyNotaVirus.Dox
@indig0283
Ай бұрын
@@JohnathanJohaisenobviously shitty one
Have you heard of the hacker that escaped the cops, they say he ransomware far away
@A_Professional422
Ай бұрын
The 36 winged roach will find you
@gnimag6674
Ай бұрын
lol you got me
@Fasteroid
Ай бұрын
lol
@blast_processing-music_disc
Ай бұрын
😂
@falonsound
Ай бұрын
Cybersec comedy gold 🥇
The worst thing is when you delete a computer virus but then your pants start slipping
@liam_si
Ай бұрын
huh🤨
@V4P0RW4V3.
Ай бұрын
@@liam_si iykyk
@_ajf
Ай бұрын
Lmao elite reference
@fr0g_pog
Ай бұрын
i was searching around the internet
@superteaman1456
Ай бұрын
Damn didn’t think anyone remembered that meme lmao
how to give 400k internet users anxiety in 8 minutes
@HikariSakai
7 күн бұрын
You'll be fine
@Hot_Grill43
6 күн бұрын
Hello your computer has virus
@CheeserMcDanler
6 күн бұрын
If youre not stupid or 70+ years old youre not gonna get a virus
@ryl4nn
2 күн бұрын
@@HikariSakaihappened to me.. I got a rat and they controlled my pc tryna access my gmail. Luclikly I managed to factory reset it before they could do anything bad
@Asfgxff
16 сағат бұрын
*Windows users.
Video idea: Every Martial arts styles explained. Love all of your videos!
@luqcrusher
Ай бұрын
Great idea!
@Pupper626
Ай бұрын
Cool idea! I did Taekwondo at one point!
@Agriz1210
Ай бұрын
@@Pupper626same here with Karate
@directorofnolearning
Ай бұрын
@@Agriz1210 But there are lots of karate styles, so many you could make an entire video about them.
@Agriz1210
Ай бұрын
@@directorofnolearning I now have the sudden urge to learn all of the styles of karate in order to get the platinum trophy for karate
I'd like to add 'spearphishing' to the list, where phishing attacks are generally sent to a demographic or pool of targets, spearphising is tailored to an individual, and typically magnitudes harder to catch than a typical phishing attack. Love the video :)
@encryptify3625
Ай бұрын
And whale phishing, which is spear phishing but specifically targeting high ranking members of an organization
@creammando
Ай бұрын
It goes into the group of phishing attacks so its not really needed to be put in
@Kitty-xi1sb
Ай бұрын
@creammando I mean, a good portion of the stuff in the video falls under malware
@creammando
29 күн бұрын
@@Kitty-xi1sb yea but malware is too general and have many different types but different types of phishing are very similar so spearphishing doesnt need to be put on the list because its just phishing for a specific person
@garylove2836
10 күн бұрын
They are a few malware terms here that are not pursuant to the Comptia rules.
I find computer viruses so intriguing. I’ve been testing malware in controlled environments since my late teens!
@TheBaconInator.
Ай бұрын
Same! I find malware interesting. My dad owns a small computer repair business and he sees all sorts of malware
@acegaming_yt3594
Ай бұрын
Omg it’s you! I love watching your videos! Viruses are very intriguing and I hope to never accidently get one
@superdeme2681
Ай бұрын
IM A FAN PLEASE REPLY
@SamiPlays_Stuff
Ай бұрын
OMG CRYPTO NWO!!!
@box9489
Ай бұрын
Hi @CryptoNWO , I really love ya videos where you absolutely torture your laptop/computer
For some reason I expected there would be a sponsored segment promoting some antivirus software or a VPN.
@user-kt8fk2li7j
Ай бұрын
me too kkkkk
@misael64
Ай бұрын
@@user-kt8fk2li7j ⚠🚨 BRASILEIRO DETECTADO
@Daguy124
Ай бұрын
Same
@misael64
Ай бұрын
@@user-kt8fk2li7j 🚨 BRASILEIRO DETECTADO 🚨
@misael64
Ай бұрын
@@user-kt8fk2li7j ⚠️ BRASILEIRO DETECTADO ⚠️
Love how diverse these topics are
@kormannn1
Ай бұрын
Is zip bomb a trojan?
@mihailmilev9909
Ай бұрын
@@kormannn1hmmm
@mihailmilev9909
Ай бұрын
@@kormannn1....
@mihailmilev9909
Ай бұрын
@@kormannn1....
@mihailmilev9909
Ай бұрын
148.2.12h7h
4:42 i really like how the hacker has a horrendous posture
@Soundwave1752
Ай бұрын
Bro fr said "Ima be a camel"
@JihadGuy
Ай бұрын
Well since the hacker is an actually HACKER he probably spend years on their computer like discord Mods..... except he showers and eats less.
@apchistuz
21 күн бұрын
His monitor and keyboard are floating
@JoeBartholomewTheThird
17 күн бұрын
just like in real life, its accurate
Video idea: every military rank (general, lieutenant) explained in 8 minutes Edit: sorry I know basically nothing about military
@Alexander.....
Ай бұрын
Why 8 minutes
@LeZylox
Ай бұрын
Boring
@Eagle3302PL
Ай бұрын
Wouldn't work as even within NATO the ranks and associated responsibility can vary wildly.
@edwuano7
Ай бұрын
this is a cool idea
@theEWDSDS
Ай бұрын
seniority can vary a lot between countries, and even between branches. For example, a lieutenant in the navy ranks higher than one in the army.
I'll collect them all like thanos
@F16-A-ADF
2 күн бұрын
😂
@AnUnknown_Account
2 күн бұрын
rip
This is actually pretty scary. I didn't know there were so many
@june_senpai9846
Ай бұрын
There is way more sub-terms and more specialized attacks both hardware and software
@OlympusGames-zv2rs
Ай бұрын
The last one is the one that sounds the mildest but it's quite the opposite. Quoting another guy, imagine you work at a high end software developing agency. At lunch, someone casually approaches you and says "hey I'm hungry but I don't know the place yet, can you recommend me some good place to eat?" While it sounds like an innocent question, you're pretty much telling him what places you and your colleagues go for lunch, and where he can find potential targets for whatever devious things he wants to do.
@gabor6259
Ай бұрын
@@OlympusGames-zv2rs Or imagine that the guy just leaves a USB key on a table. Someone will be like "what is this USB", they put it in a computer but there's malware on the USB.
@creammando
Ай бұрын
@@gabor6259 thats actually a real attack which is concerning
@luckyassassin1
Ай бұрын
There's many more sub types and more are likely being created as we speak. Technology advances at a rapid pace so there's likely new ones being developed. Cyber security is a constant cat and mouse game.
Test: starts in 30 minutes and i haven’t studied. Me asf: all computer viruses explained
@RegularHorizon
Ай бұрын
Bruh moment
@EgirlWarume
8 күн бұрын
Same wtf
6:34 POV mcaffee
@marnidy
25 күн бұрын
Omg this is so true, it actually happened to me once
@archishmandhiman2234
19 күн бұрын
No, McAfee is Not that bad
@dontsubtome2369
16 күн бұрын
It is installed it my security by default in my phone
@blackmeninsideyou
14 күн бұрын
fr
@KaysPlushVideos
2 күн бұрын
Fr
Ain't no way the hacker using a keylogger on a gamer, the gamer will crash the hacker's computer faster than he can react 💀
@PhantomChaos76
11 күн бұрын
Keylogger vs average DMC player
@Ch1zmech01
7 күн бұрын
Keylogger vs average fnf player
@voided_sun
Күн бұрын
Keyloggers steal video game accounts all the time, what u talkin about
@0x1F600
Сағат бұрын
Wasdwawawadqwawadwasdwawadwasd
Im getting increasingly paranoid of getting hacked
@creammando
Ай бұрын
dont worry just dont do stupid things and you'll be fine
Correction on rootkit: Rootkits themselves are not inherently designed to give a malicious actor remote access to a computer, but can do so. Rootkits are designed to be stealthy and concealed, and usually are used to protect other pieces of more specialized malware (like keyloggers) from traditional security measures. The term "root" in rootkit is named after the "root" permission level of unix-based operating systems (administrator/system on windows). Rootkits usually operate at ring 0 (kernel) and can be very difficult to detect, but some are only run in the userspace. Some special types of rootkits can overwrite the master boot record (mbr) or hijack other parts of the boot process. This type of rootkit is called a "bootkit" and be very difficult to detect and remove, even surviving drive wipes. While technically a rootkit can be bundled with a RAT or have RAT functionality, rootkits are often designed to maintain high permission levels on a computer, as well interfere with standard security measures. As such, rootkits are nasty pieces of malware which can bring great harm to a system or network if designed correctly. No hate! Just wanted to clear this up! :)
@sandwan4845
6 күн бұрын
he said that in the video
@justsomeweirdduck3311
6 күн бұрын
@@sandwan4845 no, he said rootkits provide remote access, not all rootkits do. They gain full control over a computer.
I'm legitimately concerned about my internet searches now...
@sausageIsAnAbomination
Ай бұрын
god me too 💀
@blurzpg3d
22 күн бұрын
Dont worry at the end of the day we live on a floating rock
@Dr.PeterLaFleur
19 сағат бұрын
We are noone anyway, big people have the access this way or another
This is honestly more useful than the "hacking" software you see in most Cyberpunk games.
@PaintMyMind
Ай бұрын
Sure
@TheRealName7
Ай бұрын
Ew woke cyberpunk game
@Tyri-wz9mx
10 күн бұрын
@@TheRealName7I mean it’s set in the future
Amazing video! I think its worth mentioning that rootkits often wont target antiviruses at all, as many modern day antiviruses have anti hijacking detection built in. More often than not rootkits disguise themselves as other regularly installed programs or modifying the task manager / process viewer to skip the memory space where the rootkit resides, hiding it from both user and antiviruses. 10/10 video tho
@justsomeone282
Ай бұрын
some antivirus has a different view of the processes than windows will show like they have their own special viewer that can't be modified!!
@paulstelian97
Ай бұрын
@@justsomeone282The only unmodifiable view is one done via a kernel module looking at the data structures directly. Sysinternals RootkitRevealer demonstrates the technique.
Cant wait for ramsonware people to hack my pc like "heh heh time to earn bank" then realize all I have is useless images of memes that i wont miss being encrypted
The tidbit that ads themselves are an inherent security vulnerability is kinda funny
5:43 These softwares are horrifying. One time I tried to get an autoclicker but clicked the fake download link(I didn’t have an adblocker at the time) and this fake software installed an entirely new taskbar, deleting the old one! Huge search engine bar, with ads popping up ON THE AREA WHERE THE TASKBAR WAS!!! This incident will never not scare me.
@souyakawata9449
26 күн бұрын
had the same shit, easiest virus to deinstall, suddenly yahoo popped up and yeah thats the moment the virus got backshots from anti malware
@jeffersonchau7171
9 күн бұрын
@@souyakawata9449you got that yahoo browser hijack as well? I had some fun trying to figure that out but luckily I was able to find a anti malware software to scan my computer and it went away after. Not that many problems since
I dont know why but hearing about computer viruses gives me some fear
This is actually a nice run through of everything. Well done mate!
Word of advice about rat viruses (from experience) If it's the direct kind and not the stealthy type, and you catch the hacker in the act, disable your network and boot the computer in safe mode until you find where the virus is. Some systems will show recently downloaded and modified files so it should be rather easy to locate the rat as I had to do that
@KawaiiKemono
15 күн бұрын
What about GOAT files?
@KillerSkullX
5 күн бұрын
@@KawaiiKemonoMD
Ohh so that's why my old PC's cursor was moving on its own
I like how well you interact with your community ❤ and make their ideas come true
You might also wanna know that DDoS stands for Distributed Denial of Service. In this example, it show rather a DoS, since the Distributed warrant flooding from lots of other devices (in particular to make tracing harder)
@creammando
Ай бұрын
DoS is a single server flooding requests to a target and DDoS is multiple servers flooding requests to a target (most of the time being part of a botnet) and no its not to make tracing harder its to make the denial of service more effective especially against strong servers.
ive been watching your videos since the beginning, and your artstyle has gotten very good! great video!
i once had a virus that deleted every direct access on my computer and didn't let me use the search feature for searching programs, it happened everytime my computer was turned off, so i did a factory reset (i think they're called that) on my computer and it was gone, but now after like 1-2 years after the incident now my command thing randomly opens up for a split second and then closes
Great channel.. gets to the point immediately..subscribed :)
Thanks for getting right to the point I was expecting a 2 minute intro or something like that but it just started on the point of the video, thanks
i literally just got down with a playthrough of a game ABOUT viruses. what a coincidence! edit: the game was plague inc. edit 2: so i found a game on steam called "Entodrive". it's about computer viruses. gonna play that soon.
@glomerofthe7rings289
Ай бұрын
what was the game?
@BongoThe
Ай бұрын
@@glomerofthe7rings289plague inc.
@Nick-the-fox
Ай бұрын
@@glomerofthe7rings289 Kinitopet?
@joe56188
Ай бұрын
I want to know the game too
@dandrecollier800
Ай бұрын
Whats the game's name?
I feel like keylogging could be stopped by typing into multiple fields at once, one part at a time, randomizing how many characters in each part, and adding other irrelevant data that you delete anyways.
Me: why my neck hurts? Also me: 4:48
interesting video! I like how you use paint to explain things
According to the way you described spyware, google is spyware because all the things you described fits google perfectly
I need this stuff to make a cybersecurity ontology for a lvl 7 postgrad module (Ontologies and knowledge bases). what a win.
Imagine if this video had a computer virus
This explains it soo good & has a nice length of time :) Love it!
I love your videos. I'm actually learning stuff from you, thanks. You should do a video based off of diseases and how they harm/kill
3:29 One observation though, the Kernel is not in the OS, the OS is in the kernel
@creammando
Ай бұрын
No, the Kernel is IN the Operating System
@logiebogieboo_curr
Ай бұрын
No, the kernel is is the BIOS (motherboard)
@creammando
Ай бұрын
@@logiebogieboo_currI understand you got confused with the bios and the kernel but they aren’t the same thing the kernel is located in the OS meaning that it’s stored in the storage drive not the motherboard
@user-jk5bg6mh5q
23 күн бұрын
@@creammando It is not. You can try it yourself honestly. Make a dual boot system, install a rootkit and you will notice that the rootkit has access to both operating systems.
@creammando
23 күн бұрын
@@user-jk5bg6mh5q dual booting is a different story, i dont know much about how it works but im assuming both oses are connected in some way but thats not a good example, you can search it up, and at least do research like i did to verify your claims because im 100% sure the kernel is in the OS just like how kernel drivers are in the OS so if you wipe out the os and install a new one the kernel drivers go with it since its inside of the OS
My heart stop beating when my computer (almost) got diagnosed with 5 entire freaking viruses just because I wanted to get an extension to hide my mouse pointer for my game and I knew dang well I had to renew the McAfee crap but I guess I didn't need to (So I didn't)
well explained like always.
i knew ads were anoying but... this is nr 1 reason to get rid of ads
@creammando
Ай бұрын
not all ADs are malicious lmao
@niklashost7261
Ай бұрын
@@creammando ok
Wouldn't it make sense to call this "Every Type of Computer Malware" instead? Or maybe "Cyber Attack".
@connorchil
Ай бұрын
I agree with changing it to malware instead of virus but I don’t think there are enough cyber terms to say “cyber attacks” which was also my first thought after hearing DDoS
@Moggus1
Ай бұрын
Virus is just a blanket term
@Leooocollins
Ай бұрын
Cyberattacks is about right here, 'malware' applies where the attack is some form of software e.g. worm/virus/trojan, pretty much everything before RAM scraping. Most of the things afterwards are either network-based or just methods to describe an attack but not really an attack itself. Social engineering is sort of an umbrella term for other things mentioned in the video that play on the human and may/may not lead to malware infection i.e. phishing, adware, malvertising. Regardless of any pedantic wording necessities, vid's accurate :)
@indig0283
Ай бұрын
I think "computer virus" is a more understandable term for the average user
the fact that the app zoom has a rat in it, literally with the user’s permission someone can control your mouse, etc (its a feature idk if its still there or not)
@creammando
Ай бұрын
No lol thats not a rat, a RAT (explained in the video btw) is a Remote Access Trojan that gives the attacker access to your computer (shell, screen view or both) and they can do whatever they want your pc as programmed into their RAT, for example some RATs dont have it programmed where they can control your mouse, also zoom cant control your mouse and stuff without your permission, that would be illegal and would be detected by antiviruses
1:09 THERE WAS VERY SCARY WORM THAT JUST: -FOUND A COMPUTER -GETS INSIDE -BREAKS IT WITHOUT BEING AS A LIST AND WITHOUT OPENING IT -REPLICATES ITSELF -SENDS TO OTHERS -REPEATS
as a cybersecurity major i loved this!!! subscribing for more videos, (hopefully more security related videos)
you should do types of music next
Just learned about the Linux xz backdoor, and this appears in my subscription feed.
Really big thanks for making this video, now I learned more about how to be aware of the internet.
Excellent explanation. Now i know some stuff that we didn't know
New fear unlocked
1:44 bro was personal with that one 💀💀
@logiebogieboo_curr
Ай бұрын
Looks like a girl that uses Instagram 24/7
@ComputerBoyTheEntertainer
25 күн бұрын
nah- ima make a pop-up ad out of this-
@weidie2moro
25 күн бұрын
@@ComputerBoyTheEntertainer why
@ComputerBoyTheEntertainer
25 күн бұрын
@@weidie2moro just for my upcoming pop-up generator >:)
Very high quality video!
Maybe 5 of these aren’t technically viruses, but I’m happy you added these tools and processes to inform the general public. You explained them all pretty well and precise, too!
SQL injection: One of the most common ways to get hacked. By not properly sanitizing data sent by a user (such as a search form), an attacker can run arbitrary code on your database.
@thepopeofhell3148
21 күн бұрын
Not that common anymore tbh. Most user inputs are sanitized these days. Still possible though, but past its prime imo
Love your video bro ♥️ I have a video idea where you explain all leaked or pirated movies quality and their comparison 🔥 Plz ✨
great video!
Great video. It would be cool to have the concepts orginized in tree/graph form showing the relations between them like having malware being the root and spyware being one of its children and the keylogger being a child of spyware. It might end up looking weird but idk sounds cool to me.
6:29 Literally tech support scammers in a nutshell
This video is giving my computer a virus, 💀
i once had an encounter with rogue security software that led to me calling a number and downloading a RAT. i never fully got rid of it, but i was so young at the time and it was such a traumatizing experience because i was too afraid to involve my parents.
I like this channel very informative 👍
Video idea: every type of scam Edit: lollll the evaluator made this video some minutes ago
I heard a girl on a KZread video talk about how she got malware on her computer and contacted the person who "made" it I suppose. And he asked for a bunch of money so she could fix it, like how can you destroy someones computer then ask for money? 😔
@ArchoDarko
Ай бұрын
more scamming
@creammando
Ай бұрын
sadly thats how ransomware gangs work
@PhantomChaos76
11 күн бұрын
Definition of ransomware.
Sadly, I was a victim of the web browser virus. I started to use another web browser, and like a few months later, my computer got physical damage, and I erased it, and by the time I repaired it, the virus was gone.
Thanks for the information, I’ll use this later.
An April Fools Day video that is not an April Fools joke?
Video Idea: Every physician specialization of medicine explained
Very cool now I know every computer virus and others!
glad to be on this list
I might have a browser hijacker and possibly adware
How about every type of microorganism, I am so tired of explaining the difference between viruses, bacteria, amoeba etc. to boomers.
@YouChwb
Ай бұрын
Don't worry, in time somebody a lot younger than yourself will be explaining things to you as you dribble onto your bib throughout the day.
@just__an_Owl
Ай бұрын
@@YouChwb boomer detected cry more
@ICR_Producer
18 күн бұрын
Not funny
@YouChwb
18 күн бұрын
Why waste your time on something that nobody gives a flying fook about?
Efficient, I like it. Straight to the point
I’m studying to become an IT technician, and this, believe it or not, actually helps. Thanks!👍
An extra i gathered up: "memeware" malweares that are explicetly malweares and are made for fun and destroy the pc, normaly they destroy the pc when run and give some kind-of warning (an example is memz)
@Never.seen-before.name-
Ай бұрын
So.. *if* i am undersyanding correctly : you are an idiot would count as one?
@creammando
Ай бұрын
but hes trying to explain actual terms
@PhantomChaos76
11 күн бұрын
That's not an extra. You said it yourself, it's a malware.
what if your a hacker and that’s why you know all this?
It's really interesting how connected these things are.
For your informations. I had Trojan problem a lot back when windows xp was a thing. It was affecting EXE files and stopping End Task from working.
Some missing subcategories I noticed: Dos attacks are a more primitive DDos attack that has requests sent by only one client Dictionary attacks are similar to Brute Force Attacks but instead use a list of common codes and pass phrases to guess a password (for example using variants of the word password as it is common to make your password password)
@timah9420
Ай бұрын
DoS attacks are not primitive versions of DDoS attacks. DDoS attacks are a subcategory Denial of Service attacks. DDoS just refers to the attack being distributed among infected/zombie devices. DoS attacks can be sophisticated and exploit vulnerabilities such as improper validation in regular expressions. For instance, if an attacker sends a request that causes a server to process it exponentially, this can cause the service to crash or stop. Hence, it denies service. I'm also not sure why they felt the need to include bruteforce attacks as it is an attack method and not a form of malware.
@autisticandproudsnephew3636
Ай бұрын
@@timah9420 I am aware, I said primitive to simplify the concept. I am still at GCSE level computer science and thus don't feel qualified to truly explain all the specifics of everything, only general concepts.
3:43 How did you know I was watching KZread?? You must be running spyware on my computer!!!1!!1!11!!1!!!!
From politics to religion to cybersecurity. This Chanel just keeps getting better.
video idea: type of oiled up men pls
Windows itself is a spyware lol
Thanks for the windows guide! Now I know all the ins and outs of my system!
Bet this will go viral
7:45 uh? Is he AI?
@imaadhaq540
Ай бұрын
Okay now that I'm focusing on it he 100% doesn't sound real
@PhantomChaos76
11 күн бұрын
What? What part are you talking about? I clicked the timestamp and I don't hear anything "fake"
@imaadhaq540
11 күн бұрын
@PhantomChaos76 on my phone I couldn't hear it, I guess it depends on speaker quality, but there def was a blip. And now that I noticed it it's hard to not notice the fact that he speaks in the most robotic cadence
Thanks for the information now I know what to do to make that bank
Back in the day we doesn't have wifi, and Rouge Security System happened on my dad's phone, so they forced me to go to the laundry to install the specific app lol, instead I played games and told them I removed the virus.
As someone studying cyber security, this really helps. Thanks!
Example of Spyware: TikTok
@wolf-tec
27 күн бұрын
And Instagram
@theusamongus
25 күн бұрын
basically any app can be called spyware because usually they will sell your information to advertisers or governments like tiktok does
@annageyts
24 күн бұрын
nuh uh
@jameson1465
22 күн бұрын
So close yet you are not smart
@protectoman9150
22 күн бұрын
I know full well TikTok is spyware. TikTok does not include spyware. TikTok IS the spyware.
i believe i had an adware on my pc at one point. randomly, and without my permission, it would open a thing for McAfee or whatever, with the worlds smallest close button, only able to be clicked on a certain page. my cousin also had this at one point, and i dont know if my pc is further compromised. thank you a ton for the video, to keep us all safe.
@KillerSkullX
5 күн бұрын
How did you get rid of it I have the same thing. Do you play dead frontier?
doing great keep it up
this was quite interesting coming from a compsci major who just learned systems programming
I love how simple to understand. These are just by watching this video.