How Does Antivirus Software Work And How To Evade It
Vložit
- čas přidán 23. 08. 2016
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Věda a technologie
Remember to subscribe to the channel so that you can be kept abreast of the latest cybersecurity tutorials.
@Boot Hat takes you an hour to remove a virus that has already executed its mission?? On the other hand, thats if you know you have been infected lol
@Boot Hat , if the train is heading to Disney land, why not? no one is attacking you man. I was only sharing an opionion
@Boot Hat you do anything with the virus after studying it ?
What do you mean by checking hash signature? How exactly it works?
Suppose i have a virus file and hash value is some "xxxxxxx", so to change the hash value i have to change only a LETTER in virus file?
How to evade it?
Some people are here for the wrong reasons.
I'm not... I have a legit app and these f*cking stupid AVs are picking it up as malware. 4 of them in virustotal. I don't unserstanf
Very good. A great explanation.
Sir we can use viruses as security purposes
Wow your videos are very interesting! If i may ask, where did you learn all of this?
hi Kushan, thank you for watching the videos, I hope they are valuable
to you. As a start, you can browse computer science curriculum and study
those content from there. This will provide you the fundamentals to
understanding technology. After which, you may branch towards other
niche area of technology like Internet of Things, Network, and for this
instance, Security. It will take a while to learn, but it can be
learned.
Sir please guide me I wanna learn hacking so from where should I start
Ok, how hard is it to try to get rid of a rootkit?
Hi, can i use resource hacker to alter a source code or maybe obfuscate the code with using an obfuscator ????
Have not used it before, but I would presume so. Will try it out.
best explanation I heard yet.
Welcome!
this is a great content
Hi it help me lot.... I have 4 daught, will u ples clear me?
1. How antivirus software auto update when i on my internet? (ie. i dont click for update)
2. When i install any software it has a key/product key, how it work from remote?
3.Virus or hacker can access my pc its clear from u but how they carry my data or destroy data?
4. Its may be funny to u but still i want to know how a antivirus code or any software code embedded on a cd/dvd/ which we collect from stores.
Looking for reply...
I know it late but here is your answer
1 aniti virus has a connection all the time
2 program connect to the company server to approve the key
3 hacker access ur pc and act like you in every aspect
4 no one uses CDs now xD
I don't use any security software not even widows defender, I have separate partition for windows 10 witch backup with Macrium, another partition for all my personal data, with backup as well, I figure if something go wrong, I just restore them, all my backups are multiple copies and safely store offline on removable drives, appreciate any advice.
Are you not concerned about someone exfiltrating your data?
All my personal sensitive data are encrypted@@navr1111111111111111
What can you do with a zero day exploits source code?
You can exploit systems without getting detected.
That's awesome 😁
Please the same video about android antiviruses
How does an antivirus sandbox/quarantine viruses?
By not allowing the virus to go into the file system or memory.
Hello sir what is exactly signature ?? . How signature will be identified???
Values in executable files, in files linkage
signature is simply the same pattern source code
Quarantine .. a wird we all learned by now
I thought viruses needed manual execution and worms can self propagate, meaning they are different things.
How can learn hacking?
still amazing even it's has been 2 years lmao
If i write this code:
:A
start
goto A
and save it as a .bat
did i just create a virus? if so, what type?
It is .bat source code that loops infinitely to exhaust computer memory forever. This the first security code one learns as programmer...
@@skhumbuzocele1330 it won't exhaust memory, it will loop indefinitely and hang the shell, and in my entire 4 year programming career I never saw such "security", it's not a security nits just infinite loop and can't damage your PC
@@ishdx9374 What about this cpp?
int main()
{
while(1 > 0){
int* m = new int;
}
return 0;
}
@@boom5935 all the does is create infinite int var this will just lag the shell.
@@sindhurnair8192 It will cause the computer to run out of memory, then the computer will shutdown
POV: your here after reading Updater (manwha)
Oh bhai thodi hindi bhi bol le yr we can't understand anything that 's why we are here to understand the concept
Didi wo Chinese hai
This antivirus software “www just fanet” (Google it) was unveiled in 1993 and I have been utilizing it since that time. I`ve never endured and virus episodes that this software program was not able to protect my system from! I salute the technical team associated with this software that is exerting massive effort to keep hackers from intruding our computers and gadgets!
It's a scam, this "antivirus" is itself a virus.
♾️
mahl-ware for mahl-icious files.