Home
Search results “Cryptovirology applications of statistics”
Computer virus
 
31:30
A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include seeking profit, desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore artificial life and evolutionary algorithms. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 153 Audiopedia
Computer viruses | Wikipedia audio article
 
51:59
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Computer_virus 00:03:36 1 Historical development 00:03:46 1.1 Early academic work on self-replicating programs 00:05:38 1.2 First examples 00:12:18 2 Operations and functions 00:12:28 2.1 Parts 00:12:59 2.1.1 Infection mechanism 00:13:24 2.1.2 Trigger 00:14:01 2.1.3 Payload 00:14:38 2.2 Phases 00:14:59 2.2.1 Dormant phase 00:15:47 2.2.2 Propagation phase 00:16:31 2.2.3 Triggering phase 00:17:00 2.2.4 Execution phase 00:17:28 3 Infection targets and replication techniques 00:18:08 3.1 Resident vs. non-resident viruses 00:19:11 3.2 Macro viruses 00:20:20 3.3 Boot sector viruses 00:20:44 3.4 Email virus 00:21:31 4 Stealth techniques 00:23:16 4.1 Read request intercepts 00:25:47 4.2 Self-modification 00:27:23 4.2.1 Encrypted viruses 00:29:57 4.2.2 Polymorphic code 00:32:09 4.2.3 Metamorphic code 00:32:57 5 Vulnerabilities and infection vectors 00:33:08 5.1 Software bugs 00:33:52 5.2 Social engineering and poor security practices 00:35:12 5.3 Vulnerability of different operating systems 00:37:32 6 Countermeasures 00:37:41 6.1 Antivirus software 00:42:59 6.2 Recovery strategies and methods 00:44:17 6.2.1 Virus removal 00:46:35 6.2.2 Operating system reinstallation 00:48:13 6.3 Viruses and the Internet Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.8111482266993544 Voice name: en-AU-Wavenet-A "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include seeking profit (e.g., with ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms.Computer viruses currently cause billions of dollars' worth of economic damage each year, due to causing system failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems. As of 2005, even though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.The term "virus" is also commonly, but erroneously, used to refer to other types of malware. "Malware" encompasses computer viruses along with many other forms of malicious software, such as computer "worms", ransomware, spyware, adware, trojan horses, keyloggers, rootkits, bootkits, malicious Browser Helper Object (BHOs), and other malicious software. The majority of active malware threats are actually trojan horse programs or computer worms rather than computer viruses. The term computer virus, coined by Fred Cohen in 1985, is a misnomer. Viruses often perform some type of harmful activity on infected host computers, such as acquisition of hard disk space or central processing unit (CPU) time, accessing private information (e.g., credit card numbers), corrupting data, displaying political or humorous messages on the user's screen, ...
Views: 6 wikipedia tts
Virus (computing) | Wikipedia audio article
 
40:53
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Computer_virus 00:02:46 1 Historical development 00:02:56 1.1 Early academic work on self-replicating programs 00:04:23 1.2 First examples 00:09:30 2 Operations and functions 00:09:40 2.1 Parts 00:10:06 2.1.1 Infection mechanism 00:10:26 2.1.2 Trigger 00:10:57 2.1.3 Payload 00:11:28 2.2 Phases 00:11:46 2.2.1 Dormant phase 00:12:25 2.2.2 Propagation phase 00:13:01 2.2.3 Triggering phase 00:13:25 2.2.4 Execution phase 00:13:49 3 Infection targets and replication techniques 00:14:22 3.1 Resident vs. non-resident viruses 00:15:12 3.2 Macro viruses 00:16:07 3.3 Boot sector viruses 00:16:28 3.4 Email virus 00:17:07 4 Stealth techniques 00:18:29 4.1 Read request intercepts 00:20:26 4.2 Self-modification 00:21:41 4.2.1 Encrypted viruses 00:23:41 4.2.2 Polymorphic code 00:25:23 4.2.3 Metamorphic code 00:26:01 5 Vulnerabilities and infection vectors 00:26:11 5.1 Software bugs 00:26:47 5.2 Social engineering and poor security practices 00:27:50 5.3 Vulnerability of different operating systems 00:29:39 6 Countermeasures 00:29:48 6.1 Antivirus software 00:33:52 6.2 Recovery strategies and methods 00:34:54 6.2.1 Virus removal 00:36:41 6.2.2 Operating system reinstallation 00:37:58 6.3 Viruses and the Internet Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.9329382035375963 Voice name: en-AU-Wavenet-B "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include seeking profit (e.g., with ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms.Computer viruses currently cause billions of dollars' worth of economic damage each year, due to causing system failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems. As of 2005, even though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.The term "virus" is also commonly, but erroneously, used to refer to other types of malware. "Malware" encompasses computer viruses along with many other forms of malicious software, such as computer "worms", ransomware, spyware, adware, trojan horses, keyloggers, rootkits, bootkits, malicious Browser Helper Object (BHOs), and other malicious software. The majority of active malware threats are actually trojan horse programs or computer worms rather than computer viruses. The term computer virus, coined by Fred Cohen in 1985, is a misnomer. Viruses often perform some type of harmful activity on infected host computers, such as acquisition of hard disk space or central processing unit (CPU) time, accessing private information (e.g., credit card numbers), corrupting data, displaying political or humorous messages on the user's screen, ...
Views: 15 wikipedia tts