This is very simplified, so it’s not precise. @SENTRY456123’s video, gave me an idea and Trojans are my favorite types of viruses :)
~
What’s a Trojan?
Trojans disguise themselves as legitimate programs, then basically pull a bait and switch and the damage can range from being a general nuisance, to straight up stealing your identity! They can disguise themselves pretty well, so they can remain on your system for months without you knowing. In my experience, windows defender sucks. You should buy a good antivirus like Mcafee or, if you don’t want to pay 20 bucks a month, you can download Malware bytes! It’s free and its very decent.
What I explained in the video because this is pretty confusing |
|
⬇️
Angry guy wants to watch YouTube video, so he turns on his pc via his input. He boots up the computer and using his client and his router (I didn’t put it in the video sorry) sends a query to the internet which then sends a response to a Web server, In this case, YouTube. The response then goes back through the internet and back to his client which pulls up YouTube. Then using the YouTube server, he sends a search query for Michael P! The servers then respond to his search query, the video results show, Angry guy clicks and his input gets sent back to his pc. Sadly he wasn’t using a vpn and used the same password on all of his accounts. So, while angry guy was distracted by his video, the attacker secretly hacks his YouTube account. Attacker gets a hold of his email then sends him a download that looks very “legitimate”. Unfortunately, it was hiding a very dangrous trojan called “”, however, since it was disguised as a legitimate program, windows defender said calmly to your client “This is a safe file :)”, your pc on the other hand says to its antivirus, “YOU DUMB BIMBO IM LITERALLY DYING!” The trojan then spreads like wildfire! Corrupting and destroying your personal files and the system, all the while collecting your Bank Info, IP address, and registry keys on your system. The virus then replicates and gets sent to your friends and before you know it, people worldwide were infected with the trojan, “”.
Now I didn’t explain how http requests work because it’s very complex. In order to get a complete understanding of how the computer (client) and the web servers communicate. You need to learn how http sockets and requsts work, this is a decent explanation
I hope you’ll enjoy this video! Thank’s for watching!!!
#trojanhorse
#virus
#computer
#education
#yahoo
#malwarebytes #malware #explained
1 view
366
137
6 months ago 00:00:55 1
How Trojan virus works #memes #brainrot #pc
7 months ago 00:00:55 1
How Trojan Horse Virus Works
12 years ago 00:03:01 37
Trojan Condoms How To Use A Condom
4 years ago 00:03:01 10
Trojan - How to Use a Condom narration
11 years ago 00:01:18 516
Trojan Mailing
6 years ago 00:11:55 32
Trojan horse paracord bracelet
10 months ago 00:05:21 1
How to Remove Trojan:Win32/Wacatac.B!ml? [ Easy Tutorial ]
10 months ago 00:05:16 1
How to Remove Trojan:Win32/Casdet!rfn Virus? [ Easy Tutorial ]
8 months ago 00:05:05 1
How to Remove Trojan:Win32/Vindor!pz? [ Easy Tutorial ]
10 months ago 00:05:21 1
How to Remove Trojan:Script/Phonzy.B!ml? [ Easy Tutorial ]
7 years ago 00:05:43 3
Trojan Warrior Realism Tattoo - education how to tattoo.
1 year ago 00:48:07 1
Behold A Trojan Horse!
2 years ago 00:00:53 1
Trojan Horse Paracord Bracelet #shorts
9 months ago 00:05:08 1
How to Remove Trojan Win32 Occamy virus? [ Easy Tutorial ]
5 years ago 00:09:00 1
The Golden Apple of Discord (How The Trojan War Began) (Greece)
2 years ago 00:15:53 1
How to Create Trojans Using Powershell
6 years ago 00:08:23 152
Как написать вирус шифровальщик на C#/How to make a trojan encoder virus with C#
2 years ago 00:04:29 1
How a Hacker Could Create a Trojan PDF for Macs Using AppleScript, Part 1
9 years ago 00:08:03 4
Rust Turret Base Design - Trojan
1 year ago 00:02:46 1
Malware: Difference Between Computer Viruses, Worms and Trojans