Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,110 --> 00:00:08,610
Continued with types of malware you also have spyware as the name suggests its main purpose is to gather
2
00:00:08,610 --> 00:00:11,250
information and send it back to the attacker.
3
00:00:11,290 --> 00:00:18,330
Well to spy the attackers don't generally want to cause damage directly but want to compromise your
4
00:00:18,330 --> 00:00:25,830
privacy and anonymity based on some agenda that they've got spyware is intelligence gathering malware
5
00:00:26,310 --> 00:00:31,260
corporations and hacker groups create these as well as governments.
6
00:00:31,380 --> 00:00:38,070
You can see the article here of alleged U.S. government spyware from the Telegraph worth mentioning
7
00:00:38,070 --> 00:00:38,760
actually.
8
00:00:38,940 --> 00:00:42,530
Don't get too hung upon the names and classifications of the malware.
9
00:00:42,530 --> 00:00:49,170
By the way that we've gone through these are not strict taxonomies for example a rootkit can also be
10
00:00:49,170 --> 00:00:53,460
a Trojan Horse someone could call spyware virus.
11
00:00:53,460 --> 00:01:00,200
The point is just to understand the variants that exist and the possible purpose of the malware and
12
00:01:00,200 --> 00:01:07,890
other one is and where which some people consider to be a form of spyware is undesirable software.
13
00:01:07,890 --> 00:01:10,410
The forces advertise on you.
14
00:01:10,410 --> 00:01:13,950
There are millions of different variants of this.
15
00:01:14,040 --> 00:01:21,300
One of the most annoying and destructive form of adware is called Kou web search.
16
00:01:21,330 --> 00:01:27,570
You may even encounter it yourself but there's nothing cool about it at all it hijacks your default
17
00:01:27,570 --> 00:01:31,170
search engine it displays ads in the browser.
18
00:01:31,350 --> 00:01:37,770
When you click on links it sometimes takes you to places that it want you to go to instead of where
19
00:01:37,770 --> 00:01:45,450
you want to actually go to and it actively defends itself from being removed and getting rid of it.
20
00:01:45,480 --> 00:01:48,240
So it's particularly hard to shift.
21
00:01:48,240 --> 00:01:54,600
And there are many many variants of it that were affected millions of people when an ad where all malware
22
00:01:54,600 --> 00:01:59,290
takes over your browser in this way is known as browser hijacking.
23
00:01:59,490 --> 00:02:05,130
And you might hear that term more throughout the course you should always pay particular attention when
24
00:02:05,130 --> 00:02:14,580
installing software because often a software install includes optional installs such as this browser
25
00:02:14,580 --> 00:02:16,770
highjacker that we've just mentioned.
26
00:02:16,830 --> 00:02:17,950
So you can see here.
27
00:02:17,970 --> 00:02:25,250
Optional installs and what you've got here is installs that are going to be potential Ad-Aware.
28
00:02:25,650 --> 00:02:28,470
So be very careful what you agree to install.
29
00:02:28,470 --> 00:02:31,500
Always opt for the custom installation and de-select.
30
00:02:31,500 --> 00:02:38,520
Anything that is not familiar especially optional software that you never wanted to download and install
31
00:02:38,520 --> 00:02:39,830
in the first place.
32
00:02:39,900 --> 00:02:44,220
It goes without saying that you should not install software that you don't trust.
33
00:02:44,310 --> 00:02:48,680
Sometimes your device might come with and where pre-installed.
34
00:02:48,690 --> 00:02:56,400
If you're particularly on Lucky One of the worst cases was Lenovo pre-install ING's superficies adware
35
00:02:56,880 --> 00:03:03,250
that only served you add that based on what it knew about you from spying on you.
36
00:03:03,270 --> 00:03:10,970
It also included a self-signed certificate allowing your browser TLR and SSL encryption to be bypassed.
37
00:03:10,980 --> 00:03:17,580
So not very good over and over by our Never bile and over laptop again after that and all the rest of
38
00:03:17,580 --> 00:03:20,770
the things that were never done scare away.
39
00:03:20,890 --> 00:03:27,360
Skyway is a type of social engineering attack to trick a person into believing in a threat that isn't
40
00:03:27,360 --> 00:03:28,520
really real.
41
00:03:28,800 --> 00:03:36,600
So a common example is fake security software claiming that you have malware infections or something
42
00:03:36,600 --> 00:03:37,430
like that.
43
00:03:37,470 --> 00:03:42,810
Often they want you to pay something in order to fix the fake problem.
44
00:03:42,810 --> 00:03:46,050
These scams have been extremely successful.
45
00:03:46,050 --> 00:03:53,840
You can see here personal anti-virus software identifying all these fake their abilities and then is
46
00:03:53,850 --> 00:03:55,070
going to keep popping up.
47
00:03:55,080 --> 00:04:02,160
It's going to keep causing problems on the machine and then people are fooled into paying for something
48
00:04:02,160 --> 00:04:05,390
to remove the fake viruses.
49
00:04:05,520 --> 00:04:08,400
And finally we have this catch all term.
50
00:04:08,520 --> 00:04:12,330
If it's something that you might not have wanted.
51
00:04:12,450 --> 00:04:19,710
These are called potentially wanted programs or pull ups that could potentially be monitored because
52
00:04:19,770 --> 00:04:24,660
the antivirus companies and people the attempt to remove these things aren't quite sure whether you
53
00:04:24,660 --> 00:04:25,880
want them or not.
54
00:04:26,010 --> 00:04:31,350
Most often you don't want them and they're annoying the things bundled them with software.
55
00:04:31,350 --> 00:04:36,090
So again they are often bundling with the software when you install.
56
00:04:36,090 --> 00:04:42,720
So you must make sure when you install software you go to the custom install and make sure you remove
57
00:04:42,750 --> 00:04:44,370
any of these pops.
6178
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.