Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,570 --> 00:00:08,280
Welcome confidence in building a professional ransomware attack for ethical hacking our youngest baby Mohammed
2
00:00:08,430 --> 00:00:14,820
Amin and I will be your teacher in this course.
3
00:00:14,820 --> 00:00:23,940
In this course we will build or run somewhere with Gaza extension using Java language.
4
00:00:24,660 --> 00:00:28,350
Before I start let me introduce myself.
5
00:00:28,410 --> 00:00:30,780
My name is Gustavo Mohammed Amin.
6
00:00:31,320 --> 00:00:36,710
I am a developer for desktop mobile application and embedded system.
7
00:00:36,840 --> 00:00:45,330
I have master degree in Information System and network and now I am a cyber security researcher.
8
00:00:45,390 --> 00:00:49,320
You can connect with me using your Facebook.
9
00:00:49,320 --> 00:00:59,850
I also provide you my email for your questions and my YouTube channel for more courses.
10
00:01:00,390 --> 00:01:04,610
Prerequisites needed to be successful in this course.
11
00:01:04,620 --> 00:01:14,080
Basic computer skills basic concepts in Java programming a willingness to learn and to be patient.
12
00:01:14,430 --> 00:01:24,240
In this course will be see basic concepts of cryptography proposing an algorithm to encrypt the data.
13
00:01:24,240 --> 00:01:32,130
Implementing this algorithm using his other language sending key encryption automatically into hacker
14
00:01:32,400 --> 00:01:36,490
email after the target runs Java fine.
15
00:01:37,260 --> 00:01:46,980
Implementing the decryption algorithm to decrypt data targets the plain section course in the first
16
00:01:47,250 --> 00:01:47,930
section.
17
00:01:47,970 --> 00:01:54,020
We will take some basics in cryptography and encryption algorithm in the second section.
18
00:01:54,060 --> 00:01:58,740
We will build the Zephyr file for Target side in the last section.
19
00:01:58,770 --> 00:02:07,800
We will build Java desktop application to decrypt the data target tools needed in this course.
20
00:02:08,130 --> 00:02:12,570
We will use nets beans idea to build the project.
21
00:02:12,600 --> 00:02:21,840
Don't forgot to install G Deka Java development kids and Zia e Java runtime environment.
22
00:02:23,700 --> 00:02:28,260
So how this sound on some one fine works.
23
00:02:28,260 --> 00:02:31,880
After the target runs Java fine.
24
00:02:31,920 --> 00:02:41,240
His data will be encrypted and gate encryption is sense automatic in the tracker site.
25
00:02:41,580 --> 00:02:49,460
The targets find an important file to contact the hacker and pay or ransomware.
26
00:02:49,470 --> 00:02:55,740
After that the hacker can give the targets the desktop Java decryption file.
2812
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.