Every Type of Computer Virus Explained in 8 Minutes

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 พ.ค. 2024
  • Every famous type of PC virus gets explained in 8 minutes!
    Join my Discord to discuss this video:
    / discord
    Subscribe and activate the bell!
    💼 Business Mail: operamp4@gmail.com
    - TIMESTAMPS -
    0:00 Malware
    0:17 Virus
    0:51 Worm
    1:28 Trojan
    1:59 Malvertising
    2:27 RAT
    2:44 Backdoor
    3:00 Rootkit
    3:36 Spyware
    3:53 Keylogger
    4:07 Ransomware
    4:28 Fileless Malware
    4:49 Adware
    5:09 RAM Scraper
    5:19 DDoS Attack
    5:44 Browser Hijacking
    6:11 Cryptojacking
    6:29 Rogue Security Software
    6:42 Phishing
    7:09 Hybrid Malware
    7:22 Brute Force Attack
    7:47 Wiper
    7:57 Social Engineering
    - SOURCES -
    en.wikipedia.org/wiki/Malware
    en.wikipedia.org/wiki/Compute...
    en.wikipedia.org/wiki/Compute...
    en.wikipedia.org/wiki/Trojan_...)
    www.techtarget.com/searchsecu...
    en.wikipedia.org/wiki/Rootkit
    www.malwarebytes.com/backdoor
    en.wikipedia.org/wiki/Keystro...
    www.malwarebytes.com/keylogger
    en.wikipedia.org/wiki/Spyware
    www.malwarebytes.com/spyware
    en.wikipedia.org/wiki/Ransomware
    en.wikipedia.org/wiki/Fileles...
    en.wikipedia.org/wiki/Adware
    en.wikipedia.org/wiki/Memory-...
    www.checkpoint.com/cyber-hub/...
    en.wikipedia.org/wiki/Malvert...
    en.wikipedia.org/wiki/Denial-...
    en.wikipedia.org/wiki/Browser...
    en.wikipedia.org/wiki/Cryptoj...
    en.wikipedia.org/wiki/Rogue_s...
    en.wikipedia.org/wiki/Phishing
    en.wikipedia.org/wiki/Brute-f....
    en.wikipedia.org/wiki/Wiper_(....
    en.wikipedia.org/wiki/Social_...)
    - DISCLAIMER -
    Do not use this video as your only source of information. This video is for entertainment/edutainment purposes, and some information could be too oversimplified or incorrect. This channel's goal is to spark your curiosity and let you do your own research on these topics. I'm not a cybersecurity expert.

ความคิดเห็น • 1K

  • @lilacsilk
    @lilacsilk หลายเดือนก่อน +4512

    Sending this to my grandmother

    • @bpop2148
      @bpop2148 หลายเดือนก่อน +47

      Haha good one 😂

    • @verywarriorcat
      @verywarriorcat หลายเดือนก่อน

      She will get another virus opening this video

    • @Envy-Animations
      @Envy-Animations หลายเดือนก่อน +17

      Lol

    • @verywarriorcat
      @verywarriorcat หลายเดือนก่อน +104

      She will get another one trying to open a laptop

    • @jlopez4889
      @jlopez4889 หลายเดือนก่อน

      So she could more efficiently get viruses? Genius

  • @poisonlight749
    @poisonlight749 หลายเดือนก่อน +2950

    When you open a pirated game and the cmd window appers for a split second: 🤨

    • @juggged
      @juggged หลายเดือนก่อน +62

      😂😂😂😂😂

    • @billyjohnson3819
      @billyjohnson3819 หลายเดือนก่อน +377

      Heart skips a beat when that happens.

    • @JohnathanJohaisen
      @JohnathanJohaisen หลายเดือนก่อน +22

      What site u use

    • @OlympusGames-zv2rs
      @OlympusGames-zv2rs หลายเดือนก่อน

      @@JohnathanJohaisen TotallyNotaVirus.Dox

    • @indig0283
      @indig0283 หลายเดือนก่อน +89

      ​@@JohnathanJohaisenobviously shitty one

  • @Jace_Beleren
    @Jace_Beleren หลายเดือนก่อน +1001

    Have you heard of the hacker that escaped the cops, they say he ransomware far away

  • @jir_UwU
    @jir_UwU 27 วันที่ผ่านมา +157

    how to give 400k internet users anxiety in 8 minutes

    • @HikariSakai
      @HikariSakai วันที่ผ่านมา +2

      You'll be fine

    • @Hot_Grill43
      @Hot_Grill43 วันที่ผ่านมา +1

      Hello your computer has virus

    • @CheeserMcDanler
      @CheeserMcDanler 13 ชั่วโมงที่ผ่านมา

      If youre not stupid or 70+ years old youre not gonna get a virus

  • @CryptoNWO
    @CryptoNWO หลายเดือนก่อน +534

    I find computer viruses so intriguing. I’ve been testing malware in controlled environments since my late teens!

    • @TheBaconInator.
      @TheBaconInator. หลายเดือนก่อน +32

      Same! I find malware interesting. My dad owns a small computer repair business and he sees all sorts of malware

    • @acegaming_yt3594
      @acegaming_yt3594 หลายเดือนก่อน +15

      Omg it’s you! I love watching your videos! Viruses are very intriguing and I hope to never accidently get one

    • @superdeme2681
      @superdeme2681 หลายเดือนก่อน +3

      IM A FAN PLEASE REPLY

    • @SamiPlays_Stuff
      @SamiPlays_Stuff หลายเดือนก่อน +3

      OMG CRYPTO NWO!!!

    • @box9489
      @box9489 หลายเดือนก่อน +4

      Hi @CryptoNWO , I really love ya videos where you absolutely torture your laptop/computer

  • @V4P0RW4V3.
    @V4P0RW4V3. หลายเดือนก่อน +1086

    The worst thing is when you delete a computer virus but then your pants start slipping

    • @liam_si
      @liam_si หลายเดือนก่อน +53

      huh🤨

    • @V4P0RW4V3.
      @V4P0RW4V3. หลายเดือนก่อน +73

      @@liam_si iykyk

    • @_ajf
      @_ajf หลายเดือนก่อน +96

      Lmao elite reference

    • @fr0g_pog
      @fr0g_pog หลายเดือนก่อน +51

      i was searching around the internet

    • @superteaman1456
      @superteaman1456 หลายเดือนก่อน +28

      Damn didn’t think anyone remembered that meme lmao

  • @jrdonat5460
    @jrdonat5460 หลายเดือนก่อน +360

    I'd like to add 'spearphishing' to the list, where phishing attacks are generally sent to a demographic or pool of targets, spearphising is tailored to an individual, and typically magnitudes harder to catch than a typical phishing attack.
    Love the video :)

    • @encryptify3625
      @encryptify3625 หลายเดือนก่อน +20

      And whale phishing, which is spear phishing but specifically targeting high ranking members of an organization

    • @creammando
      @creammando หลายเดือนก่อน +12

      It goes into the group of phishing attacks so its not really needed to be put in

    • @Kitty-xi1sb
      @Kitty-xi1sb 24 วันที่ผ่านมา +2

      ​@creammando I mean, a good portion of the stuff in the video falls under malware

    • @creammando
      @creammando 24 วันที่ผ่านมา +2

      @@Kitty-xi1sb yea but malware is too general and have many different types but different types of phishing are very similar so spearphishing doesnt need to be put on the list because its just phishing for a specific person

    • @garylove2836
      @garylove2836 4 วันที่ผ่านมา

      They are a few malware terms here that are not pursuant to the Comptia rules.

  • @vnrobbie1896
    @vnrobbie1896 หลายเดือนก่อน +1053

    Video idea: Every Martial arts styles explained.
    Love all of your videos!

    • @luqcrusher
      @luqcrusher หลายเดือนก่อน +12

      Great idea!

    • @Pupper626
      @Pupper626 หลายเดือนก่อน +3

      Cool idea! I did Taekwondo at one point!

    • @Agriz1210
      @Agriz1210 หลายเดือนก่อน +1

      @@Pupper626same here with Karate

    • @directorofnolearning
      @directorofnolearning หลายเดือนก่อน +1

      ​@@Agriz1210 But there are lots of karate styles, so many you could make an entire video about them.

    • @Agriz1210
      @Agriz1210 หลายเดือนก่อน +9

      @@directorofnolearning I now have the sudden urge to learn all of the styles of karate in order to get the platinum trophy for karate

  • @deathfire12
    @deathfire12 หลายเดือนก่อน +581

    Love how diverse these topics are

    • @kormannn1
      @kormannn1 หลายเดือนก่อน +4

      Is zip bomb a trojan?

    • @mihailmilev9909
      @mihailmilev9909 หลายเดือนก่อน

      ​@@kormannn1hmmm

    • @mihailmilev9909
      @mihailmilev9909 หลายเดือนก่อน

      ​@@kormannn1....

    • @mihailmilev9909
      @mihailmilev9909 หลายเดือนก่อน

      ​@@kormannn1....

    • @mihailmilev9909
      @mihailmilev9909 หลายเดือนก่อน

      148.2.12h7h

  • @misael64
    @misael64 หลายเดือนก่อน +284

    For some reason I expected there would be a sponsored segment promoting some antivirus software or a VPN.

    • @user-kt8fk2li7j
      @user-kt8fk2li7j หลายเดือนก่อน +2

      me too kkkkk

    • @misael64
      @misael64 หลายเดือนก่อน

      @@user-kt8fk2li7j ⚠🚨 BRASILEIRO DETECTADO

    • @Daguy124
      @Daguy124 หลายเดือนก่อน +2

      Same

    • @misael64
      @misael64 หลายเดือนก่อน

      @@user-kt8fk2li7j 🚨 BRASILEIRO DETECTADO 🚨

    • @misael64
      @misael64 หลายเดือนก่อน

      ​@@user-kt8fk2li7j ⚠️ BRASILEIRO DETECTADO ⚠️

  • @fayflurina3382
    @fayflurina3382 หลายเดือนก่อน +116

    4:42 i really like how the hacker has a horrendous posture

    • @Soundwave1752
      @Soundwave1752 หลายเดือนก่อน +12

      Bro fr said "Ima be a camel"

    • @JihadGuy
      @JihadGuy หลายเดือนก่อน +9

      Well since the hacker is an actually HACKER he probably spend years on their computer like discord Mods..... except he showers and eats less.

    • @apchistuz
      @apchistuz 15 วันที่ผ่านมา

      His monitor and keyboard are floating

    • @JoeBartholomewTheThird
      @JoeBartholomewTheThird 11 วันที่ผ่านมา

      just like in real life, its accurate

  • @wolflegendgaming8420
    @wolflegendgaming8420 18 วันที่ผ่านมา +7

    I'll collect them all like thanos

  • @Envy-Animations
    @Envy-Animations หลายเดือนก่อน +318

    Video idea: every military rank (general, lieutenant) explained in 8 minutes
    Edit: sorry I know basically nothing about military

    • @Alexander.....
      @Alexander..... หลายเดือนก่อน +4

      Why 8 minutes

    • @LeZylox
      @LeZylox หลายเดือนก่อน +1

      Boring

    • @Eagle3302PL
      @Eagle3302PL หลายเดือนก่อน +14

      Wouldn't work as even within NATO the ranks and associated responsibility can vary wildly.

    • @edwuano7
      @edwuano7 หลายเดือนก่อน +3

      this is a cool idea

    • @theEWDSDS
      @theEWDSDS หลายเดือนก่อน +12

      seniority can vary a lot between countries, and even between branches. For example, a lieutenant in the navy ranks higher than one in the army.

  • @Super_Davs
    @Super_Davs 12 วันที่ผ่านมา +20

    Ain't no way the hacker using a keylogger on a gamer, the gamer will crash the hacker's computer faster than he can react 💀

    • @PhantomChaos76
      @PhantomChaos76 5 วันที่ผ่านมา +3

      Keylogger vs average DMC player

    • @Ch1zmech01
      @Ch1zmech01 2 วันที่ผ่านมา +3

      Keylogger vs average fnf player

  • @ExplainedOnPaint
    @ExplainedOnPaint หลายเดือนก่อน +182

    This is actually pretty scary. I didn't know there were so many

    • @june_senpai9846
      @june_senpai9846 หลายเดือนก่อน +21

      There is way more sub-terms and more specialized attacks both hardware and software

    • @OlympusGames-zv2rs
      @OlympusGames-zv2rs หลายเดือนก่อน +16

      The last one is the one that sounds the mildest but it's quite the opposite. Quoting another guy, imagine you work at a high end software developing agency. At lunch, someone casually approaches you and says "hey I'm hungry but I don't know the place yet, can you recommend me some good place to eat?" While it sounds like an innocent question, you're pretty much telling him what places you and your colleagues go for lunch, and where he can find potential targets for whatever devious things he wants to do.

    • @gabor6259
      @gabor6259 หลายเดือนก่อน +7

      @@OlympusGames-zv2rs Or imagine that the guy just leaves a USB key on a table. Someone will be like "what is this USB", they put it in a computer but there's malware on the USB.

    • @creammando
      @creammando หลายเดือนก่อน +2

      @@gabor6259 thats actually a real attack which is concerning

    • @luckyassassin1
      @luckyassassin1 หลายเดือนก่อน +1

      There's many more sub types and more are likely being created as we speak. Technology advances at a rapid pace so there's likely new ones being developed. Cyber security is a constant cat and mouse game.

  • @RomLoneWolf23
    @RomLoneWolf23 หลายเดือนก่อน +123

    This is honestly more useful than the "hacking" software you see in most Cyberpunk games.

    • @PaintMyMind
      @PaintMyMind หลายเดือนก่อน +5

      Sure

    • @TheRealName7
      @TheRealName7 หลายเดือนก่อน +1

      Ew woke cyberpunk game

    • @Tyri-wz9mx
      @Tyri-wz9mx 4 วันที่ผ่านมา

      @@TheRealName7I mean it’s set in the future

  • @PrettyBasicVR
    @PrettyBasicVR หลายเดือนก่อน +36

    6:34 POV mcaffee

    • @marnidy
      @marnidy 20 วันที่ผ่านมา +3

      Omg this is so true, it actually happened to me once

    • @archishmandhiman2234
      @archishmandhiman2234 14 วันที่ผ่านมา

      No, McAfee is Not that bad

    • @dontsubtome2369
      @dontsubtome2369 11 วันที่ผ่านมา

      It is installed it my security by default in my phone

    • @blackmeninsideyou
      @blackmeninsideyou 8 วันที่ผ่านมา +2

      fr

  • @rydogjkjr3325
    @rydogjkjr3325 หลายเดือนก่อน +27

    Test: starts in 30 minutes and i haven’t studied.
    Me asf: all computer viruses explained

  • @MotivationalAbyss
    @MotivationalAbyss หลายเดือนก่อน +8

    I dont know why but hearing about computer viruses gives me some fear

  • @justsomeweirdduck3311
    @justsomeweirdduck3311 หลายเดือนก่อน +30

    Correction on rootkit: Rootkits themselves are not inherently designed to give a malicious actor remote access to a computer, but can do so. Rootkits are designed to be stealthy and concealed, and usually are used to protect other pieces of more specialized malware (like keyloggers) from traditional security measures. The term "root" in rootkit is named after the "root" permission level of unix-based operating systems (administrator/system on windows). Rootkits usually operate at ring 0 (kernel) and can be very difficult to detect, but some are only run in the userspace. Some special types of rootkits can overwrite the master boot record (mbr) or hijack other parts of the boot process. This type of rootkit is called a "bootkit" and be very difficult to detect and remove, even surviving drive wipes. While technically a rootkit can be bundled with a RAT or have RAT functionality, rootkits are often designed to maintain high permission levels on a computer, as well interfere with standard security measures. As such, rootkits are nasty pieces of malware which can bring great harm to a system or network if designed correctly.
    No hate! Just wanted to clear this up! :)

    • @sandwan4845
      @sandwan4845 16 ชั่วโมงที่ผ่านมา

      he said that in the video

    • @justsomeweirdduck3311
      @justsomeweirdduck3311 16 ชั่วโมงที่ผ่านมา +1

      @@sandwan4845 no, he said rootkits provide remote access, not all rootkits do. They gain full control over a computer.

  • @JoseGarcia-oi7km
    @JoseGarcia-oi7km หลายเดือนก่อน +77

    I'm legitimately concerned about my internet searches now...

    • @sausageIsAnAbomination
      @sausageIsAnAbomination หลายเดือนก่อน +1

      god me too 💀

    • @blurzpg3d
      @blurzpg3d 16 วันที่ผ่านมา +3

      Dont worry at the end of the day we live on a floating rock

  • @TheWarhammerplayer
    @TheWarhammerplayer หลายเดือนก่อน +73

    Amazing video! I think its worth mentioning that rootkits often wont target antiviruses at all, as many modern day antiviruses have anti hijacking detection built in. More often than not rootkits disguise themselves as other regularly installed programs or modifying the task manager / process viewer to skip the memory space where the rootkit resides, hiding it from both user and antiviruses.
    10/10 video tho

    • @justsomeone282
      @justsomeone282 หลายเดือนก่อน +1

      some antivirus has a different view of the processes than windows will show like they have their own special viewer that can't be modified!!

    • @paulstelian97
      @paulstelian97 หลายเดือนก่อน

      @@justsomeone282The only unmodifiable view is one done via a kernel module looking at the data structures directly. Sysinternals RootkitRevealer demonstrates the technique.

  • @Purplesnurple208
    @Purplesnurple208 หลายเดือนก่อน +4

    Imagine if this video had a computer virus

  • @miser2570
    @miser2570 หลายเดือนก่อน +56

    The tidbit that ads themselves are an inherent security vulnerability is kinda funny

  • @ackton
    @ackton หลายเดือนก่อน +20

    5:43
    These softwares are horrifying. One time I tried to get an autoclicker but clicked the fake download link(I didn’t have an adblocker at the time) and this fake software installed an entirely new taskbar, deleting the old one! Huge search engine bar, with ads popping up ON THE AREA WHERE THE TASKBAR WAS!!! This incident will never not scare me.

    • @souyakawata9449
      @souyakawata9449 21 วันที่ผ่านมา +9

      had the same shit, easiest virus to deinstall, suddenly yahoo popped up and yeah thats the moment the virus got backshots from anti malware

    • @jeffersonchau7171
      @jeffersonchau7171 3 วันที่ผ่านมา

      @@souyakawata9449you got that yahoo browser hijack as well? I had some fun trying to figure that out but luckily I was able to find a anti malware software to scan my computer and it went away after. Not that many problems since

  • @Noobfish3
    @Noobfish3 18 วันที่ผ่านมา +5

    Ohh so that's why my old PC's cursor was moving on its own

  • @tunahn22
    @tunahn22 หลายเดือนก่อน +5

    Im getting increasingly paranoid of getting hacked

    • @creammando
      @creammando หลายเดือนก่อน +4

      dont worry just dont do stupid things and you'll be fine

  • @therealelement75
    @therealelement75 หลายเดือนก่อน +8

    I feel like keylogging could be stopped by typing into multiple fields at once, one part at a time, randomizing how many characters in each part, and adding other irrelevant data that you delete anyways.

  • @thotusmaximus971
    @thotusmaximus971 หลายเดือนก่อน +8

    This is actually a nice run through of everything. Well done mate!

  • @trueberryless
    @trueberryless หลายเดือนก่อน +17

    I like how well you interact with your community ❤ and make their ideas come true

  • @EverythingStudios2024
    @EverythingStudios2024 6 วันที่ผ่านมา +1

    Sadly, I was a victim of the web browser virus. I started to use another web browser, and like a few months later, my computer got physical damage, and I erased it, and by the time I repaired it, the virus was gone.

  • @ghostbiiie
    @ghostbiiie หลายเดือนก่อน +2

    ive been watching your videos since the beginning, and your artstyle has gotten very good! great video!

  • @BarcelPL
    @BarcelPL หลายเดือนก่อน +23

    You might also wanna know that DDoS stands for Distributed Denial of Service.
    In this example, it show rather a DoS, since the Distributed warrant flooding from lots of other devices (in particular to make tracing harder)

    • @creammando
      @creammando หลายเดือนก่อน +1

      DoS is a single server flooding requests to a target and DDoS is multiple servers flooding requests to a target (most of the time being part of a botnet) and no its not to make tracing harder its to make the denial of service more effective especially against strong servers.

  • @darkchive
    @darkchive หลายเดือนก่อน +11

    I need this stuff to make a cybersecurity ontology for a lvl 7 postgrad module (Ontologies and knowledge bases). what a win.

  • @BongoThe
    @BongoThe หลายเดือนก่อน +105

    i literally just got down with a playthrough of a game ABOUT viruses. what a coincidence!
    edit: the game was plague inc.
    edit 2: so i found a game on steam called "Entodrive". it's about computer viruses. gonna play that soon.

    • @glomerofthe7rings289
      @glomerofthe7rings289 หลายเดือนก่อน +6

      what was the game?

    • @BongoThe
      @BongoThe หลายเดือนก่อน

      @@glomerofthe7rings289plague inc.

    • @Nick-the-fox
      @Nick-the-fox หลายเดือนก่อน

      @@glomerofthe7rings289 Kinitopet?

    • @joe56188
      @joe56188 หลายเดือนก่อน +1

      I want to know the game too

    • @dandrecollier800
      @dandrecollier800 หลายเดือนก่อน +1

      Whats the game's name?

  • @ttominable
    @ttominable หลายเดือนก่อน +16

    3:29 One observation though, the Kernel is not in the OS, the OS is in the kernel

    • @creammando
      @creammando หลายเดือนก่อน +1

      No, the Kernel is IN the Operating System

    • @logiebogieboo_curr
      @logiebogieboo_curr หลายเดือนก่อน

      No, the kernel is is the BIOS (motherboard)

    • @creammando
      @creammando หลายเดือนก่อน +1

      @@logiebogieboo_currI understand you got confused with the bios and the kernel but they aren’t the same thing the kernel is located in the OS meaning that it’s stored in the storage drive not the motherboard

    • @user-jk5bg6mh5q
      @user-jk5bg6mh5q 17 วันที่ผ่านมา +1

      @@creammando It is not. You can try it yourself honestly. Make a dual boot system, install a rootkit and you will notice that the rootkit has access to both operating systems.

    • @creammando
      @creammando 17 วันที่ผ่านมา

      @@user-jk5bg6mh5q dual booting is a different story, i dont know much about how it works but im assuming both oses are connected in some way but thats not a good example, you can search it up, and at least do research like i did to verify your claims because im 100% sure the kernel is in the OS just like how kernel drivers are in the OS so if you wipe out the os and install a new one the kernel drivers go with it since its inside of the OS

  • @egglord085nothere
    @egglord085nothere หลายเดือนก่อน +3

    My heart stop beating when my computer (almost) got diagnosed with 5 entire freaking viruses just because I wanted to get an extension to hide my mouse pointer for my game and I knew dang well I had to renew the McAfee crap but I guess I didn't need to (So I didn't)

  • @EIBozo
    @EIBozo หลายเดือนก่อน +5

    Cant wait for ramsonware people to hack my pc like "heh heh time to earn bank" then realize all I have is useless images of memes that i wont miss being encrypted

  • @fanoffans7459
    @fanoffans7459 หลายเดือนก่อน +1

    Thanks for getting right to the point I was expecting a 2 minute intro or something like that but it just started on the point of the video, thanks

  • @nightmare3711
    @nightmare3711 หลายเดือนก่อน +6

    New fear unlocked

  • @radstorm
    @radstorm 13 วันที่ผ่านมา +3

    Great channel.. gets to the point immediately..subscribed :)

  • @caitlynsult2685
    @caitlynsult2685 หลายเดือนก่อน +12

    you should do types of music next

  • @Trollface455
    @Trollface455 หลายเดือนก่อน +2

    As a younger kid i thought it was just RAT and wiper

  • @ttomi495
    @ttomi495 หลายเดือนก่อน

    This explains it soo good & has a nice length of time :) Love it!

  • @Hwakna
    @Hwakna หลายเดือนก่อน +9

    the fact that the app zoom has a rat in it, literally with the user’s permission someone can control your mouse, etc (its a feature idk if its still there or not)

    • @creammando
      @creammando หลายเดือนก่อน

      No lol thats not a rat, a RAT (explained in the video btw) is a Remote Access Trojan that gives the attacker access to your computer (shell, screen view or both) and they can do whatever they want your pc as programmed into their RAT, for example some RATs dont have it programmed where they can control your mouse, also zoom cant control your mouse and stuff without your permission, that would be illegal and would be detected by antiviruses

  • @ANASPANremoverandomcrits
    @ANASPANremoverandomcrits หลายเดือนก่อน +48

    Wouldn't it make sense to call this "Every Type of Computer Malware" instead? Or maybe "Cyber Attack".

    • @connorchil
      @connorchil หลายเดือนก่อน +11

      I agree with changing it to malware instead of virus but I don’t think there are enough cyber terms to say “cyber attacks” which was also my first thought after hearing DDoS

    • @Moggus1
      @Moggus1 หลายเดือนก่อน

      Virus is just a blanket term

    • @Leooocollins
      @Leooocollins หลายเดือนก่อน

      Cyberattacks is about right here, 'malware' applies where the attack is some form of software e.g. worm/virus/trojan, pretty much everything before RAM scraping. Most of the things afterwards are either network-based or just methods to describe an attack but not really an attack itself. Social engineering is sort of an umbrella term for other things mentioned in the video that play on the human and may/may not lead to malware infection i.e. phishing, adware, malvertising. Regardless of any pedantic wording necessities, vid's accurate :)

    • @indig0283
      @indig0283 หลายเดือนก่อน +4

      I think "computer virus" is a more understandable term for the average user

  • @MedicFromTF2
    @MedicFromTF2 หลายเดือนก่อน

    I love your videos. I'm actually learning stuff from you, thanks. You should do a video based off of diseases and how they harm/kill

  • @arturosann7016
    @arturosann7016 16 วันที่ผ่านมา +1

    Maybe 5 of these aren’t technically viruses, but I’m happy you added these tools and processes to inform the general public. You explained them all pretty well and precise, too!

  • @Explazor
    @Explazor หลายเดือนก่อน +7

    well explained like always.

  • @shark_boy7566
    @shark_boy7566 7 วันที่ผ่านมา +3

    Me: why my neck hurts?
    Also me: 4:48

  • @ExplainEverythingNow
    @ExplainEverythingNow หลายเดือนก่อน +1

    interesting video! I like how you use paint to explain things

  • @YT-AlexTM
    @YT-AlexTM 22 วันที่ผ่านมา +1

    According to the way you described spyware, google is spyware because all the things you described fits google perfectly

  • @weidie2moro
    @weidie2moro หลายเดือนก่อน +5

    1:44 bro was personal with that one 💀💀

    • @logiebogieboo_curr
      @logiebogieboo_curr หลายเดือนก่อน

      Looks like a girl that uses Instagram 24/7

    • @ComputerBoyTheEntertainer
      @ComputerBoyTheEntertainer 20 วันที่ผ่านมา

      nah- ima make a pop-up ad out of this-

    • @weidie2moro
      @weidie2moro 19 วันที่ผ่านมา

      @@ComputerBoyTheEntertainer why

    • @ComputerBoyTheEntertainer
      @ComputerBoyTheEntertainer 19 วันที่ผ่านมา

      @@weidie2moro just for my upcoming pop-up generator >:)

  • @_yahir_7673
    @_yahir_7673 หลายเดือนก่อน +4

    as a cybersecurity major i loved this!!!
    subscribing for more videos, (hopefully more security related videos)

  • @dragongamer4833
    @dragongamer4833 หลายเดือนก่อน +2

    i believe i had an adware on my pc at one point. randomly, and without my permission, it would open a thing for McAfee or whatever, with the worlds smallest close button, only able to be clicked on a certain page. my cousin also had this at one point, and i dont know if my pc is further compromised. thank you a ton for the video, to keep us all safe.

  • @niklashost7261
    @niklashost7261 หลายเดือนก่อน +5

    i knew ads were anoying but... this is nr 1 reason to get rid of ads

    • @creammando
      @creammando หลายเดือนก่อน +1

      not all ADs are malicious lmao

    • @niklashost7261
      @niklashost7261 หลายเดือนก่อน

      @@creammando ok

  • @Okabim
    @Okabim หลายเดือนก่อน +4

    SQL injection: One of the most common ways to get hacked. By not properly sanitizing data sent by a user (such as a search form), an attacker can run arbitrary code on your database.

    • @thepopeofhell3148
      @thepopeofhell3148 16 วันที่ผ่านมา +1

      Not that common anymore tbh. Most user inputs are sanitized these days. Still possible though, but past its prime imo

  • @GradientHex
    @GradientHex หลายเดือนก่อน +6

    This video is giving my computer a virus, 💀

  • @rainsbian
    @rainsbian หลายเดือนก่อน +1

    the amount of anxiety this gives me is uncomfortable

  • @Genesis1337_
    @Genesis1337_ หลายเดือนก่อน

    Really big thanks for making this video, now I learned more about how to be aware of the internet.

  • @leekeyybum6930
    @leekeyybum6930 หลายเดือนก่อน +3

    Video idea: every type of scam
    Edit: lollll the evaluator made this video some minutes ago

  • @cadetmonkey
    @cadetmonkey หลายเดือนก่อน +3

    what if your a hacker and that’s why you know all this?

  • @deputyhobbs9683
    @deputyhobbs9683 9 วันที่ผ่านมา +1

    Word of advice about rat viruses (from experience)
    If it's the direct kind and not the stealthy type, and you catch the hacker in the act, disable your network and boot the computer in safe mode until you find where the virus is. Some systems will show recently downloaded and modified files so it should be rather easy to locate the rat as I had to do that

    • @KawaiiKemono
      @KawaiiKemono 9 วันที่ผ่านมา

      What about GOAT files?

  • @ManlyKirby
    @ManlyKirby 3 วันที่ผ่านมา +2

    i once had a virus that deleted every direct access on my computer and didn't let me use the search feature for searching programs, it happened everytime my computer was turned off, so i did a factory reset (i think they're called that) on my computer and it was gone, but now after like 1-2 years after the incident now my command thing randomly opens up for a split second and then closes

  • @Robert_Oppenheimer
    @Robert_Oppenheimer หลายเดือนก่อน +3

    Love your video bro ♥️
    I have a video idea where you explain all leaked or pirated movies quality and their comparison 🔥
    Plz ✨

  • @NeedForSpeed.2004
    @NeedForSpeed.2004 หลายเดือนก่อน +3

    6:29 Literally tech support scammers in a nutshell

  • @Ramen-exe
    @Ramen-exe หลายเดือนก่อน +2

    you forgot to include one
    windows

  • @lacriaturadekentucky
    @lacriaturadekentucky หลายเดือนก่อน +2

    Just learned about the Linux xz backdoor, and this appears in my subscription feed.

  • @yytyyy5329
    @yytyyy5329 หลายเดือนก่อน +5

    I heard a girl on a TH-cam video talk about how she got malware on her computer and contacted the person who "made" it I suppose. And he asked for a bunch of money so she could fix it, like how can you destroy someones computer then ask for money? 😔

    • @ArchoDarko
      @ArchoDarko หลายเดือนก่อน +3

      more scamming

    • @creammando
      @creammando หลายเดือนก่อน

      sadly thats how ransomware gangs work

    • @PhantomChaos76
      @PhantomChaos76 5 วันที่ผ่านมา

      Definition of ransomware.

  • @lachlanrudolph9258
    @lachlanrudolph9258 หลายเดือนก่อน +3

    I might have a browser hijacker and possibly adware

  • @JohnathanJohaisen
    @JohnathanJohaisen หลายเดือนก่อน

    Thanks for the information, I’ll use this later.

  • @malwareedits
    @malwareedits หลายเดือนก่อน +1

    glad to be on this list

  • @directorsenpai7956
    @directorsenpai7956 หลายเดือนก่อน +2

    Video Idea: Every physician specialization of medicine explained

  • @Paramoth172
    @Paramoth172 หลายเดือนก่อน +2

    An April Fools Day video that is not an April Fools joke?

  • @danielriquelme5766
    @danielriquelme5766 10 วันที่ผ่านมา

    Great video. It would be cool to have the concepts orginized in tree/graph form showing the relations between them like having malware being the root and spyware being one of its children and the keylogger being a child of spyware. It might end up looking weird but idk sounds cool to me.

  • @arthursestrengameplay
    @arthursestrengameplay หลายเดือนก่อน +15

    An extra i gathered up: "memeware" malweares that are explicetly malweares and are made for fun and destroy the pc, normaly they destroy the pc when run and give some kind-of warning (an example is memz)

    • @Ventis-dead-friend-
      @Ventis-dead-friend- หลายเดือนก่อน

      So.. *if* i am undersyanding correctly :
      you are an idiot would count as one?

    • @creammando
      @creammando หลายเดือนก่อน +4

      but hes trying to explain actual terms

    • @PhantomChaos76
      @PhantomChaos76 5 วันที่ผ่านมา

      That's not an extra. You said it yourself, it's a malware.

  • @Eagle3302PL
    @Eagle3302PL หลายเดือนก่อน +33

    How about every type of microorganism, I am so tired of explaining the difference between viruses, bacteria, amoeba etc. to boomers.

    • @YouChwb
      @YouChwb หลายเดือนก่อน +1

      Don't worry, in time somebody a lot younger than yourself will be explaining things to you as you dribble onto your bib throughout the day.

    • @just__an_Owl
      @just__an_Owl หลายเดือนก่อน

      ​@@YouChwb boomer detected cry more

    • @ICR_Producer
      @ICR_Producer 12 วันที่ผ่านมา +1

      Not funny

    • @YouChwb
      @YouChwb 12 วันที่ผ่านมา

      Why waste your time on something that nobody gives a flying fook about?

  • @Sonlicia
    @Sonlicia หลายเดือนก่อน

    As someone studying cyber security, this really helps. Thanks!

  • @collbaconnoobe
    @collbaconnoobe 13 วันที่ผ่านมา +1

    Back in the day we doesn't have wifi, and Rouge Security System happened on my dad's phone, so they forced me to go to the laundry to install the specific app lol, instead I played games and told them I removed the virus.

  • @legendary102
    @legendary102 หลายเดือนก่อน +7

    video idea: type of oiled up men pls

  • @autisticandproudsnephew3636
    @autisticandproudsnephew3636 หลายเดือนก่อน +4

    Some missing subcategories I noticed:
    Dos attacks are a more primitive DDos attack that has requests sent by only one client
    Dictionary attacks are similar to Brute Force Attacks but instead use a list of common codes and pass phrases to guess a password (for example using variants of the word password as it is common to make your password password)

    • @timah9420
      @timah9420 หลายเดือนก่อน +1

      DoS attacks are not primitive versions of DDoS attacks. DDoS attacks are a subcategory Denial of Service attacks. DDoS just refers to the attack being distributed among infected/zombie devices. DoS attacks can be sophisticated and exploit vulnerabilities such as improper validation in regular expressions. For instance, if an attacker sends a request that causes a server to process it exponentially, this can cause the service to crash or stop. Hence, it denies service. I'm also not sure why they felt the need to include bruteforce attacks as it is an attack method and not a form of malware.

    • @autisticandproudsnephew3636
      @autisticandproudsnephew3636 หลายเดือนก่อน +1

      @@timah9420 I am aware, I said primitive to simplify the concept. I am still at GCSE level computer science and thus don't feel qualified to truly explain all the specifics of everything, only general concepts.

  • @HVY526
    @HVY526 12 วันที่ผ่านมา +1

    Some of them I didn’t know existed. NOW I KNOW THAT ONE TIME A MARIO MULTIVERSE THING ONCE WIPED AN OLD OCMPUTER THAT I NOW USE FOR SCHOOL

  • @lukatolstov5598
    @lukatolstov5598 26 วันที่ผ่านมา +1

    1:09 THERE WAS VERY SCARY WORM THAT JUST:
    -FOUND A COMPUTER
    -GETS INSIDE
    -BREAKS IT WITHOUT BEING AS A LIST AND WITHOUT OPENING IT
    -REPLICATES ITSELF
    -SENDS TO OTHERS
    -REPEATS

  • @JustInkyy
    @JustInkyy หลายเดือนก่อน +8

    Windows itself is a spyware lol

  • @Donobodude
    @Donobodude หลายเดือนก่อน +3

    3:43 How did you know I was watching TH-cam?? You must be running spyware on my computer!!!1!!1!11!!1!!!!

  • @capedbaldy-3233
    @capedbaldy-3233 หลายเดือนก่อน

    this is the most chill pc virus bonzi buddy

  • @noorraihan-we5sb
    @noorraihan-we5sb หลายเดือนก่อน +1

    Im now scared to touch anything on the device.

  • @imaadhaq540
    @imaadhaq540 หลายเดือนก่อน +3

    7:45 uh? Is he AI?

    • @imaadhaq540
      @imaadhaq540 หลายเดือนก่อน

      Okay now that I'm focusing on it he 100% doesn't sound real

    • @PhantomChaos76
      @PhantomChaos76 5 วันที่ผ่านมา

      What? What part are you talking about? I clicked the timestamp and I don't hear anything "fake"

    • @imaadhaq540
      @imaadhaq540 5 วันที่ผ่านมา

      @PhantomChaos76 on my phone I couldn't hear it, I guess it depends on speaker quality, but there def was a blip. And now that I noticed it it's hard to not notice the fact that he speaks in the most robotic cadence

  • @Zachattacks
    @Zachattacks หลายเดือนก่อน +2

    Thanks for the information now I know what to do to make that bank

  • @Joe-xx2ri
    @Joe-xx2ri 2 ชั่วโมงที่ผ่านมา

    Efficient, I like it. Straight to the point

  • @the.abhiram.r
    @the.abhiram.r หลายเดือนก่อน +1

    this was quite interesting coming from a compsci major who just learned systems programming

  • @protectoman9150
    @protectoman9150 หลายเดือนก่อน +47

    Example of Spyware: TikTok

    • @wolf-tec
      @wolf-tec 22 วันที่ผ่านมา +5

      And Instagram

    • @theusamongus
      @theusamongus 19 วันที่ผ่านมา

      basically any app can be called spyware because usually they will sell your information to advertisers or governments like tiktok does

    • @annageyts
      @annageyts 19 วันที่ผ่านมา +1

      nuh uh

    • @jameson1465
      @jameson1465 17 วันที่ผ่านมา +2

      So close yet you are not smart

    • @protectoman9150
      @protectoman9150 17 วันที่ผ่านมา +5

      I know full well TikTok is spyware.
      TikTok does not include spyware.
      TikTok IS the spyware.

  • @assassinvirus3665
    @assassinvirus3665 หลายเดือนก่อน +2

    I love how many of these apply to McAfee

  • @SquareFoil31362
    @SquareFoil31362 22 วันที่ผ่านมา +1

    It's really interesting how connected these things are.

  • @Daily5SecondFacts
    @Daily5SecondFacts หลายเดือนก่อน

    Very high quality video!

  • @gjkdshgkjshjkgdfg
    @gjkdshgkjshjkgdfg หลายเดือนก่อน

    Thanks for the windows guide! Now I know all the ins and outs of my system!

  • @Kcity313
    @Kcity313 หลายเดือนก่อน +1

    I like this channel very informative 👍

  • @melonnotfound7061
    @melonnotfound7061 หลายเดือนก่อน +1

    RAT is like a mind controlling parasite that makes ur computer do unwanted things and things against you to help the hacker but secretly

  • @Nicolaslk827
    @Nicolaslk827 หลายเดือนก่อน

    I love how simple to understand. These are just by watching this video.

  • @l3rw8dn2h
    @l3rw8dn2h หลายเดือนก่อน

    Very cool now I know every computer virus and others!