|
|
MALWARE ANALYSIS PART1
(Preview)
I would like to write about knowing the file singture to identify the file type >>> this step will help you to detect the virues and tojans worms etc. before we start this we have to let you be aware about common files that widely used by hackers> these are the common files extensions th...
|
cYBER_C0DER
|
0
|
17
|
|
|
|
|
Malware analysis
(Preview)
Malware analysis is a critical cybersecurity practice focused on understanding malicious software (malware) to mitigate threats and enhance defenses. Below is a comprehensive breakdown of its key aspects, methodologies, tools, and applications:1. Definition and PurposeMalware analysi...
|
cYBER_C0DER
|
0
|
16
|
|
|
|
|
What Is A Port Scan?
(Preview)
A port scan is a common technique hackers use to discover open doors or weak points in a network. A port scan attack helps cyber criminals find open ports and figure out whether they are receiving or sending data. It can also reveal whether active security devices like firewalls are being used by an or...
|
cYBER_C0DER
|
0
|
25
|
|
|
|
|
What is TCP and UDP?
(Preview)
Simply put, TCP and UDP are transport layer protocols which are foundational elements of the Internet. They are both part of the TCP/IP protocol suite and are designed for delivery.What do you know about Internet connectivity? When information is exchanged between devices, network communicati...
|
cYBER_C0DER
|
0
|
21
|
|
|
|
|
Every Type of Computer Virus Explained in 8 Minutes
(Preview)
[video=https://youtu.be/VJFaO2-zsCU?t=164]
|
cYBER_C0DER
|
0
|
19
|
|
|
|
|
protect your pc
(Preview)
On this page, we include four practical methods to help you remove viruses and help restore virus removed or deleted files with powerful EaseUS file recovery software. If you are in this dilemma, follow fixes here to clean up the virus and bring your files back: Workable SolutionsStep-by-step Tr...
|
cYBER_C0DER
|
0
|
18
|
|
|
|
|
Ensure Your Computer Security! Extended Narrative
(Preview)
Greetings, friends, I definitely recommend you to read my article, I think it may be useful because sometimes malicious software enters our computer and can access our personal information, missing even the smallest details, but what can we do against them? How can we be protected, here we go! Com...
|
cYBER_C0DER
|
0
|
20
|
|
|
|
|
Malicious-Software-Removal-Tool scan your pc without antivirus
(Preview)
To run the Microsoft Windows Malicious Software Removal Tool (MRT), press the Windows key + R, type mrt in the Run dialog box, and press Enter. This will launch the MRT, which can be used to scan your computer for specific prevalent malware and remove it. It's important to note that MRT is not a repl...
|
cYBER_C0DER
|
0
|
25
|
|
|
|
|
kill trojan using cmd
(Preview)
using cmd sometimes help you to identify any supious files downloaded to your pc >>> 1- wrtite cmd 2-wite tasklist this command will help you to know all prcoess that going on your pc follow the following video to make sure that pc is not under any threats[video=https://youtu.be/OMy...
|
cYBER_C0DER
|
0
|
25
|
|
|