Core 2 A+ Training Course Index: professormesser.link/1002course
Core 2 A+ Success Bundle: professormesser.link/1002success
Core 2 Course Notes: professormesser.link/1002notes
Discount exam vouchers: professormesser.com/vouchers/
- - - - -
There are many ways that attackers can use to infect your system with malware. In this video, you’ll learn about viruses, worms, botnets, and more.
- - - - -
Subscribe to get the latest videos: professormesser.link/yt
Calendar of live events: www.professormesser.com/calendar/
Frequently Asked Questions: professormesser.link/faq
FOLLOW PROFESSOR MESSER:
Professor Messer official website: www.professormesser.com/
Twitter: www.professormesser.com/twitter
Facebook: www.professormesser.com/facebook
Instagram: www.professormesser.com/instagram
LinkedIn: www.professormesser.com/linkedin
This is scaring me so I guess I'm learning
Trial by fire
I love that the background photo for the thumbnail is of my hometown.
This stuff is scary but so fascinating to me. It's part of why I want to ultimately get into cybersecurity, so I can both study this stuff and protect my family and others from it.
Amazing video, Professor! Wish I knew these things earlier. Would be nice if they taught us these in school.
nervous that the link he posts to see botnets may actually be a botnet thing itself
lol
Love your stuff, thank you for sharing!
Thankyou professor 😀😀😀😀😀😀😀😀
(Skynet is self-aware) LOL
I keep my data on an two separate encrypted external drives, so any files on my desktop aren't all that important.
Whens the next A+ study group?
June 11th,2019 and June 13th, 2019 but will be new series study grp (200-1001 & 200-1002) as the current exam expires July 31st, 2019
Just wondering......Can this type of ransomware get to your external disks? I've often heard that malware and viruses can only affect your internal hard disk. Is this true? Thanks....
From my experience it is entirely dependant on they type of malware/ransomware used, Some forms attack and encrypt just your internal storage, whilst others can encrypt both internal and external storage, aswell as devices to assist in the spreading of the malware. My advice is never to treat malware as a static form of threat as it is constantly changing and adapting every second, however the forms of malware (keyloggers, Trojans, Ransomware, etc) stay somewhat static until new forms are discovered. hope this helps :)