Malware - CompTIA A+ 220-1102 - 2.3
HTML-код
- Опубликовано: 13 май 2024
- A+ Training Course Index: professormesser.link/1102videos
Professor Messer’s Course Notes: professormesser.link/1102notes
- - - - -
Attackers have many different ways to infiltrate our systems. In this video, you’ll learn about Trojan Horses, rootkits, keyloggers, ransomware, cryptominers, and more.
- - - - -
Subscribe to get the latest videos: professormesser.link/yt
Calendar of live events: www.professormesser.com/calen...
FOLLOW PROFESSOR MESSER:
Professor Messer official website: www.professormesser.com/
Twitter: www.professormesser.com/twitter
Facebook: www.professormesser.com/facebook
Instagram: www.professormesser.com/insta...
LinkedIn: www.professormesser.com/linkedin - Наука
passing through. good luck all.
update: took my core 2 today and passed. If i can do it, so can you. best of luck everyone.
where are you on your journey now? i m taking my core2 next wednesday.
@@emarskineelme too in two weeks , did you give 1101 earlier
tips for core 2?
tips for core 2?@@creatorz6739
tips for core 2?@@Mangokyaw
Your a champ, professor!
You’re
@@Networked01 you're
The plant he used in the “root kit” part is a plant called “Jewels of Opar” :)
nice to know
In Security+ (1.2) you gave this explanation of a Virus vs. a Worm: "The virus needs a human being to start the process, whereas a worm can jump from machine to machine without any human intervention whatsoever. Once the end user has launched the executable that starts the virus, it can use the existing file system or the network to replicate itself."
In this video you are not mentioning Worms (not in the 1102 objectives), but only Viruses and the definition you give for a Virus is that of a Worm. Is this not correct or does CompTIA define these terms differently in both exams?
For the sake of 1102, should I use the definition you gave in this video for Virus or carry on using the definition from Security+?
Thanks.
Ever find an answer?
Bruh listen to the video again. At 5:50, he said that it needs "human intervention".
How can you tell you have rootkit on a system?
1 year and nobody responded
It can be hard to tell. Probably the most obvious would be that most rootkits are usually controlled remotely. So using a tool like TCP view would probably reveal some sort of process running that is communicating without your permission. The easiest way to remove a rootkit is by having a competent AV, such as BitDefender or Kaspersky, which will scan the boot sectors, UEFI, etc, for rootkits.
There will be roots coming out of the PSU fan