Skip to main content

Beware Of Virus: The Truth Behind The Scene

 Hi friends, warez sites are known for downloading software cracks. But warez sites are also a breeding ground for new viruses or malwares. 
"Warez refers primarily to copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. The term generally refers to unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. It usually does not refer to commercial software counterfeiting. This term was initially coined by members of the various computer underground circles, but has since become commonplace among Internet users and the mass media." Read more @ wikipedia

Most of the cracked software  have a surprise package malware, which installs with your consent. Because you are ready to ignore all warnings to crack a software package like Nortan or coral.  When you open up a package to install program itself install a virus or malware. The main purpose of these malwares are collecting information about victim for marketing purpose, for fraud lent activities or for testing a virus on different operating systems. The file types you find for download are .rar .zip or torrents . Your antivirus will be unable to detect what you are going to download and in that downloaded package you will get a "read me" file which requests you to disable your antivirus for complete installation.

So if your going to use a warez , take care of some precautions. 
(1)Use free softwares instead of cracked. for example GIMP is the better substitute for photoshop .
(2)Read all comments carefully before downloading torrents or other files.
(3)After downloading make two copies of these files. Test one of them with antivirus and see which type of malware it contains. Because some cracks don't have malwares but your antivirus will detect it as malicious software. 
(4)Keep your vital data locked up or away from that computer while installing cracks. After these precaution do it at your own risk.

Comments

Popular posts from this blog

#2 Why Security Is so important

                     Why  Security   ?   It is  Really  a question Every Body Knows How Important Security Is Here is Some Top Reasons Why Security is Most Important     ·         Evolution Of Technologies has focused primarily on ease of use ·         Computer  infrastruture  Management is  becomming  more complex for the common Man ·         Skill Level Required For Exploiting Security  Weakness Is Constantly ·         Direct Impact Of Security Breach on corporate asset base goodwill ·          Increased Networked Environment And Network Based Application

How To Hack Wifi Passwords With Windows 100% Works

How to Crack a Wpa2-Psk Password with Windows :- It,s very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lots of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not most handy OS for normal users. Today i am going to show you how to a crack a Wp2-psk password with windows machine. Software Requirement for this lab :- 1. CommView for Wifi ( Download ) 2.  Elcomsoft Wireless Security Auditor (Download ) Presently i am connected with my own wifi network Virusfound and i want to hack the password of Ultimate that is secured with Wpa2-psk encryption. First you need to be capture the Wpa2, four-way handsake with CommView. Open commView and click on the Start option  then click on the capture option to start the capture now it will show you all available AP , Now click on the Tools > Select the Node Reassoi...

How to make a Trojan

Most of you may be curious to know about  how to make a Trojan  or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you  how to make a simple trojan  on your own using the C programming language. This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this program is written using a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download at the end of this post. Let’s see how this trojan works: Before I move on to explain the working of this program, you need to know  what exactly is a Trojan horse  and how...