skip to main | skip to sidebar
A new way to teach and disseminate knowledge in all fields Without a monopoly
Ψ£Ω†Ψ―Ψ±ΩˆΩŠΨ― (38) Ψ¨Ψ±Ψ§Ω…Ψ¬ وΨͺΨ·Ψ¨ΩŠΩ‚Ψ§Ψͺ (32) ΩˆΩŠΩ†Ψ―ΩˆΨ² (29) Ψ¨Ψ±Ω…Ψ¬Ψ© (22) Ψ£Ω„ΨΉΨ§Ψ¨ (16) يوΨͺوب (13)
  • Ψ§Ω„Ψ±Ψ¦ΩŠΨ³ΩŠΨ©HOME 🏠
❀🚭welcome to https://er-ramimohamed.blogspot.com/ please if ou have any question or suggestion dont heisting 🚭 to send it to me at erramixx@gmail.com thanks Ω…Ψ­Ω…Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ψ― Ψ§Ω„Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ψ±Ψ§Ω…ΩŠ ΩŠΨ±Ψ­Ψ¨ΩƒΩ… ويΨͺΩ…Ω†Ω‰ Ω„Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€Ω€ΩƒΩ… Ψ§Ω† ΨͺΩ‚ΨΆΩˆΨ§ πŸŒΉπŸŒΉΩˆΩ‚Ψͺ Ω…ΩΩŠΨ―

Ψ§Ω„Ψ³Ψ¨Ψͺ، 4 Ω…Ψ§ΩŠΩˆ 2019

π‘Šπ΄π‘…π‘πΌπ‘πΊ: 𝐴𝑛 π‘œπ‘™π‘‘ π‘£π‘–π‘Ÿπ‘’π‘  π‘‘β„Žπ‘Žπ‘‘ π‘Žπ‘‘π‘‘π‘Žπ‘π‘˜π‘  π‘Šπ‘–π‘›π‘‘π‘œπ‘€π‘  π‘π‘œπ‘šπ‘’π‘  π‘π‘Žπ‘π‘˜ π‘Žπ‘”π‘Žπ‘–π‘› π‘Žπ‘›π‘‘ π‘‘β„Žπ‘–π‘  π‘‘π‘–π‘šπ‘’ 𝑖𝑑'𝑠 π‘ π‘‘π‘Ÿπ‘œπ‘›π‘”π‘’π‘Ÿ

Ω…Ψ§ΩŠΩˆ 04, 2019 ERRAMI Ω„Ψ§ يوجد ΨͺΨΉΩ„ΩŠΩ‚Ψ§Ψͺ


  In 2008, Qakbot, a malicious program that attacked companies and users to steal information by exploiting a security flaw in Windows, appeared. Fortunately, developments in cybersecurity and Microsoft's efforts have been able to stop the threat for a while, but not forever. According to Cisco Talos researchers , Qakbot was recently updated and returned again.

 The malicious software has regenerated its system so that it can remain on a computer without being detected by users or security systems and programs. The latest version of Qakbot is supported by a dropper, a program to install malicious code from the program itself or from external servers, making it unnoticed by an antivirus program. 
In the case of Qakbot's dropper, it can connect to multiple Internet addresses where malware that is created in JavaScript is hosted. It is important to note that the above addresses do not always belong to the hackers; however, some have been stolen to be used for data theft purposes. 
Once the malicious code is installed on the computer, it starts requesting its own implementation instructions, which are hosted on the external server. These instructions contain XOR encryption, while avoiding the possibility of knowing their true purpose if intercepted.

When the implementation process is completed and the malicious program contains its instructions, it begins to steal information in the background. According to researchers, Internet criminals are looking for special data that allows them, for example, access to bank accounts. Cisco Talos has shared a list of domains included in malware that can help prevent attacks. 
The big problem is that it will be difficult for us to see a solution soon to threaten the harmful Qakbot program, because its level of development allows it to continue to cause damage even when removing its main files from computers.

ΨͺΨ΅Ω†ΩŠΩ : ΩˆΩŠΩ†Ψ―ΩˆΨ² Ψ₯Ψ±Ψ³Ψ§Ω„ Ψ¨Ψ§Ω„Ψ¨Ψ±ΩŠΨ― Ψ§Ω„Ψ₯Ω„ΩƒΨͺΨ±ΩˆΩ†ΩŠ ΩƒΨͺΨ§Ψ¨Ψ© Ω…Ψ―ΩˆΩ†Ψ© Ψ­ΩˆΩ„ Ω‡Ψ°Ω‡ Ψ§Ω„Ω…Ψ΄Ψ§Ψ±ΩƒΨ© ‏المشاركة ΨΉΩ„Ω‰ X ‏المشاركة في Facebook
Ψ±Ψ³Ψ§Ω„Ψ© Ψ£Ψ­Ψ―Ψ« Ψ±Ψ³Ψ§Ω„Ψ© Ψ£Ω‚Ψ―Ω… الءفحة Ψ§Ω„Ψ±Ψ¦ΩŠΨ³ΩŠΨ©

0 comments:

Ψ₯Ψ±Ψ³Ψ§Ω„ ΨͺΨΉΩ„ΩŠΩ‚

Twitter Delicious Facebook Digg Stumbleupon Favorites More

A

فΨͺΨ­ Ψ§Ω„Ψ―Ψ±Ψ―Ψ΄Ψ©
1
_
Ω…Ψ±Ψ­Ψ¨Ψ§ Ψ¨Ωƒ !!! Ψ΄ΩƒΨ±Ω‹Ψ£ Ω„Ωƒ ΨΉΩ„Ω‰ زيارة Ω…ΩˆΩ‚ΨΉΩ†Ψ§ Ψ§Ω„Ψ±Ψ¬Ψ§Ψ‘ فΨͺΨ­ Ψ§Ω„Ψ―Ψ±Ψ―Ψ΄Ψ© Ω„Ψ₯Ψ±Ψ³Ψ§Ω„ Ψ±Ψ³Ψ§Ω„Ψ© لمشرف Ψ§Ω„Ω…ΩˆΩ‚ΨΉ ΨΉΨ¨Ψ± ΩΩŠΨ³Ψ¨ΩˆΩƒ

Start

RSS ΨͺΨ§Ψ¨ΨΉΩ†ΩŠ Ψ§Ψ΄ΨͺΨ±Ωƒ

 
copyright Β© πŸπŸŽπŸπŸ— A new way to teach and disseminate knowledge in all fields Without a monopoly | Powered by MOHAMMED ER-RAMI