Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

viruses

Ethical Hacking IT Security 

Ethical Hacking: Worm, Virus & Trojan Horse

August 28, 2021 eduguru 0 Comments and Worm Differential Table, and Worms countermeasures, Ethical Hacking: Worm, Trojan, Trojans, virus, Virus & Trojan Horse, viruses, What is a Trojan horse, What is a Virus?, What is a worm?

Ethical Hacking: Worm, Virus & Trojan Horse Some of the skills that hackers have are programming and computer networking skills.

Read more
Ethical Hacking IT Security 

Detecting Trojans and Viruses

September 25, 2020 Krishna Detecting Trojans and Viruses, HACKERS, HACKING, Malware, security, Trojans, viruses

A Trojan can be detected in many ways. Port scanning, which can prove very effective if you know what to

Read more
Ethical Hacking IT Security 

How to Create a Virus

September 25, 2020 Krishna hackers hacking, How to Create a Virus, security, viruses

Creating a virus is a process that can be very complicated or something that happens with a few button clicks

Read more
Ethical Hacking IT Security 

Kinds of Viruses

September 25, 2020 Krishna Kinds of Viruses, viruses

Modern viruses come in many varieties: ■ A system or boot sector virus is designed to infect and place its

Read more
Ethical Hacking IT Security 

Viruses

September 25, 2020 Krishna HACKERS, security, viruses

A virus represents the oldest form of malware and is by far the best known to the public. But what

Read more
computer viruses 

Viruses Can Hide inside Data Files

May 27, 2020 Krishna anti-virus, file virus, inside Data Files, inside virus, viruses, Viruses Can Hide inside Data Files

Hmmmm, well, this is theoretically possible, but I have not heard of such a virus. Yet. For now, viruses hide

Read more
computer viruses 

Using Public Computers

May 23, 2020May 23, 2020 Krishna antivirus, public-access computers, Scanning public computers for spyware, Scanning public computers for viruses, spyware, Staying clean and cleaning up, Using Public Computers, viruses

Public libraries, Internet cafes, and other customer-serving establishments have their own computers that customers may use to access the Internet.

Read more
computer viruses 

Tools Needed for Writing Viruses

May 19, 2020 Krishna computer virues attack, computer virues infection, computer viruese, computer virueses attacl list, system error, system infection, Tools Needed for Writing Viruses, virues attack, viruses, viruses list

Viruses are written in assembly language. High level languages like Basic, C, and Pascal have been designed to generate stand-alone

Read more
computer viruses 

The Functional Elements of a Virus

May 19, 2020May 19, 2020 Krishna computer infection, computer viruses, computer viruses list, The Functional Elements of a Virus, types of computer virus, viruese, viruses, viruses list

Every viable computer virus must have at least two basic parts, or subroutines, if it is even to be called

Read more
computer viruses 

Types of Computer Viruses

May 19, 2020 Krishna computer viruses, computer viruss list, infector, system infector, Types of Computer Viruses, virus attack, viruses

Computer viruses can be classified into several different types. The first and most common type is the virus which infects

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.