Jun 25, 2016 Since many people don't know anything about how a computer virus works; I have tasked myself to teach you how a virus works and how you can prevent yourself from being infected. So what is a virus. Well it's an infestation that messes things up and can ultimately k--- anything; scary I know but on the computer side it represents a breach in security and a way to gather info. What info? Bank accounts, personal accounts to websites, social security numbers, anything valuable that could be used on the Dark Web. Many people keep valuable information on their computer and don't do much to secure it, including using random passwords, daily virus scans and actually checking if the website is legit. How does a virus infect your computer? Well for it to actually do anything, it has to be an executable, meaning it has to be given permission to change files and permission to change registry settings and permission to go through every file out there. On Windows Vista and above there is a prompt to allow the program to access your computer (common for installers); gives you a second to double think and see if it's actually legit. Many viruses are based on suspectability and false hope. Let's say you get a document from a person that says it's important. Now you may think that because it's important or because it's from a friend (thanks to a fellow virus), you might open it up. But thanks to a stupid windows feature called "hide extensions", you'd be opening up a virus. Again, executable. A normal file would be named document.doc. NOT document.doc.EXE EXE means EXECUTABLE. But what happens if I get a file that's not an executable you ask? Well they're exploiting flaws in the software caused by either a problem in the workplace or not enough due diligence. This is not your fault but the fault of the software maker. If you had a vulnerability in Office that allowed it to compromise a computer and opened a DOC file then well, it would compromise your computer. Websites are vulnerable to this as well, if you had a MySQL vulnerability due to lack of updates than someone would be able to download a database and do massive damage to a site. Based on what's in the news, this is no laughing matter. So what can you do? Make sure you have virus software available; all virus software will prevent you from loading the file if it detects a virus. It will show a message and ask you if you want to quarantine or allow. You're an idiot or a pirate if you allow files (but that may be due to a false positive, double check to make sure) but your virus software is doing the job that it's supposed to. So make sure you have it. What happens if you get infected? Go outside the system, many Windows discs have a recovery option available and can load programs like MalwareBytes. So if you have a Windows 7, 8 or 10 CD or even a Linux CD with a virus scanner than you can use that, get rid of the virus and be on your merry way. But what happens if they have your info? It's simple, change your passwords, contact your organizations and don't post a thread in a forum about it. It's a crime if they have your info. You're unlikely to catch them, they'll cover their tracks because hacking is a major crime and an ongoing issue which is why there's rarely any action. Because they can't find them. But you can make sure that you prevent further damage by doing what I said above. I really hope this helps, if it doesn't then well, god bless you.
Jun 26, 2016 I'm actually a computer technician in real life and after reading this it sounds to me like you send viruses to JMG
Jun 27, 2016 Well... How would you write it better. I think I covered all the bases. I have a considerable knowledge of tech since I was a kid so I'm hoping that counted.
Jun 27, 2016 No, the writing is fine. I'm just saying there's enough evidence here to paint you as a hacker. I'm actually a computer technician in real life and it seems pretty clear to me you're a hacker.
Jun 27, 2016 I'm a script kiddie, not a hacker. Hackers require lots of experience in writing code, especially the codes of applications of which there are many. I have no idea how to find an exploit, I have no idea how to exploit one and I certainly don't have the backbone in order to do it to the point where it's ethical/won't rise up trouble. My ISP (or any other ISP) does not tolerate hacking of any kind.
Jun 28, 2016 Oh okay, you just happened to stumble across all this information by accident? m8, you're a hacker I can tell. stop trying to deny it.