Ahmed Razaahmedrazadev.hashnode.dev·Nov 16, 2024The Evolution of Programming Viruses and the Role of Antivirus SolutionsThe dynamic realm of technology has led to unprecedented advancements in software development, yet it has also given rise to malicious software, or viruses, designed to disrupt, damage, or exploit computer systems. Understanding how viruses are progr...Discussvirus
Nettribe Medianettribe.hashnode.dev·Sep 19, 2024The world’s first computer virus was created in 1983 and was called “Elk Cloner.”In 1983, the world saw its first computer virus, known as Elk Cloner. Created by a 15-year-old high school student named Rich Skrenta, Elk Cloner was initially developed as a prank but would go on to be the first widespread example of a computer viru...Discusshacking
FIKARA BILALblog.fikara.io·Sep 9, 2024Wazuh Intégration VirusTotalPré-requis Installation de Wazuh Déploiement d'un agent wazuh sur une machine Configuration des alertes -FIM et Brute Force Attack - (facultatif) Intégration Wazuh est en mesure de renforcer les détections, avec une intégration VirusTotal, qui g...Discuss·85 readsVirustotal
Pratik MforThe Tech Deckthetechdeck.hashnode.dev·Nov 28, 2023How Can an Attacker Execute Malware Through a Script?Executing malware through a script is a common attack vector used by cybercriminals to infect devices and systems. Scripts provide an easy way to distribute and activate malicious code without direct user interaction. Understanding how script-based m...DiscussCyber Securityattacker
Olamide Matthewtheolamide1.hashnode.dev·Aug 31, 2023Malware: Types, Effects And Prevention.Just like flu (a seasonal infection in humans), malwares are infection in computer networks and systems (PCs, smartphones etc.) but malwares aren’t seasonal. They are everyday infections for enterprise networks. Network systems fall ill to the malady...DiscussMalware
Thomas Schmittcreative-diagnostics.hashnode.dev·Aug 28, 2023Virus-Like Particles (VLPs)Introduction Virus-like particles (VLPs) are hollow protein particles that are similar in shape to natural virus particles and are self-assembled by one or more structural proteins of viruses. The diameter of VLPs is about 20~200nm, which has a regul...Discussvirus
Surya Durgeshsuryatechie.hashnode.dev·Aug 1, 2023AI-Created Viruses: The Next Bioterrorism WeaponThe Rise of AI Virology: A Threat to Humanity? Artificial intelligence (AI) is rapidly becoming more powerful and sophisticated. This is opening up a wide range of possibilities for AI, including the development of new viruses. In the past, viruses w...Discuss·1 likeAI
Stackzerostackzero.hashnode.dev·Jul 8, 2023What is malware analysis and why is it important?Are you familiar with malware analysis? It’s an essential aspect of cybersecurity that deserves a closer look. In this article, we’ll provide a concise yet comprehensive overview of malware analysis and walk you through the key steps involved in the ...DiscussMalware
Rohit Telgoterohittelgote.hashnode.dev·Jul 8, 2023Stuxnet: Unleashing the World's First Digital WeaponIn the annals of cybersecurity, few threats have garnered as much attention and intrigue as the Stuxnet virus. Unleashed in 2010, Stuxnet was not just another malicious program but a highly sophisticated digital weapon designed to sabotage industrial...Discuss·35 reads#stuxnet
Dev P IshailiforDev P Academydevpacademy.hashnode.dev·May 14, 2023Modern Computer Literacy - Course OutlineOverview This certified online course offered exclusively on the EDUPORA platform is tailored to meet the needs of individuals who are looking to improve their computer literacy skills. The course comprises three modules that cover a wide range of to...Discuss·4 likes·31 readsComputer Literacy for Today's Modern Eracomputer