Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
some questions about viruses, miners, antiviruses and encryptors
Message
<blockquote data-quote="Tomoko" data-source="post: 1128158" data-attributes="member: 122954"><p>Hi, I have a few questions and I’d really appreciate some clarification:</p><p></p><p>1. About miners: If you keep the Task Manager open in the background for a long time, will a miner process be able to detect that it’s just running in the background and that nobody is actively checking it?</p><p></p><p>2. About antiviruses: How do antivirus databases work? How exactly do they detect malware — for example, do they compare the code to specific known malware signatures in the database?</p><p></p><p>3. About encryptors: How do they work, and what are the different types of data encryption?</p><p></p><p>I’m asking all of this to better understand how these systems work in practice. Thank you in advance!</p></blockquote><p></p>
[QUOTE="Tomoko, post: 1128158, member: 122954"] Hi, I have a few questions and I’d really appreciate some clarification: 1. About miners: If you keep the Task Manager open in the background for a long time, will a miner process be able to detect that it’s just running in the background and that nobody is actively checking it? 2. About antiviruses: How do antivirus databases work? How exactly do they detect malware — for example, do they compare the code to specific known malware signatures in the database? 3. About encryptors: How do they work, and what are the different types of data encryption? I’m asking all of this to better understand how these systems work in practice. Thank you in advance! [/QUOTE]
Insert quotes…
Verification
Post reply
Top