1 |
Computer stealth virus, a rebel who disguise to remain unidentifiable |
2 |
Non-resident virus, a direct action file infector virus but still not dangerous |
3 |
Resident virus,installs code in memory which infects future programs |
4 |
Polymorphic virus,change signature each time they spread or infect |
5 |
Parasitic virus,hacks the operating system rights |
6 |
Multipart**e virus,tricky and hard to remove |
7 |
Logic bomb,dormant until conditions are met |
8 |
Carding more than just a headache for merchants |
9 |
Card-not-present transaction fastest growing payment and fraud segments |
10 |
Spoofing of 7 types to loot your credit card |
11 |
Credit card theft by hackers |
12 |
Encrypted virus, the evolution of new techniques for the virus. |
13 |
Paying hacker is no bad thing,it is reward |
14 |
Potentially unwanted applications, malicious software authors s***ft |
15 |
Direct action virus,file-infecting,non-resident weak virus |
16 |
Companion virus amazing computer virus with zero bit change |
17 |
Browser hijacker (pua) a nuisance and danger for financial security |
18 |
Backdoor virus a burglar of all times |
19 |
Overwrite virus infected files can’t be recovered |
20 |
File infector virus a parasite virus overwriting the files |
21 |
Directory virus path changer of computer directory |
22 |
Heuristic analysis, unseen malware |
23 |
Heuristic virus, the term can often be misleading. |
24 |
Spacefiller virus,one of the most intelligent virus |
25 |
Making of the first computer virus boot sector virus |
26 |
Computer virus-from annoyance to a serious threat |
27 |
Top 10 computer malware- nuisance world of bad guys |
28 |
11 tips to make your computer faster |
29 |
Apple iphone 12, apple is going to reinvent the iphone,ı’m addicted |
30 |
Recover deleted whatsapp chats from from iphone or android without backup |
31 |
Wifi my kids fight the feeling and are happy |
32 |
Wpa is a security protocol to secure wireless (wi-fi) networks |
33 |
Credit card security standards built in for secured transactions |
34 |
Formjacking, cybercriminals new tool for skimming attacks |
35 |
Data encryption in computing world |
36 |
Cryptography, cryptovirology, kleptography |
37 |
Artificial intelligence can help fighting malware |
38 |
Artificial ıntelligence, end of human era, way to future aı god |
39 |
Bluetooth making file sharing easy |
40 |
What types of headphones you should buy |
41 |
ıs there human voice cancelling headphone |
42 |
Headphones tutorial part 5 bleed, noise cancelation |
43 |
Headphones tutorial part 4 cirumaural and supraaural |
44 |
Headphones tutorial part 3 dynamic and electrostatic headphone |
45 |
Headphones tutorial part 2 ımpedance and sensitivity of headphone |
46 |
Headphones tutorial part 1 pitch and loudness profile |
47 |
Cloud storage is on cloud nine |
48 |
Bits and bytes,computers run on a bunch of ones and zeros |
49 |
Barcode, 4 lines on miami sand |
50 |
Computer file repair,quarantine,and delete |