● In this video: I’m talking about a serious Windows vulnerability that would allow an attacker to make a hidden miner and distribute it in a ".txt" document! When you open a text file, it turns out that this is not a text file, but a full-fledged application with the .exe extension. How to protect yourself from such a threat? Watch this video and you will have no questions left.
****************************
● https://goo.gl/nF4wiu - Software that was in the video. Remember about possible backdoors, analyze only on a virtual machine.
● https://goo.gl/fSUSW7 - ResourceHacker
****************************
● Subscribe to this and my second channel: https://goo.gl/Yrs8v4
● Donate link: https://www.donationalerts.com/r/unde...
● I am on VK: https://vk.com/TheUnderMind
#######################
● The best products for HaSkers:
✓ Inexpensive hackers smartphone [supports Kali Linux (Nethunter)] - http://ali.pub/35zes7
✓ Alfa - Best WiFi Adapter (works in Kali Linux and Nethunter): https://goo.gl/sv7Vuf
✓ True-Hackers clock: http://ali.pub/3an2pt
✓ Splitter USB port 1 to 4: https://goo.gl/pBoQPW
✓ Hackers mini Bluetooth keyboard with backlight: https://vk.cc/9iIijH
✓ Backlight keyboards: https://vk.cc/9iIl7l
✓ Mouse pad with TOP backlight: https://vk.cc/9iIfw5
✓ OTG Micro USB Adapter: https://goo.gl/H7pLVT
✓ WiFi Jammer (Deauthorizer for WiFi): https://goo.gl/i7VHWP
✓ Raspberry PI 3 B + (you can make a hack station): http://got.by/3an086
✓ Ruby Duck BadUSB (Hatsker device in the form of a flash drive): https://goo.gl/wfTvK4
✓ USB Network Adapter: https://vk.cc/9iIVW3
✓ Duplicator of RFID keys and cards: https://goo.gl/snvemZ
✓ Reader and duplicator of phone SIM cards: https://goo.gl/we9brk
✓ Plastic card reader and duplicator: https://goo.gl/sKamy7
✓ Cheap but very powerful walkie-talkies: https://goo.gl/dKibg5
✓ Micro camera: https://goo.gl/bJcbsd
✓ Inexpensive but powerful WiFi adapter: https://goo.gl/c5eWga
✓ Ultraviolet Fingerprint Flashlight: https://goo.gl/Bv19xK
✓ USB Tester to measure the capacity of the phone battery and PowerBank: https://goo.gl/aTttMU
#######################
● In the video "WINDOWS VULNERABILITY: HIDDED MINER IN .txt FILE | How to protect? UnderMind" - I tell you how an attacker can make a hidden miner, disguise his .EXE file for some useful program, and then distribute this hidden Miner in a plain text document. Well, as usual ... That we would think so, if we did not know about this vulnerability, which is associated with Unicode, namely with the special-symbol RLO. I hope that after watching this video, you will never fall for this trick!
● Remember, the author of the video in no way encourages you to create and distribute malware! This video is educational in terms of information security, and is designed to increase your vigilance while ensuring the protection of information.
● Everything told in the video is the fabrication of the author of the video. Everything that happens in the video - fake and made using the installation, and in real life has nothing to do. Any coincidence of software titles or any events is a complete coincidence.
Watch video HIDDEN BTC-MINER IN .txt FILE! | Windows 7/10 vulnerability | Protect yourself! online without registration, duration hours minute second in high quality. This video was added by user UnderMind 08 June 2018, don't forget to share it with your friends and acquaintances, it has been viewed on our site 797,365 once and liked it 29 thousand people.