background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП"

input logo icon
Video tags
|

Video tags

топ 10
компьютерные вирусы
заражение компьютера
типы компьютерных вирусов
виды компьютерных вирусов
самые опасные компьютерные вирусы
вири
червь
троян
топ вирусов
обзор вирусов
Conficker
Storm WORM
вирус чернобыль
CIH
Melissa
WinLocker
Code Red
Sobig F
Ransomware
вирус Шифровальщик
Блокировщик Экрана
Mydoom
ботнет
Stuxnet
DDoS
павел мудрый
спец комп
#спецкомп
топ
павелмудрый
вирусы
компьютер
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:00
[music]
00:00:07
Hello everyone Today I will talk about the most
00:00:09
dangerous viruses that have been encountered
00:00:11
recently; viruses are naturally
00:00:13
computer viruses because my channel is
00:00:15
computer. Well, let's go, the first
00:00:18
thing I want to talk about is the kofir virus,
00:00:21
which I personally even dealt with I
00:00:24
personally cleaned computers of this
00:00:26
virus, a very nasty virus because it
00:00:29
stung everything in its path and its structure
00:00:33
was a worm, which means the kofir virus was a
00:00:35
computer worm that infects
00:00:37
Microsoft operating systems at that
00:00:39
time it was XP Vista and the seven virus
00:00:43
appeared in 2008, it is extremely
00:00:46
difficult was discovered because it is
00:00:53
infectable even to printers, this
00:00:55
infection
00:00:57
connects the computer to the botnet, the
00:01:00
so-called Zombie computers that
00:01:02
can be controlled by the creator of this
00:01:04
virus, botnet is a network of
00:01:07
computers that can carry out
00:01:09
certain orders of the creator of
00:01:12
the virus and can, for example, bring down very
00:01:15
large sites in order to
00:01:17
then demand money from these
00:01:20
sites and, accordingly, the owner of this
00:01:23
virus made money mainly from the fact that
00:01:26
he had entire farms of botnet networks,
00:01:30
here is the next next virus that
00:01:33
I want to talk about is the Storm Worm virus, the essence is
00:01:36
almost the same as the config the
00:01:39
only thing is that it
00:01:42
did not spread as quickly and not as
00:01:44
tightly as the config. So, it was mainly
00:01:48
distributed through email;
00:01:51
in email, most often there were
00:01:54
files like Yar or Dog and, accordingly,
00:01:57
through these files, opening these files, the
00:02:00
computer
00:02:03
infects the email through which it got
00:02:06
onto the computer from this mail,
00:02:08
spam mailing could have been carried out and also from this
00:02:11
mail they could send letters with the same
00:02:14
virus. By the way, I think that many
00:02:18
who are a little older had such a problem
00:02:21
that Oh, my mail was hacked and
00:02:24
someone from my mail was sent to my friends
00:02:26
sends out letters that I didn’t send out,
00:02:29
so it was just the Storm Worm virus,
00:02:32
well, we’re moving on. And the next
00:02:35
virus I want to talk about is the
00:02:37
sneeze virus, and there were a lot of rumors about it,
00:02:40
actually in the Russian language
00:02:42
segment about this virus they know about the
00:02:45
Chernobyl virus and this virus supposedly
00:02:48
completely watered the computer, watered the
00:02:52
processor, watered the motherboard, in
00:02:55
fact, nothing like that happened, this
00:02:57
virus appeared in 1998 and was
00:03:00
invented, in my opinion, by a Taiwanese
00:03:03
software developer, the
00:03:05
virus was originally conceived
00:03:08
in order to show others what it
00:03:10
is vulnerabilities in the BIOS in the BIOS of the
00:03:14
motherboards that were then
00:03:16
used and, accordingly, what
00:03:18
the virus did, it simply disabled
00:03:21
the BIOS, or more simply, it simply overwritten the BIOS,
00:03:24
respectively, after overwriting the BIOS,
00:03:26
the computer could not start, not a single
00:03:28
peripheral device
00:03:30
and all other devices could not
00:03:32
start without the BIOS and, accordingly the
00:03:35
computer simply stopped working, but
00:03:37
it was easy to fix it; the
00:03:39
programmer was connected to the encore; it re-
00:03:43
flashes the computer and the computer continued to
00:03:47
work. So it’s a myth that this virus
00:03:50
stupidly completely watered all the parts and they
00:03:53
burned out and then nothing could be done with them;
00:03:55
this is a sun myth. And the next
00:04:00
virus which I want to talk about is the
00:04:04
Melisa virus, which
00:04:06
caused quite a lot of damage to the American FBI, so
00:04:11
they made it in
00:04:13
1999, it spread through
00:04:16
e-
00:04:17
mail, in principle, it was very similar to the
00:04:22
same sneeze and which Chernobyl
00:04:25
we call nans is quite
00:04:27
big the damage to the
00:04:30
FBI is in the region of 3,600 million dollars, that's what the
00:04:35
damage is to nance this virus, in the end the one who
00:04:38
made this virus was found to be sent
00:04:41
to prison for only a year and a half and they
00:04:44
fined him only 5,000
00:04:47
dollars. That is, he caused this virus
00:04:50
Damage of 300 600 million And his fines
00:04:54
were only about n mowers Well, let's move
00:04:57
on and one of the most famous
00:05:00
viruses in the RuNet Well, probably for many
00:05:04
one of the most dangerous is Winlocker and
00:05:08
tran Winlocker which blocks either the
00:05:11
work screen or, more precisely, the desktop
00:05:16
or it also blocks access to the browser.
00:05:19
That is, there were many different variations of
00:05:22
this virus, mostly these were some kind of
00:05:25
banners or porn banners on the entire
00:05:27
desktop; the same thing could be done in the browser and,
00:05:30
accordingly, nothing could be done about it. The
00:05:33
first time this virus appeared
00:05:37
somewhere in around 2007 That’s when
00:05:42
everyone started having problems. I even remember the moment
00:05:44
when I was still personally repairing
00:05:47
computers. One kid called me
00:05:50
and said that this guy on my
00:05:53
computer is full screen, these guys and
00:05:55
aunties are doing something bad.
00:05:59
Mom sees her and she’ll kill me. come
00:06:02
Please do something about this
00:06:05
virus because it’s not me. I
00:06:08
didn’t go to any sites or
00:06:10
do anything like that. Well, in the end I
00:06:14
went and made this kid a computer.
00:06:17
He was in seventh heaven
00:06:19
because his mother Dad didn’t find out
00:06:23
that he had caught such a verk, well, realistically, if
00:06:26
they had seen it and he really wasn’t to
00:06:28
blame because he caught it.
00:06:30
Elementarily, through some kind of executable
00:06:32
for the game trainer, they would have inserted it into him, of course.
00:06:36
Well, most of us are familiar
00:06:38
with this virus because
00:06:40
this virus is still developing very well and
00:06:44
still blocks the desktop of many people, but
00:06:48
we move on. And the next virus
00:06:50
that I want to tell you about is the
00:06:53
codre virus, it appeared in 2001. It was
00:06:57
developed by the Chinese, by the way, I want to say
00:07:00
about the fact that most of
00:07:02
these global beliefs that were
00:07:04
invented, they were all developed
00:07:06
by the Chinese, pay attention to this, the worm
00:07:09
spread through browsers and mostly
00:07:18
they became infected, too, and by going to
00:07:21
other sites that you opened, you
00:07:24
could infect these sites themselves, that is,
00:07:28
roughly speaking, you were accomplices in
00:07:30
the spread of this virus, as a result,
00:07:33
this virus was distributed to, in
00:07:37
my opinion, 4,000 on four hundred thousand
00:07:41
servers around the world, including
00:07:44
this virus that infected the White House web server
00:07:47
and caused damage
00:07:50
of 2.6 billion dollars worldwide huge damage when
00:07:54
infected with this virus on many sites there
00:07:56
was an inscription hacked by a Chinese, that is,
00:07:59
or the site was simply completely
00:08:02
translated into Chinese and led to
00:08:05
some interesting Chinese resources, well,
00:08:09
we move on And the next one Our virus
00:08:12
is a dog F And this one of the modifications of the
00:08:16
Sobi virus, in my opinion, the sixth Yes, the sixth
00:08:19
modification, this virus began its
00:08:22
life in 2003, it spread
00:08:25
through email after
00:08:28
you opened a letter with this virus,
00:08:31
this virus sent copies to all your
00:08:33
contacts from contact lists from
00:08:36
computers, that is, to all your contact
00:08:37
again
00:08:38
sent spam with the same virus
00:08:41
without your knowledge. And this was one of the
00:08:45
fastest spreading viruses
00:08:48
in history because everyone who opened
00:08:50
this letter sent it to a
00:08:53
whole bunch of friends, acquaintances,
00:08:55
workers, and so on, the same virus in
00:08:58
general within the first 244 hours, this
00:09:02
virus infected a million computers. What can I
00:09:05
say? What happened next? The
00:09:08
number of infected computers
00:09:10
increased with an arithmetic
00:09:12
progression, but in the end, after
00:09:15
a few months, all people began to be very
00:09:18
careful about what came
00:09:21
to them in letters and, accordingly, this
00:09:23
virus a little has lost its
00:09:26
relevance, well, we move on and,
00:09:29
again, one of the vilest
00:09:31
viruses that even exists on the
00:09:34
RuNet now is a ransomware virus, in our country
00:09:38
it’s called ransomware, and
00:09:41
its real name is rans VR.
00:09:44
This ransomware does what it does: it encrypts
00:09:47
personal files and folders with some personal
00:09:50
documents with photographs and so on.
00:09:54
That is, everything that can be found of your
00:09:57
personal encrypted, he encrypts it all into
00:10:00
archives that are then
00:10:02
impossible to decrypt without a certain key and
00:10:05
puts all your files in the archives then
00:10:08
extorts money from you so that you
00:10:11
pay for it decrypt
00:10:14
some of your personal files I talked about
00:10:17
how to decrypt files completely
00:10:19
free of charge in one of my
00:10:21
previous videos, so watch it
00:10:24
and in 99 percent of cases you
00:10:28
can easily decrypt files encrypted with this
00:10:31
virus. Well, if you, of course,
00:10:34
had such a virus, this virus appeared in
00:10:38
2013 So it really started to grow, and
00:10:42
one of the interesting things is that
00:10:45
in just the first 3 months of
00:10:48
distribution, the scammers who
00:10:50
came up with this virus were able to
00:10:52
earn 27 million US dollars, that is,
00:10:56
roughly speaking, 10 lyams per month from
00:10:59
their brainchild. So what? to speak after
00:11:02
these 3 months have passed and the
00:11:06
infection began to continue, many
00:11:08
at first foolishly sent money, but in
00:11:12
the end, even if
00:11:15
it went away, it won’t work because they
00:11:19
simply don’t send decryption codes, that’s
00:11:22
all We move on And the next virus
00:11:26
I want to talk about this is mom, more precisely,
00:11:30
if you read English correctly,
00:11:33
this virus is the fastest
00:11:35
spreading computer worm in
00:11:38
history, so far no one has beaten it in terms of
00:11:42
spreading speed, and besides,
00:11:45
even today no one knows who
00:11:48
made this virus. What is
00:11:50
this ordinary virus actually like? a
00:11:53
text file in which the source code
00:11:56
says Hello, I'm Eddie and I'm just doing
00:12:00
my job Nothing personal Sorry, that
00:12:03
is, this is the go-ahead written by the
00:12:05
creator of this virus At the end of
00:12:09
2004, at the end of January, within 24
00:12:12
hours from the moment the virus was launched, the virus
00:12:15
infected millions of computers
00:12:17
it also spread all over the world, as
00:12:20
usual, by email, this virus
00:12:23
created a huge botnet that could even
00:12:27
bring down such sites as Microsoft and
00:12:30
Google sites. That is, there is very powerful
00:12:33
protection against various botnets, but still,
00:12:36
in the end, the botnet at this time was allowed to
00:12:40
the owner to handle such
00:12:43
giant sites as Google on a shovel. This is of course
00:12:47
very impressive. Well, that’s why this
00:12:49
virus in my personal rating takes
00:12:53
second place, as far as I know, as far as
00:12:56
I know,
00:12:58
this virus has caused, in my opinion, something in the
00:13:00
region of 40 billion dollars of damage
00:13:04
around the world from the action of this virus Well, the
00:13:08
last virus that I wanted
00:13:10
to talk about is the stn virus and,
00:13:13
accordingly, it does not harm ordinary
00:13:17
computers, but I put it in first
00:13:20
place because thanks to this virus
00:13:23
you can destroy not only computers, but
00:13:27
also people in general, what kind of virus is this
00:13:30
virus on in fact, it infects
00:13:33
only certain computers
00:13:37
that use, for example,
00:13:40
special algorithms in order to
00:13:42
work, for example, at power plants at
00:13:46
hydroelectric power stations at various
00:13:47
enterprises where
00:13:52
the services of providing some kind of
00:13:55
communications are used or somehow provided to the population. That is, for example, at
00:13:57
a power plant we we get light, for example,
00:13:59
to a water intake, we get water and so
00:14:02
on in large countries. In developed countries, a
00:14:05
lot of things are computerized there,
00:14:08
so a virus gets onto these
00:14:10
computers that control all
00:14:12
these systems, there is electricity supply,
00:14:15
water supply and so on, it
00:14:18
can change their normal operation And this is
00:14:22
accordingly can lead to such
00:14:24
problems as, for example, if the computers of
00:14:27
a power plant are at the same time, for example,
00:14:30
at a nuclear power plant, this virus
00:14:32
can stop the turbines or
00:14:34
set the cooling temperature and
00:14:38
all this can result in a nuclear
00:14:40
explosion. Well, that is,
00:14:43
I won’t talk about this in detail, but The point is
00:14:45
that this virus threatens not only
00:14:47
computers, but this virus can threaten
00:14:50
people and this is very dangerous and this is very
00:14:54
sad. The first time this virus became
00:14:57
known was in 201, the Iranians found it at
00:15:01
their nuclear nuclear power plant,
00:15:04
as far as I know, maybe not at a
00:15:07
power plant Maybe they
00:15:08
wanted to come up with something there, nuclear weapons of some kind.
00:15:11
Well, that’s not the point, the point is that this
00:15:14
virus gradually increased the speed of
00:15:17
rotation of the nuclear centrifuges that
00:15:20
supported the plant and, accordingly,
00:15:22
thus Slowly destroyed them, and with
00:15:25
complete destruction this could lead to the fact
00:15:27
that
00:15:29
there could be a
00:15:30
leak of nuclear fuel and, accordingly,
00:15:34
contamination of everything
00:15:37
around the nuclei with nuclear contamination, roughly
00:15:40
speaking, like the same Chernobyl here,
00:15:43
so the virus is very dangerous. Well, I
00:15:46
hope that I was able to Tell you about the
00:15:49
most dangerous viruses that
00:15:51
we have today, if you are interested,
00:15:55
I will leave one comment under the video about
00:15:57
how you would like to know how they differ,
00:16:01
for example, viruses, trojans, worms What
00:16:04
types of viruses are there in principle
00:16:07
on our computers now? If you
00:16:10
want to know about this, I’ll leave a
00:16:12
comment, you like it when you
00:16:14
reach 200 likes. I’ll then
00:16:17
file away. Bye to
00:16:28
everyone Until the New
00:16:30
[ Music
00:16:44
Video

Description:

Мой ТОП самых опасных современных компьютерных вирусов! Ключи на Windows 10 Pro по выгодной цене - https://vk.com/market-43241369?w=product-43241369_1386957 10. Червь Conficker 9. Червь Storm 8. CIH у нас известный как ЧЕРНОБЫЛЬ 7. Melissa 6. Троян WinLocker у нас известен как Блокировщик Экрана 5. Code Red 4. Sobig F 3. Ransomware у нас известен как вирус Шифровальщик 2. Mydoom ботнет который в силах положить самые крупные сайты мира. 1. Stuxnet вирус который может убить даже человека! Оглавление: 0:00 – Введение 0:18 – Conficker 1:32 – Storm Worm 2:34 – CIH 4:00 – Melissa 4:57 – WinLocker 6:48 – Code Red 8:09 – Sobig F 9:28 – Crypto ransomware 11:25 – Mydoom 13:08 – Stuxnet 15:46 – Заключение

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "САМЫЕ ОПАСНЫЕ компьютерные вирусы, мой ТОП"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.