Drop in Trojan - Safe now?
Join Date: Oct 2008
Location: united states
Age: 45
Posts: 113
Likes: 0
Received 0 Likes
on
0 Posts
Cryptolocker (Ransomware)
Asymmetric encryption is part of the issue where a public key is used to encrypt, but a private key is needed to decrypt. It can go in reverse order, however, that former is usually the standard.
The math itself is based upon parametric equations from calculus (not to be confused with parametric statistics using a normal (Guassian curve) distribution.
My Malwarebytes has detected and deleted both back door Trojans and Trojan.Ransom. My VIPRE firewall has kept many would be attacks from even getting near my files or hard drive.
RSA, DSA and PGP are three forms of asymmetric encryption. I have a certificate in Cryptography and I have worked with some very strange malware types.
The math itself is based upon parametric equations from calculus (not to be confused with parametric statistics using a normal (Guassian curve) distribution.
My Malwarebytes has detected and deleted both back door Trojans and Trojan.Ransom. My VIPRE firewall has kept many would be attacks from even getting near my files or hard drive.
RSA, DSA and PGP are three forms of asymmetric encryption. I have a certificate in Cryptography and I have worked with some very strange malware types.
Join Date: Dec 2013
Age: 81
Posts: 316
Likes: 0
Received 0 Likes
on
0 Posts
No problem, nasties can only get in as apk files. Just check downloads for them and don't touch or click them, simply paste in a dummy file, then long touch that and only then select the unwanted apk, then multiple delete.
Easy!
Easy!
Join Date: Oct 2008
Location: united states
Age: 45
Posts: 113
Likes: 0
Received 0 Likes
on
0 Posts
oh I wish!
No problem, nasties can only get in as apk files. Just check downloads for them and don't touch or click them, simply paste in a dummy file, then long touch that and only then select the unwanted apk, then multiple delete.
Easy! ]
Easy! ]