I'm just about completely new to hacking/cybersecurity- related affairs and would like to learn about malware, mainly Trojan horses and specifically those that plant cryptocurrency miners or perhaps ransomware. How do these work, where can they be found, how are they implemented and is it legal to possess them? If possible, please explain in simple terms.
P.S.: I feel like I should add that this is just for fun and to satisfy my curiosity, not for malicious or criminal reasons
Thank you for your help!
[link] [comments]
from hacking: security in practice https://ift.tt/h4fvXkA
Comments
Post a Comment