Internet and Blogs

5 steps to acquire a virus

1. I want to download Microsoft Office 2007 for free with its crackgen

image After writing this, Google immediately brings you many options, so you decide to do it through an exchange network between users known as P2P. So without thinking you select a very popular one: edonkey with all his cronies:

emulate, emulate Plus, EMule Pawcio, amule, shareaza, Lphant, MLDonkey, xmule, Imule ... all with names so beautiful that you feel at home.

2. Using the torrent bit

After you download it, you install it, it asks you to register and that's it.

3. Upload the torrent file

You open a torrent file and start downloading while redirecting you to a page with porn of the thin

4. Downloading the program

The program takes about 8 hours to download, so you leave the machine at night unloading.

5. Okay, you have your virus installed.

In the morning you get a message that says: warning, it seems that your computer has acquired a virus, do you want to remove it?

You answer yes and a crazy race begins between pop-ups that only lead you to buy a paid version, say yes or no, you always get another virus. You try to run the taskmanager but it tells you that an administrator has disabled that task, as well as regedit and cmd.

Finally, as you do not have much output, you start crying with fat tears, you look in a forum and it assures you that this is an invasive page, that your username and password have possibly been stolen and possibly tried to see if the account and password you gave match your Paypal account.

... let's make the story short, you end up formatting your machine, after paying a couple of fake antivirus licenses with your credit card number that they will surely use against you.

Conclusion, if you usually hack, first investigate which of these torrent clients are malware free ... in the end you will always suffer.

Golgi Alvarez

Writer, researcher, specialist in Land Management Models. He has participated in the conceptualization and implementation of models such as: National Property Administration System SINAP in Honduras, Management Model of Joint Municipalities in Honduras, Integrated Cadastre-Registry Management Model in Nicaragua, Territory Administration System SAT in Colombia . Editor of the Geofumadas knowledge blog since 2007 and creator of the AulaGEO Academy that includes more than 100 courses on GIS - CAD - BIM - Digital Twins topics.

Related Articles

7 Comments

  1. a query, you could explain in a post what is the main difference between the kml format and the shp

  2. Hello:

    I have installed the following Spybot S&D antispyware and then I have checked the equipment with the antivirus panda and the truth is that at the moment it has not given me any more problems. I hope the problem has been solved because it can be….

    As I said in my previous comment I took it from the page of INTECO, I hope it serves you.

  3. Hello:

    Sorry for my lack of clarity I really wanted to ask if that program was anything but I forgot the question.

    After investigating a little I found the page of inteco (I think belongs to the ministry of industry) where you can download several free tools to protect and clean your computer:
    http://www.inteco.es/Seguridad

    They are within the free useful section, I am going to try some to see if I solve something and I tell you

  4. Thanks for the data, although I understand that if you do not pay the license of $ 29 only detects them to you, it does not eliminate them

  5. As you can tell, this works: Spyware Doctor® 6 for Windows®

Leave a comment

Your email address will not be published. Required fields are marked with *

Back to top button