User Manual
Viruses: By attaching themselves to les and infecting other
les, they can spread uncontrollably, damaging a system’s core
functionality and deleting or corrupting les.
Rootkits: Software that allows an intruder to obtain root
access to a computer system. It is often hidden and can go
unnoticed by antivirus detection and removal.
Spyware: A program that hides in the background and
spies on users, taking notes on their online activity, including
passwords, credit card numbers, surng habits and more.
Trojans: Disguised as legitimate software, users download
trojans thinking they are useful pieces of software, instead
they end up with an infected computer.
Worms: These are self-replicating programs intended to spread malicious code. Using network
interfaces, they can infect entire networks, either local or across the Internet.
Ransomware is a type of malware with the ability to silently encrypt your les and make your system
unusable, before demanding an online ransom payment in exchange for a decrypt key.
what is aes 256-bit encryption?
AES
stands for Advanced Encryption Standard. It is a
symmetric block cypher that is adopted throughout the world
to encrypt sensitive data.
256-bit refers to the length of the encryption key used to
encrypt a data stream or le. a hacker or cracker will require
2
256
* different combinations to break a 256-bit encrypted
message.
AES has never been cracked and is safe against any brute
force attacks.
*2
256
=115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,9
13,129,639,936
AES 256-BIT
ENCRYPTION
malware
explained