Detect Hackers & Malware on your Computer (literally for free)

Detect Hackers & Malware on your Computer (literally for free)

John Hammond

9 месяцев назад

295,749 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Carl Jones
Carl Jones - 17.11.2023 08:23

Why are you yelling into your microphone? Had to turn my volume down to watch. Good content otherwise.

Ответить
Louey2x
Louey2x - 17.11.2023 06:18

is it actually Cisco using TCP? and how do we confirm that it is, maybe it's one of the unassigned UDP ports.

Ответить
batmob8
batmob8 - 16.11.2023 21:36

"Sometimes it misses..." Lols! Deliberately even! 😝

Ответить
TrueRandomization
TrueRandomization - 16.11.2023 02:30

is this a paid commercial?

Ответить
NosePowder
NosePowder - 14.11.2023 19:09

lmfaooo, just using your common since will keep your from getting malware on your computer, windows defender and Malwarebytes is fine, I wouldn't trust anything this guy says.

Ответить
Aaron AG
Aaron AG - 14.11.2023 14:47

What if you bought a laptop / Desktop from eBay with windows already installed ? How can I check that they haven't installed a key logger or Malware etc ? I bought a laptop and moved the 1TB M2 Drive onto the 2nd drive and not primary drive. My primary drive is 512gb has a Dual boot Ubuntu / Win11 but I want to use the 1TB M2 drive but don't want to add my personal details till Im sure it's clean. Thanks

Ответить
tv pi
tv pi - 13.11.2023 09:43

so you want us to download some software that we can change the whole "config" of, like that would make a difference. And let it do what ever it wants on our system, all because you talk loud??

Ответить
C C
C C - 13.11.2023 02:40

Looks interesting but my first thoughts are that the plain text yml based signatures are vulnerable, they should be locked in an encrypted vault, otherwise an attacker can just change the rules before running their attack on a machine and then ta da no alert pops up.

Ответить
The Coding Hat
The Coding Hat - 12.11.2023 17:15

I saw it was you and was bamboozled by the comments. Surprised you arent a bit more popular

Ответить
Megsman
Megsman - 12.11.2023 03:38

My internal sigma rule detects adware.

Ответить
G4MERLIN
G4MERLIN - 11.11.2023 04:19

i dont trust never free edition with email subscribstion so no thank you

Ответить
NepSky Inc.
NepSky Inc. - 10.11.2023 21:13

This is not free unless you're a product of them!

Ответить
Mr Marbles
Mr Marbles - 10.11.2023 08:22

Why smart guys can’t open the file like a normal human being and they need to launch it via terminal?

Ответить
Kresimir Ivkovic
Kresimir Ivkovic - 08.11.2023 20:34

OK best, how uninstall this ?

Ответить
Jessica
Jessica - 08.11.2023 16:58

Hey!
How do hackers make it look like I’m using Facebook and dating apps/sites on my phone if I don’t have any of those ?

Ответить
O Quinto Dominio
O Quinto Dominio - 07.11.2023 13:19

Hello, I'm from Brazil, your channel for me is a reference on the subject of cybersecurity

Ответить
LD Weary jr
LD Weary jr - 07.11.2023 04:18

What about protecting your privacy rights against Pegasus spyware on iOS?

Thks..

Ответить
Fabian Lazarte
Fabian Lazarte - 03.11.2023 00:13

Subbed!

Ответить
Hobo Wily
Hobo Wily - 02.11.2023 19:44

Should be labeled as an Ifomercial

Ответить
CitizenFortress
CitizenFortress - 02.11.2023 16:51

Wouldn't Wazuh be able to do all this too?

Ответить
full_metal_truther
full_metal_truther - 31.10.2023 23:04

Yiu didn't link it?

Ответить
comediavietii
comediavietii - 30.10.2023 01:45

i will never get haxed

Ответить
Doc Malitt
Doc Malitt - 29.10.2023 18:23

Just a q… why so many types of rules? It looks like everyone is shillings their own rules. Now u could say there’s no rule that fits them all but since there’s a site for transforming/translating between the rules tha is aaaa maybe aaa not true. Especially because they all have a PAID version… so strange. Sigma delta, Andrew Tate rules remind me like phone chargers before USB-C and unification of standard.
Second q, is there a Linux version?

Ответить
mye kuntz
mye kuntz - 29.10.2023 00:25

Hey just want to say thank you for taking the time and going step by step on not just this but how to open a zip file ,us noobs gotta start somewhere, thanks again 😊

Ответить
pepeshopping
pepeshopping - 28.10.2023 04:46

Wrong!
Only the "experts" that say " its a matter of time", and the general public GET hacked!

A REAL pro has the BEST AV, MULTIPLE security solutions, intrusiom detection systems, honeypots, backups/snapshots and WHATEVER it takes to either, NOT be taken, or be able to have EVERYTHING back withing 6 hours!

Ответить
אילנה לויט
אילנה לויט - 26.10.2023 19:20

After so many years of following John I start to feel like I’m just watching ad videos for companies idk

Ответить
César Baxin
César Baxin - 24.10.2023 18:56

How it works the MUI of Xiaomi un Android? Are they embebed sistems?

Ответить
Lazaristas
Lazaristas - 23.10.2023 17:28

Best macOS equivalent?

Ответить
It's All A Simulation, Man
It's All A Simulation, Man - 21.10.2023 17:10

"it's not a matter of if, but when." ancient cybersecurity proverb.

Ответить
custume
custume - 21.10.2023 11:19

on this business our mantra is : "there are NO invulnerable systems, only hard to crack"

Ответить
Mario J Palomares
Mario J Palomares - 19.10.2023 19:39

by Gmbh?? lol

Ответить
Calvin Klein
Calvin Klein - 19.10.2023 15:23

Greetings, can you make a paypal bypass video?

Ответить
Florida Penguin
Florida Penguin - 19.10.2023 08:32

Great Job I absolutely love it I already have something flagged that antivirus did not flag and I think this is one of the ways to get familiar with how ones system works even from a beginners level of understanding.

Ответить
Ian Raphael
Ian Raphael - 18.10.2023 15:43

nice work john...love all the way from Kenya

Ответить
shawn henderson
shawn henderson - 17.10.2023 21:26

Not sure what I'm doing wrong but I can't access aurora in the terminal. So it won't let me run the scripts. Any help is appreciated

Ответить
tentimesful
tentimesful - 17.10.2023 19:31

my computer were hacked once, I couldnt believe, everytime I opened quran of some people reciting very good and passionate they would remove it next day... weird I couldnt find it... good thing I backed it up, but then they started to make sound out of the quran... and they started to move my files around randomly, I knew I had a problem... in the end my laptop was hacked heavenly or by aliens by showing me out of the screen there came out orange kind of hologram and I was so scared and just shut everything down and put my laptop away in a closet... so it cant be destroyed... maybe godly hack soon after that I saw hologram of a light shaded by dark cloud like, also saw hologram that showed me gargoiles with wings trying to enter a building that shined light with two strong doors and mekkah people sitting infront of ka''aba hologram... I want crazy as this heavy magnetic thing hit my head froze me too much eventually I stood at front of my window and i tripped and broke it and never came back...

just before that yes you wont believe it was a 2 birds flying through my front door window closed I killed them both and put them in the trash can, as I was afraid of 1000 birds coming in lol.. but all things stopped though after window I broke... maybe it was from God maybe it was these bastards testing stuff... like the fruit flies that come out of my garbage with only ash snot toilet paper and oil...

Ответить
sikaloba muzyamba
sikaloba muzyamba - 17.10.2023 09:57

Does aurora detect man in the middle attacks ?

Ответить
5ter1ing n0things
5ter1ing n0things - 17.10.2023 08:49

Ah! Thank you for this. This won you a subscription from me because this is a great way for me to dive deeper into cyber security and discover more. I appreciate this. New student of Cybersecurity Technician so this will be of incredible use.

Ответить
aDaily
aDaily - 16.10.2023 16:51

John I think you're trying to appeal to the "average user" but the average user doesn't have the technical knowledge for this stuff. I didn't realize until scrolling through the comments how many people outside the industry are watching these videos. People in the industry know you're a legend and take you seriously. Alot of your viewers right now dont even know who you are. I'm honestly not sure how they found this video. They probably got a virus and searched "how to know if i got hacked" lol. Anyways, you're great. So is the content. We appreciate it! Keep it up!

Ответить
Sushant 12k
Sushant 12k - 16.10.2023 16:26

man oh man this man is really in a hurry!

Ответить
Josh Morgan Tech
Josh Morgan Tech - 16.10.2023 09:35

Why do they have to ask for my email??

Ответить
B C
B C - 16.10.2023 06:49

Another hipster with a beard with a Shure SM7b that thinks it makes them a broadcaster.

Ответить
Tullock
Tullock - 16.10.2023 05:50

Reinstalling windows from a USB drive to an NVME drive literally takes 5minutes. No internet connection. All worry free. Also, reinstalling windows could reset some program trials for you (if they're not connected to social media account)

Ответить
TechFan
TechFan - 16.10.2023 00:51

A very nice ad for aurora

Ответить
Anon Fourtyfive
Anon Fourtyfive - 15.10.2023 23:53

Just install my program bro, I'll clean everything.

EVERYTHING.

Ответить
ᴅᴋ
ᴅᴋ - 15.10.2023 20:04

nothing is completely "free"

Ответить
Gamereditor
Gamereditor - 15.10.2023 17:01

I am listening.......

Ответить
Zuber Kariye
Zuber Kariye - 15.10.2023 10:23

It's quite confusing to determine the number of EDR/SIEM/SOAR tools available, as there are numerous options such as Splunk, Aurora, Corelight, Zeek, MS Sentinel, Snort, Wireshark, Datadog, Graylog, Security Onion, ELK, LogRhythm, and Google Chronicle. As a beginner, it can be overwhelming to choose the right tool. Can someone please explain the differences between these tools and offer guidance on which one I should focus on?

Ответить
Simone P
Simone P - 14.10.2023 23:12

What is the difference between this and thor can you help me understand please?

Ответить

STOP MILK education | Коли закінчувати грудне вигодовування Ніна Зайченко – все про грудне вигодовування
hplayer permitted