- 4 hours ago
فسيلة - transplant
هي مكتبة رقمية تحتوي علي آلاف الفيديوهات العربية في جميع المجالات
It is a digital library containing thousands of Arabic videos in all fields.
قوائم تشغيل فسيلة
https://www.dailymotion.com/fasela/playlists
هي مكتبة رقمية تحتوي علي آلاف الفيديوهات العربية في جميع المجالات
It is a digital library containing thousands of Arabic videos in all fields.
قوائم تشغيل فسيلة
https://www.dailymotion.com/fasela/playlists
Category
📚
LearningTranscript
00:04I don't have to worry about the security of my insurance for a little while
00:06Huh?
00:07Secretary A
00:08They are demanding the ban on computers.
00:10I'll understand you later, Grandpa.
00:17The Jalal is ready
00:18We'll go and make the world a party
00:20Fodi Maghlat Al-Bashawra
00:22Stand there, Saleh
00:23We won't hit anyone, describe.
00:25What do you say?
00:25Cream and Dakhok
00:27hackers
00:27He will finish everything
00:29With his labyrinth
00:30Isn't that right, Kams?
00:32That's Jeddah
00:32What is the mulberry tree telling him?
00:34The word "Tari" is from CFC University.
00:36I'm neglecting all the devices of the Bashoura family.
00:38We ask for a video in exchange for returning all our actions to them.
00:41What is this nonsense you're saying?
00:43What are my actions and what are you lying about?
00:44They already have a landline phone.
00:47I'll go and steal an eye from their family.
00:48He's playing in the canal
00:49Oh Saleh, this is old talk
00:51There are no more children playing in the hills at all.
00:53They're all at the door now.
00:55Tochanito, definitely
00:56How much do we deliver to him, tell us
00:58This is noodles
00:59By the way
01:00I eat spicy balls
01:01Mastoura Dalghali
01:02What's up, Saleh?
01:03The sign
01:04Hinor Al-Nafukh
01:06What religion are you talking about?
01:08You are smooth
01:09Oh Abu Ayna, it's not smooth, oh Abu Ayna
01:10This is just for you
01:11He told me he'd try it for 30 years.
01:13I did that, that's it, the night of the feast
01:15All their bank accounts are now with us.
01:17Go away, Saleh!
01:18The men and their market were satisfied with the operation.
01:20Even if he's generous, he's not doing anything without his laptop.
01:24But suppose you call me, you're not going to...
01:28I'll have no value
01:30Like the lime I ate
01:32Why doesn't he have an era?
01:34He has no heart
01:35He doesn't have a Wheatspot with me
01:41Clearly, there's no point.
01:42But who is this, by God?
01:44If only because the sketch time is running out
01:46I suffered with you again
01:47They called them, they left
01:48Hahaha
01:49Sha'nam
01:50Hats Pant
01:52computer
01:53Peace be upon you
01:55So, Saleh, what's wrong with you?
01:56I'm telling you, Karim
01:57Why don't you give me the password for his hot chocolate?
02:00No, no, that's it.
02:01The man returned again
02:02Finished
02:04I'll keep your pockets again
02:05Tomorrow
02:05Yes
02:06Shani is needed
02:14Dear viewers, peace be upon you, and I know you are in a new episode of the Al-Daheeh program.
02:18In 1967, Lexley School in Seattle, USA, decided
02:22In the name of God, the Most Gracious, the Most Merciful, its students have entered the computer age.
02:25You might think, Abu Hami, that the term "tabwiyya" means "terrible" in this school.
02:28My dear, if you don't know, let me tell you for the 500th time
02:31At that time, the computer was a monumental and expensive achievement.
02:33The alternative was for the school to purchase user accounts for the students from General Electric.
02:38With these calculations, the device you see in the picture is the ASR 33.
02:42The student logs into his account and executes some codes on the device.
02:46The device then sends it via telephone line to General Electric pipes.
02:50General Electric computers process these codes and send them to the man.
02:55Of course, my dear, Bad's currencies were primitive, but at that time the cost could reach thousands of dollars.
03:00The school gathered them from the gatherings of the children of Amour
03:03And on top of all that, the student user accounts weren't open; that's a separate issue, and then Access would be blocked.
03:08Despite the difficulty of this process, the students became very attached to computers and programming.
03:13Who are these students? A 13-year-old student who will be one of the world's most prominent figures.
03:17He will establish one of the world's largest companies, which you'll recognize, my dear.
03:21Who is it, Abu Ahmed? What's with President Biden, my dear? What's going on?
03:25Bill Gates, my dear, what a picture!
03:27Why, Abu Ahmad?
03:28But you're interested in American affairs and American elections, you know that, Amwell?
03:32Bill Gates preferred to work with a colleague and two brothers-in-law who write programs and code.
03:37When the loan payments were exhausted, the parents said it was difficult to pay again.
03:41Bill Gates and his friend preferred to put pressure on the school until finally
03:44Buy from a local establishment called Computer Center
03:49Look, Aziz, this is all computer-based.
03:51Dear Fawz Laundry in the country
03:52Don't wash in it regularly, wash in it generally.
03:54But this computer, despite its capabilities
03:56Which is definitely better than the coding device they used.
03:59Why was this access also limited to accounts of a certain duration?
04:02At that time, Bill and Paul's aunt decided that they would exploit their shame.
04:05What should they do?
04:06They work as hackers
04:07Hey Abu Ahmed, they're doing a system update, my friend.
04:10They trick him into breaking the device's security.
04:12When they did this, the accounts became open to all students.
04:15With boundless affection
04:16Robe Al-Nahud on Al-Takhniya
04:17Adham Al Sharq or Softwin?
04:19Bill Gates, my dear, is a man who takes from the rich to give to the poor.
04:23When he became rich, we would take pleasure in his misfortune.
04:25Of course, my dear, the company senses that something is wrong.
04:27When he analyzed it, he felt that some kind of manipulation was taking place.
04:30There are a lot of geese inside, don't waste money
04:32That's how the company found out, brought Bill in, and requested the school for weeks.
04:36Here, Bill Gates gathered his friends, the dice, and the tearful
04:39programmer and teacher for Lexaite
04:41Oh, Mom, of course my name is Azizi, it's not scary at all.
04:43But anyway, he's young and all, so we'll encourage him.
04:46Anyway, these students went to the manufacturer's company.
04:48Computer Center CCC
04:49They told them, "We have successfully hacked into your computer."
04:53And I love you, meaning the people of the organization and stuff like that
04:55We help you and introduce you to the little ones.
04:57So, I mean children who are thirteen years old and so on.
04:59The one who swam for us, the one who left, is Nassar.
05:01On the other hand, we need an unlimited subscription for the keys.
05:03Of course, my dear, this story almost happened.
05:05The company manager would have been chasing them around like a madam.
05:08And he insults them with a group of metaphors against their families.
05:11However, in our story, the deal actually went through.
05:13Because the company was already overwhelmed by the number of times it had been hacked.
05:15Year by year, Abu Ahmad, you look like you're going bankrupt.
05:17Why, my dear?
05:18Isn't this the Bill Gates story you told before?
05:20Five hundred YouTubers have told it before.
05:22After the infiltration, the company will grow and expand.
05:24Windows will be ours, and God will make it easy for us.
05:26You're bankrupt, wait, you fool, wait!
05:29My talk today is not about Bill Gates
05:30Bill Gates has already spoken about it before.
05:32But today we're talking about monopolies.
05:34What's up, Abu Ahmed?
05:35The monopoly
05:36Hacking, my friend, began its journey the moment the first computer system was created.
05:40Just like any house, a house is built with a gate and a picture.
05:42A thief appears, sees him, and thinks about the small openings he can use to enter the house.
05:46The beginning of the hacking journey
05:47There were programmers in the 1960s at the prestigious Mighty University
05:49The great thing about these processes is that you're working on the task on the computer.
05:52But in a different way than what's in the catalog.
05:55Simply put, it means a small window within the system that you can access and use to complete the task.
05:58Just like Bill Gates did with the subtitles, he bypassed the security measures in a way not found in the company's manual.
06:01Hacking operations, my dear, to get
06:03I need a team player of his type
06:04This person can break the stereotypical thinking that people listen to.
06:07He thinks outside the box and the catalog.
06:09If you focus, you'll find this is the path to creative thinking.
06:11Hacking is a practical process that requires creativity.
06:13Hacking operations that involve this level of creativity
06:15The programmers at MIT in the 1960s called her a governor.
06:17It is defined as the detection of small devices that penetrate electronic systems of various types.
06:22Hackers, also known as Black Hats
06:24The black-clad friends
06:25They don't just discover flaws in school computers that make them apply more to them, like Bill Gates.
06:29Countries that might discover loopholes in banking systems
06:32Or companies of poverty
06:33No Facebook and Twitter
06:34He's playing a heavy game, meaning
06:35These systems can give them access to data on millions of currencies.
06:38Or important users such as politicians and celebrities
06:41These minor details could also lead to you being penalized for customer discounts.
06:45But there are other sites
06:45Like the famous hack that happened at Linkin.
06:47In 2016, hackers stole the currency data.
06:50And their passwords
06:51Passwords that unlock websites
06:52They went and tested it on all other websites and media.
06:55What are you doing, my dear, changing the password on the second site?
06:57So you can remember your password
06:58So I'm telling you, I've finally figured out the password for Linkin.
07:01Either I take it as is and try it out on Facebook
07:02Tak Fatah
07:03And a piece of advice, my dear, for God's sake
07:04Try any other password besides your mother's name.
07:06We know
07:07Strive to do what's important, my dear.
07:08From this breach of a different site
07:10Hackers know how to access Instagram, Facebook, and other websites.
07:13One small part in a controlled system
07:15It might be far from other locations
07:16But it stores data for millions of users.
07:19Here, a hacker could take this data and sell it to multiple beneficiaries.
07:23Let's assume that a certain small item could cost up to $100,000.
07:26The hacker could sell it to ten beneficiaries
07:28He secures a million dollars in the button press.
07:30Mustafa Al-Aghi's outfit
07:31Hacker's Table
07:31The websites and their black screens are abandoned
07:33Their world means it's constantly under surveillance and the watchful eyes of security agencies.
07:37FBI uniform
07:37Those who have a famous list of wanted hackers
07:40Wanted List
07:41Mohamed, excuse me for talking like that, but the details are important, you just skimmed over them.
07:44I'm sorry, don't take it personally.
07:46I'm not giving
07:47But either those million-dollar guys
07:49Ha
07:49Actually, no offense intended.
07:50Can I get my brother's oversized hoodie?
07:52I return in the darkness and type on the keyboard
07:54And the future
07:55my dear
07:55You want a million dollars, right?
07:56Dear viewer, please focus on your asphalt.
07:58Hacking was such an easy topic, just like we all did it.
08:00I am one of them
08:01Everyone take a cherry, a Indian-style, juicy treat, and come back, you hacker!
08:03But unfortunately it is difficult
08:04If we were to get angry, we would be humiliated.
08:05Hacking is, of course, a very complex process.
08:07Does the hair removal happen like that?
08:08Why not, Muhammad?
08:09Okay, no problem.
08:09The skills I teach you, my dear
08:11You can't keep being a hacker
08:12The last one will make you a mouse
08:14The first stage is the stage of
08:16The hacker is gathering information from you
08:18About a peeling process called
08:20What is known as social engineering
08:22Don Galban, my dear
08:23Your total is less than engineering
08:24But more than just social service
08:26No, of course not, my dear Mahza
08:26But today, for example
08:27Vodak hacker wants to know your Visa password
08:30It will gather information for you
08:31Like your birth date
08:31Your passport date
08:32Your children's birth dates
08:33Which numbers are important to you?
08:35People's history is lazy
08:36And you're trying to find easy numbers
08:38She is its keeper
08:39Then leave the password
08:40Sorry, Abu Hamad
08:41This is how my passport history is known.
08:42If you're not psychologically aware
08:43Dear, please
08:44Keep this information to yourself.
08:46Hassan, my dear, if you heard my comment, it would be a problem.
08:47How does this hacker know this information about me?
08:49I'm telling you, my dear
08:50How does the hacker know this about you?
08:51Amazing beautiful sights
08:52You are blessed, may God bless you, your face is radiant
08:55And you are in front of your Facebook About page
08:58She worked on putting down every piece of information she knew about you
09:01And about your loved ones
09:02With dates, figures, and details
09:04Keywords
09:05And the rest of Instagram is a book that writes your life story from the day you were born.
09:09Your family and your trauma
09:10Songs of Tafula and songs of Al-Kibar
09:12Everything
09:13If a piece of information is missing
09:15Get up and take me a cup
09:16So you know I'm a character from Frenz
09:19Nor am I a character from Gemoof Trunz
09:21And if there is still information that no one in the world knows
09:24You will agree to everything she suggests to you
09:26And I will embody anything
09:28Even if you don't need it to do something, what you're going to do
09:30The hacker accessed your camera
09:32And on your microphone
09:33And on your desktop
09:34All of this
09:35What is its importance?
09:36You divorced Chandler
09:37Congrats!
09:38One scroll through your social media pages
09:40It's like you're telling the hacker, "Go ahead."
09:42Take my mother's name and take my aunt's title.
09:43Take my job and take my interests
09:45Take my email, phone numbers, and home address.
09:47Take my whole life
09:49And that's it, congratulations!
09:50There's a hacker near you you don't know about
09:51The possibility of finding it
09:52One in 166 thousand
09:54What access to everything
09:56This is a phase, my dear, it's a phase
09:57Scanning
09:58Hackers target known vulnerabilities in the network.
10:01The one who targeted you
10:01For example, you have the small injection valve.
10:04If this was available on the network
10:05It can reach the hacker in an instant
10:07For its user database
10:08Then we move on to the third stage
10:10Asphaltation
10:11The hacker here is afraid of the small
10:12And it delivers the data it needs.
10:13And finally, because he's a professional hacker.
10:15He shouldn't be naive.
10:16He performs the fourth stage
10:18Back door
10:18I want to create a small space in it.
10:20Change the place he entered from
10:22So that when they come to discover the smallness
10:24The one who entered through it
10:24And they lock it
10:34Then he copies his virtual fingerprint
10:37His entry into the network sparked controversy.
10:38And he marginalizes them with his clothes
10:39In the world of hackers, my friend, there is a hierarchy.
10:41There's a regular hacker.
10:42And there is a great hacker
10:43And there is a super hacker
10:44They know from the whole world
10:45Like Kevin in disguise
10:46This man is dear to me
10:47Breakthrough in the nineties
10:48Forty American companies
10:49And tops the list
10:50The FVI of Most Wanted Hackers
10:53Until he was arrested in 1995
10:54This man
10:55Don't become a hero in the eyes of hackers, but
10:57no
10:57Oh, the cinema's immortality
10:59In the movies, like hackers
11:00It was produced in 1995
11:01Water Down 2000
11:02In the sale, my dear
11:03Hackers could have discovered its vulnerability
11:05The beneficiary sells it
11:06Instead of him entering
11:07Willows Edeh
11:08no
11:08He sells information
11:09I know there's a small one here
11:10Take the phone money
11:11Please come in
11:13It's possible that ten or more beneficiaries will sell it.
11:15As we said
11:15But when the hackers thought for a moment
11:17They discovered that the biggest beneficiary of the systems' weaknesses
11:21I'll surprise you, my dear, I'll tell you
11:22The systems themselves
11:23Wah wah wah wah wah
11:24Yes, my dear
11:25If I were a company that knew my little ones
11:26Hellesha
11:27Just like Bill Gates made a deal
11:28With the company that created it
11:29So that they know their little ones
11:32Righteousness, my dear
11:32I'm the one who kept quiet about this little thing.
11:34Because if someone tells you we don't have any hackers
11:35I want to hear something like this
11:36I told him, "Mohammed chose it now, Hana."
11:38Reference to him, my dear
11:39She tells you, my dear, that Bill Gates was a gentleman
11:41Thunder and Mushir with two cups of tea
11:43He spoke like any respectable child at twelve o'clock. Peace be upon you.
11:45He chooses a company system
11:46My, my
11:47It remains
11:47Hackers don't cheat companies themselves.
11:49She sends them a terrifying messenger
11:51This thinking suggests that the world has viruses more dangerous than Corona.
11:54AIDS
11:55Collectively known as VDV viruses
11:57Ransomware
12:06All your files have been encrypted
12:08If you can open or restore it
12:10Unless you pay the video fee
12:12Your device has been hijacked
12:13Your files are held hostage
12:14In Folder, we know very well that it matters to you
12:16We're with you too
12:17Ahhh
12:17Pay the video
12:18This, my friend, is a brief explanation of the concept of video viruses.
12:20So, is this a question that will enter your device?
12:22Even if he pressed on it
12:22It takes over all your files
12:24Just like a biological virus destroys your cells
12:26Until the serum is complete
12:27Oh Muhammad Al-Masri, in this situation, please
12:29This file is very important
12:30A statement of truth to refute falsehood, my dear
12:33The Egyptian point here is that the hacker decrypts your files.
12:36He will return it to you
12:37But the Redeemer's taste, oh my goodness
12:38It depends on your financial situation.
12:39If the hacker finds a poor guy
12:41And he lived on the repeated year
12:42and the films of the Tourine
12:43They will ask you for about $200
12:45Because if your job is in technology
12:47Oh, how dark is the night!
12:48In 2021, Quanta was exposed
12:50The company that manufactures Apple devices
12:52And all her designs
12:53All the product designs available
12:55And more will be released in the future.
12:57Let's talk about the price of these things, my dear.
12:58together?
12:58This company was hit by the Vidia virus.
13:01Encrypt all her files
13:03From hackers, his name is Meriefel
13:04Those who requested a $50 million video
13:06In exchange for deleting files
13:08And handing them the encryption keys
13:09Before I tell you, my dear
13:11I didn't value the matter at all.
13:12Before she put this in her forehead and pushed
13:14While in the same year
13:15Specifically on April 21
13:17The Netherlands crushes the famous country
13:19With 280 types of cheese
13:21Because suddenly, my dear, you'll find cinnamon in its shops.
13:23Without cheese
13:24This, my dear, was in Egypt
13:25I woke up and didn't find Pat Foley
13:26He said, "What? Is it possible for someone to eat cheese?"
13:28This was due to the Vidia virus.
13:30Packer Logistics was exposed to it
13:31The one that supplies cheese from the factories
13:33For all of Holland's supermarkets
13:35And Beach doesn't know what to supply to where.
13:37Because all records were encrypted
13:39Arefan, my dear, doesn't know who ate the cheese.
13:41What's wrong, Ahmed?
13:42For Umm Sultafeh
13:43Here's my cheese craving
13:44I'm Clanchoun, Sidiya
13:45And longing for Apple
13:46I'm holding an Android
13:47Tahweh, my dear
13:48The crisis isn't in the brand.
13:50You can leave it for someone else.
13:51Hackers could be targeted by national security.
13:53For an entire country
13:54This, my friend, is what happened in one of the most famous video viruses.
13:58What we know
13:59Wadakrai
14:00I mean, I want Aida
14:01In 2016, a team of hackers breached the system.
14:04They are called Shadow Brokers
14:05US National Security Agency servers
14:08NSA
14:09They declared their conversion to dangerous minorities
14:12For famous shoes like Windows
14:13Put it up for sale now, the best price!
14:15But nobody legislated
14:16Oh America
14:17You're not fooling us, nor is she.
14:18The group of their time is dangerous.
14:19I'm telling you, my dear, but no one has responded.
14:21Hey everyone, I'm in a very important situation.
14:23Wednesday, God willing
14:23I'm looking into this matter.
14:24Here the hackers said, "Okay, fine."
14:26Since no one is taking us seriously
14:28So we'll cut these small pieces and distribute them
14:30Remove
14:30Indeed, my dear
14:31They cried out and preferred to strike the young ones
14:34One after the other until the fifth
14:36And what you almost did, my dear, was a serious mistake.
14:38In the Windows system
14:39Which even Microsoft didn't know about
14:41To fix it with an update or even a match
14:43First of all, these are small things
14:45The hackers took control of it.
14:46And through it they spread the Vidia virus
14:48His name is WannaCry
14:49Fares, my dear, has started copying himself.
14:51From one Windows device to the second
14:52200,000 devices
14:53In more than 150 countries
14:55He got infected in one week
14:57Fortified companies with secure systems
15:00Nissan, Renault, and FedEx uniforms
15:02All countries are infected
15:03Qatar stations, restaurants, institutions
15:05To the point that social media is spreading memes
15:07The virus reached the washing machine.
15:08But the most dangerous place
15:10The virus reached her.
15:11English National Health Service hospitals
15:15The virus encrypted the company's files
15:17What exactly is he going to do to them?
15:18Lose money
15:19If someone else's washing machine is being refurbished, what will they do to it?
15:20God will enter and place the colored
15:21But if he encrypted the hospital data for me
15:23Some patients may die
15:25Because their entire medical history is encrypted
15:27Their operations
15:28The garbage they have
15:29And developments in their condition
15:30The redemption spray, my dear, is a people's leader.
15:32As happened in one of the German hospitals
15:342020, the year of Corona
15:35In the hospital season
15:36When the patient's fingers were encrypted in a critical condition
15:39She died trying to get her shoe into the Harm hospital
15:41This is the first documented case of a victim of the Fadia virus.
15:44Those countries, my dear, have no heart.
15:45He describes science as if it were a digital trix
15:47It is organized and contains weaknesses.
15:49We must take advantage of it
15:50Hospitals are a weak point of the ideal.
15:52In the eyes of hackers
15:53Security analyst Brett Kellow
15:54He says hospitals are among the easiest targets.
15:57She cannot bear the atmosphere of her own greatness
15:59For a long time
16:00Because of the critical cases she has
16:01My dear uncle
16:02Only one type of ruler
16:03Ransomware
16:04Not just arrived
16:05It poses a threat to national security.
16:06And it didn't reach the level of food you eat, like cheese in Poland.
16:09He also arrived at the hospital where she was being treated.
16:13This is the hacker Charlie Milk
16:14The one who discovered his smallness in the Cherokee mountain
16:16I let him control the operations
16:17Contrary to her will
16:19And his story inspired the famous Fastlane Furious films
16:21Praise be to God for her sufficiency
16:22Its security system is impossible to breach.
16:24He walks
16:25The hackers who carry out this operation, my dear
16:27They are in a good place
16:28If it reached them
16:29You will face protection from violent gangs
16:31Russian gangster costumes
16:32The fact that investing in one hacker
16:34He might bring them all together with one plan
16:35fifty million dollars
16:36Zay Fi Haqwanta
16:37So why are we dealing in weapons and drugs?
16:39And we hit each other with fire
16:40And we get hurt
16:41And we bring six children from the mother IT
16:43We protect them, guard them, feed them, and give them drink.
16:46We provide them with protection
16:47And yes, they answer them, Flom
16:48Do you see, my dear, that people understand?
16:49People are pros in Al-Dahiha
16:51Dear beautiful viewer
16:52I don't want you to be afraid because I won't leave you without a solution.
16:54At one of the most famous hacking conferences
16:55Qadfken
16:56I ask the governor and programmers about the definition of a governor.
16:58We said, Abu Hamid
16:59These people discover small items and sell them.
17:01Or you blackmail people with it
17:03Two eyes, my dear, for contemplation
17:04The programmers provided twenty answers
17:06Not just this answer
17:07That's the answer, my dear.
17:08Black Hat
17:09The world is being misled on this issue.
17:11But every side is black
17:13In the light location
17:14Oh Abu Hamid
17:14This means there are different colors.
17:16Hey dear, let me tell you
17:17On the white hat
17:18The only force of good so far
17:20Because of which the world
17:21The Black Hats didn't control him
17:23My dear friend, Fedi knows him as an ethical hacker.
17:25Ethical hackers
17:26Batfel with them, the companies and the block
17:28Under IT supervision
17:29They hack into their systems
17:30They submit reports on these minor details.
17:32So that security systems remain effective
17:34The company tells you
17:35For example, no one can hack me.
17:36Okay, I'll bring my limit, it penetrated me.
17:37I have a house
17:38And the renter of the thief's rest
17:39Money is the alternative
17:39So that he can be creative with his ideas
17:41How to make my house private
17:42And everything he says is about small things
17:43I lock it
17:44So when he comes to me, he's a real thief.
17:45I didn't pay him money
17:46Neither Yaqees nor Saghrat
17:47For the time of hackers, countries
17:48They perform all the steps of the hack
17:49With this, the backdoll step
17:50They are satisfied with just defining minorities
17:52Standing for her
17:52And sometimes these good hackers appear
17:54Without even understanding the company
17:56Brazilian hacker outfit
17:57Pejinaldo Silva
17:57Any Brazilian name you think would suit her would be nice.
17:59Pesta Silva discovered a small Facebook account
18:012014
18:02And the reward is $35,000
18:04And the company contracts were awarded to him
18:06Until an engineer is appointed
18:07Cyber security on Facebook
18:09For the people
18:09The one who's a Ginaldo Dolly, my dear
18:11Google companies
18:11barrage
18:12Uber and others
18:13They kept advertising the anesthesia
18:15Inviting hackers
18:16They discover the minor details
18:18With promises of programs
18:19and rewarding bonuses
18:20Before, for example
18:21Hacking rewards
18:23It starts from $25,000
18:24For one million dollars
18:25According to the lines of fusion
18:26She'll give you money
18:27The companies in the White Hat
18:28It's not just happening because of companies' fear of the virus
18:31The virus could come and destroy it.
18:32As we talked about the VIDIA viruses
18:33and its significant financial losses
18:35But because the companies that expose the hacker
18:36It also involves legal forces
18:38To compensate users
18:39I am unable to protect their data.
18:41Like the GDPR law
18:42Those who imposed the European Union
18:44To compensate for any leak from the company
18:46Citizens' data
18:47Any EU citizen
18:49So what do companies tell you?
18:50Instead of getting humiliated
18:52And I have to pay a very high price.
18:54For my customers
18:55Because of GDPR
18:56Which could reach twenty million euros
18:58I started with one pocket
18:59Give him one million euros
19:00He answers the small ones
19:01Thank you
19:02But you'll find out about the nerd
19:03I don't know any companies that accept
19:04Can't you see it or what?
19:06Let me, my dear
19:07Let me give you an example
19:08Vitriol Company
19:09The most famous are
19:09With the support of innovators like me
19:11I tore her apart
19:11The example will close 15
19:12The immigrant is kind and respectful
19:14He tells them
19:14He has all their databases.
19:16He is asking for his financial reward.
19:18He wants to be satisfied with a couple of pennies, that is.
19:19So that they can block the fire
19:20And delivers the data
19:21The man is here, my dear.
19:22They couldn't forget him
19:23But he meant
19:24He's asking for a reward
19:24My shoes are like Brazil
19:25He means, my dear, he's telling them
19:26All the girls are kind and smiling
19:28Fight them here
19:28Instead of paying the bonus
19:29It operates an incentive program
19:31Like what Google did in 2010
19:32I thanked Mr. Huckle kindly and respectfully
19:34We will post a thank you in your name
19:35On our page
19:36God made it easy for you
19:37And you are well
19:38Here's where the hoarder found the company
19:39I rejected the action and its reward
19:40The same threat
19:41And I hit a brick in the glass jar.
19:43Work data
19:44They all got infected
19:44Password of the card
19:45Bills and Mail
19:46I hate the inn, my dear, about
19:47The morality of this act is lacking
19:49But many companies are feeling the pinch
19:50This is a big topic
19:51We really need to think
19:52In programs
19:52Rewards
19:53Respected
19:54Because of these people
19:55It remains satisfactory
19:55Don't cause us any trouble
19:56For the good hacker
19:57He's not thinking of making Breaking Bad.
19:58And Ab’alim says
19:59Nazem, we invest in him
20:00And we invest in it
20:01With generous amounts as well
20:02Here's the good hacker
20:03Let's not deviate
20:04And when he succeeds, leave her with the paper and the Adam
20:05Until the halal shark
20:06With the blackbird
20:07And he'll win more than Black Hat
20:09He will spend it on his escape trip.
20:10From the FBI
20:11Interpol
20:12Why does the light only do that?
20:13And it has a headache for a while
20:14This is from the action
20:16The one he promised
20:16Facebook Cyber Security Manager
20:18Ryan Majer
20:19He says
20:19There is a million dollar bug
20:21we would pay it out
20:22If there's a bug coming
20:23One million dollars
20:23We will buy it
20:24Mohammed, why?
20:25Galia asked her the question
20:26Oh, your fire
20:26Dear, the question has been embarrassing me since today.
20:28Why are you embarrassing me, Aziza?
20:28But you know, Muhammad
20:29I'm a man who owns companies.
20:30And now
20:31Based on what you said
20:32But he tanned in the White Hat
20:33Don
20:33I know the solution
20:34But God forbid
20:35If I get a virus
20:37What should I do?
20:37Is White Hat
20:38They will be right and save the company
20:40And it won't be one axe on the head.
20:42Come on, my dear
20:42The hero who saved the world
20:44From the terror of the virus
20:45Wanna cry
20:46The most dangerous virus in the world
20:47I know him
20:47It was a novel.
20:48After the virus
20:49It spread throughout the world
20:50And it bypassed Microsoft and Windows devices.
20:52And the departure of companies and hospitals
20:53He disappeared suddenly
20:54Without prior warning
20:55This was due to the security researcher
20:57Marcus Hotkins
20:58The one who preferred to solve the programming code
20:59for the virus
21:00Using reverse engineering
21:01Reverse Engineering
21:02They are the Abu Hamin countries
21:03They begin their studies with a perforation project.
21:05They graduate from engineering school
21:07On the contrary, it means
21:07Oh, my dear, right.
21:08Now, does this have reverse engineering?
21:09The important thing, my dear researcher
21:10Discover a small part in the virus
21:11It is programmed
21:12First, the device's share
21:14He is trying to reach a specific website.
21:16Website doesn't actually exist
21:17He hears randomly
21:18Well, Abu Hamin does that.
21:19This, my dear, is one of the ways
21:20Those who use it for hackers
21:21To avoid cybersecurity companies
21:23They do virus analysis for their people.
21:25They are operating within fictitious work systems.
21:28And they analyze it
21:29If the virus cannot reach the site
21:31Written by the programmer
21:32And the way we say
21:32It's not even available on the internet.
21:34Then he will continue his work as usual.
21:35The emitters are encrypted and their spread is completed, and so on.
21:37Either he manages to reach this location
21:39This means that there is a false bias within it.
21:41Specifically for cybersecurity companies
21:43Here he takes his devices
21:44Stop working and wipe yourself with the device
21:46Here, Mr. Marcus poured the purchase and registered
21:48This site is indeed
21:49And here the spread of the virus completely stopped.
21:51Because the virus remains, every time it is installed on a new device
21:54He is trying to reach the site that was with the programmer
21:56Why does it exist? It's not imaginary.
21:57Therefore, I will stop working.
21:59Because that's his system in the first place.
22:00He wipes himself with the device
22:01That's how Marcus saved millions of devices worldwide.
22:04From the Walkray virus
22:06News agencies hailed him as a national hero.
22:08My dear, my time
22:10The world was big in the eyes of our ancestors.
22:11Not because his help is great
22:13Because the world is helping itself
22:14But if it was the right time
22:15Humanity's ability to explore and control the world
22:18It was limited
22:19Is he working?
22:19Limited
22:20The world needed explorers who could cross a sea
22:22Armies travel, complete decisions
22:23To get spices and import salt
22:25The language of each person is locked away in books of paper.
22:27It could be destroyed by fire
22:28Entire civilizations
22:29The saying has been destroyed for us
22:30Because every head of hers was paper
22:32But the world is as you say
22:33I learn through digital and technological advancements
22:36Not just with a young reader
22:37The desk drawer remained
22:38small squeeze
22:39Large application
22:40It is bandaged
22:41For the world's largest network
22:42Facebook
22:43It can connect you to billions from where you are
22:45And a civilization of entire centuries
22:46It can be stored on a single hard drive.
22:48Complete Nations
22:49It is possible to trade
22:50In clothes in roses
22:51The area of a state exceeds that of a mega-dragon
22:52And seven megabytes with no pictures
22:53The petroleum used in airplanes and car travel
22:56It can reach you in a short time from village to village
22:58And this was an advantage
22:59However, its only flame
23:01Electronic and digital mechanics
23:03Which develops it
23:04We've got it, eh?
23:05But by penetrating it
23:06Possible in a moment
23:07Let's return to the middle ground.
23:08Aziz Al-Superbakitat
23:09A mountain lives there
23:09And the same button press
23:10Which could connect you to billions of people around the world
23:12It's the same thing that can isolate you from everyone.
23:15And that's what happened with the smugglers
23:16With the American Cologne Company
23:17The one with the largest pipeline system
23:20For refined petroleum products in America
23:22Each one produces 2.5 million barrels per day.
23:25Eastern Nights
23:26Dear Company
23:27She was exposed to the Vidia virus, which encrypted her data.
23:29His friends asked for $5 million
23:31Suddenly all the vehicles stopped.
23:32The country was on the verge of reverting to its central state.
23:35The FBI, the CIA, and all security agencies
23:38She was in a state of delusion
23:39Up to 100 people enter
23:40From Abu Hamad to President Biden
23:41Indeed, many deserts
23:43First time I've come into this context
23:44Oh Abu Hamad, you finally put it in its proper context
23:46You are excellent
23:48President Biden intervened himself
23:50He reassured people that the company would restore its operating systems.
23:53Abu Hamad's smile
23:54A frightening crisis has hindered civilizational progress for centuries.
23:57In civilization
23:58And it wasn't resolved.
23:59Not paying the video
24:00Oh Abu Hamad
24:01The American president means
24:02The FBI and the CIA
24:03They didn't know how to get justice for the people.
24:05President Kabir, my dear, it's not easy.
24:06In our current time
24:07With Sol, real and virtual communication
24:09Humans have been transformed into data distributed across 1000
24:12A simple hack can access all your data.
24:20Armies are fighting
24:21To target a location
24:22Or get rid of it with a specific symbol
24:24Or hastening a need
24:25One small one is possible
24:26In the program "Zay Saghra"
24:27on Facebook
24:28Allows the programmer
24:29He controls millions of accounts
24:31And it directs her to like or dislike anything
24:33Certain events act as trends
24:34Like the page "Whispers of Confusion"
24:35The one who posts fake news about Adel Imam and Amer Qadeem
24:37The page "Madness of Truth"
24:38My dear, you always click on the link
24:40To complete the news
24:41He is a link to Dama, who is asking Ali about his family.
24:42It's difficult, my dear, that he's gone back to the paper centuries.
24:43Because paper is like a memory preserver for centuries
24:46It is among the presences that burn
24:47My advice to you, my dear, after this episode
24:48Don't forget, always in the virtual world
24:50If you feel safe, that's good.
24:51The internet is treacherous and destructive.
24:53But your roses, keep them safe.
24:54Your files are being backed up
24:56Your protection system is updated
24:57Whoever tells you how to solve this, obey them.
24:58The antivirus that you haven't used in years, bring it back again.
25:01You can't access anything that says "View before deletion"
25:03What you're trying to delete
25:04By the way, everything now has a "view before deletion" message on it.
25:06It doesn't get deleted
25:07Cat
25:08In my videos, dear, on YouTube
25:09It existed a million years ago, YouTube isn't there.
25:11And I still haven't regretted it
25:12And most importantly
25:13If you see the past life
25:14See the life ahead
25:15Let's look at the sources
25:16If we're on YouTube, we'll subscribe to the channel.
25:19Thank God
25:20Is Trump in it?