Back in the early days of personal computers, each user needed a good dollop technical expertise. The system does not start? Open the bag and turn on any expansion cards, maybe, or polish the terminals with a pen selector. Ask for help during Question Time at the PC User Group Meeting. Try adjusting some settings in the CONFIG.SYS file. Funny things! But that time is far away. Modern computer devices only work mostly, which can be so boring. Here's a thought to season your life – why not get your computer infected with malicious code?
What happens if you started your computer and it was flashing a warning that the FBI is investigating you? Or did you just open your browser to confront a snowmobile of fun and colorful ads? Who knows, maybe your computer could be among the zombie army dependent on a cure shepherd to take down a big site! Would not it be cool?
To open up for the entire malware experience, you really need to do some work. Modern operating systems and computers are only for darn nanny-state protection, and almost every new computer comes with a pre-installed security package. Here are some tips to help you in this exciting world.
Choose the right device
Love your Mac? Your iPad Pro? Well, for now you have to put them aside. There is no doubt that malware for macOS exists, but you can get old and gray to wait for an attack to meet. When it comes to iOS, forget it! Anything that causes MacOS problems when trying to get malicious code goes double for iOS.
What you need is a good old computer running Microsoft Windows. The older Windows version the better; Newer releases have some annoying built-in security features. If you can find a box that runs the outdated Windows 95, it's golden! Microsoft stopped supporting this valuable antique operating system in 2001, and hackers have had years to exploit it.
If you can not come with a Windows device, go to Android. That's what the malware writers do! Lots of Android devices are stuck in an old Android version because the seller does not support updates, including security updates. Lollipop, anyone? Android fragmentation means there are many vulnerable phones out there.
Avoid Malicious Protective Equipment
If you attempt malware infection, obviously you do not need to have malware. It would defeat the whole purpose! But wait, do not just take away your antivirus software. It's not as simple as that.
See, Microsoft really really wants you to have some kind of antivirus protection. If Windows 10 detects that you do not have any other antivirus software, it automatically runs on Microsoft Windows Defender Security Center. In the past, that would not have been a problem, because Windows Defender was so lame. Unfortunately, however, the latest version shows better test results.
You may think you can turn off Windows Defender by digging in security settings and reversing Real-Time Protection. Defender continues to do scheduled scans, so it's not a real solution. Yes, if you are a PC guide, you can edit the registry to place a bet through Windows Defender's heart. Are you a wizard? I did not think so.
Your best bet is to check our reviews of antivirus software and select one with bad points. You can also try to keep the antivirus program active, but disable scheduled scans and real-time protection. Better than, use an older version of Windows, one without any security padding.
Tell the browser to turn off
Modern browsers think they know everything. Download this, but do not load it. This site is ok, but you can not go to that one. Throw away the browser's tyranny! You are the one who is responsible, after all.
Of course, the way you avoid oppression is to distinguish between browsers. In Chrome, click Settings from the menu, click Advanced, and turn it off under Privacy and Security. If you are partial to Edge, select settings from the menu, click View advanced settings, scroll to bottom, and turn off Windows Defender SmartScreen.
Firefox users should click Options, select the Privacy and Security tab and uncheck the box labeled Block dangerous and deceptive content. On the Internet in primary school, press Alt + T to open the Tools menu, select Windows Defender SmartScreen Filter, and turn off the feature.
That's it! You are free to browse all on the web, not just the places your killjoy browser permits. Check out shady links, blogs without color, sites that offer free tools wherever you can imagine.
On PCMag, we infect conscious computer with malicious code, to test security products and have our own methods of collecting malicious samples. If you are impatient to launch the malware party, there are lots of resources available to the public, including the Contagio Malware Dump site and the KernelMode.info discussion forum.
Click on all links!
OK, you have removed the barriers to obtain a malicious program infection. Now then? Where is malicious software?
First stop – your email account. Skip the known emails from your boss, and your Esther Esther. Look for oddball messages from unknown people. If you can not find them, check the spam folder. When you find an offer to meet a Russian bride or receive millions from your lost Nigerian cousin, click on the link to see what they want to show you.
If the webpage indicates that you need to install a new video codec or driver or anything, go straight! It may be a dull update, but it may be a bit of cool malware. If you do not look interesting, do not give up. Some malicious programs work behind the scenes. But if you are lucky you can see an entertaining screen like the one below. Do not worry; The FBI is not really after you. This malware just blues.
Do not stop with links in your emails. If you see a weird ad while browsing the web, take a look! It can be just an incredibly new product, but it can also be a hacker who tricks for computers to infect with malicious code.
Get free storage with free malware
You do not pay for the USB thumb drive, do you? I mean that people give them away everywhere. Go to a seminar, you get the text on a thumbnail device. Your children may take homework from school on an inch unit. If you can wangle yourself into the Black Hat pressroom or other security conference, you'll find a host of press releases on thumb drives. The boring security wonks do not take them, so it leaves more and more for you.
You've heard the phrase "See a penny, get it all day, you're lucky." Well, it's certainly better luck to find an inch effect on the sidewalk or in the parking lot!
Most USB applications are high enough to start automatically when you plug in the device. If nothing starts, explore what's on the device, see what kind of interesting applications are waiting for you to enable them.
If you are using an older computer, you can join some free fireworks. Originally shown at Black Hat, now marketed as a testing tool, USB Killer uses the computer's own USB power to charge the capacitors, then the 200-volt zap. If the hardware is not properly buffered, the result may be exciting.
Do not be disappointed if the thumb unit does not seem to contain anything interesting. It may be secret to take over your computer without any visible evidence. And, if nothing else, you got a free tumble!
Joy of Ransomware
Malware that lets you be desired by the FBI is cool. Adwares flashing amount of ads can be as entertaining as a kaleidoscope. And your heart safely picks up with an alarm of alarm and excitement when you find that a bank trojan has emptied your account. But there's nothing to compare with a full blown ransomware attack, especially when you've disabled any boring ransomware protection that may interfere with your computer.
Basic file encryption ransomware can be entertaining. Once it has encrypted your documents, it displays a colorful passcode in several ways. Some types change the entire desktop to a password. Others display the note in your browser or in Notepad. You will decide if you want to go through the payment process for kappa and dagger or to enjoy starting fresh, without the luggage of the old documents.
File Encrypters are OK, but for real excitement you want a full disk encryption like the infamous Petya ransomware. Watching Petya in action is a catchy experience, like watching a spy movie.
First, it reports a system crash and it looks like the real thing. You wait, in excitement, while it (probably) creates the crash report. Then restart the system. At restart, you will see a regular text screen warning that CHKDSK will repair the file system and that if you turn off the computer you can destroy all your data.
But surprise! It's not CHKDSK, it's Petya. And it does not solve your file system, it encrypts the entire disk. Once it is clear, a blinking red / white skull image provides a colorful idea that you have real problems.
You tap a key, the skull changes to a messy (but non-flashing) payout amount. Unfortunately, this may be the end of your malicious tests if you do not choose to pay the amount of money and hope for the best. But you really went out with a blow!
Take the safe, paved road
What do you say? You like when using your computer is boring? You do not want to experience the thrill that comes when you invite harmful code into your life? Well, you miss you. But you can still get some use from this article. Just follow all the steps and suggestions, but do the opposite – while you're on maybe you might want to start using a VPN standard.