IJRTI
International Journal for Research Trends and Innovation
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2456-3315 | Impact factor: 8.14 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

Call For Paper

For Authors

Forms / Download

Published Issue Details

Editorial Board

Other IMP Links

Facts & Figure

Impact Factor : 8.14

Issue per Year : 12

Volume Published : 11

Issue Published : 118

Article Submitted : 21507

Article Published : 8513

Total Authors : 22399

Total Reviewer : 805

Total Countries : 158

Indexing Partner

Licence

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Published Paper Details
Paper Title: ENCRYPTING VIRUSES
Authors Name: Omkar Darekar , Dnyanesh Mohite
Download E-Certificate: Download
Author Reg. ID:
IJRTI_182295
Published Paper Id: IJRTI2206262
Published In: Volume 7 Issue 6, June-2022
DOI:
Abstract: Encrypted virus is a computer malware that has become a serious threat to global business in the last five years. An encrypted virus is defined as a computer virus / malware that can encrypt the payload and make it difficult to detect. Ransomware and Crypren are examples of encrypted viruses that encrypt victims’ files. Encrypted viruses use encryption methods to hide them from malware (antivirus) scanners. Shuffle the code to prevent detection. However, all encrypted files in your computer system require decryption, so you can use anti-malware integrated with decryption to detect viruses. Encrypted virus-related variants are characterized by encrypting files on infected computer systems and networks, while some variants delete files or computer networks / systems. It is intended to block access to. When infected, the encrypted virus modifies existing registry entries and destroys system processes that can interfere with encryption. To perform encryption on a computer system / network, an encrypted virus can probably start performing numerous activities on the host computer, perhaps starting by checking if the virus propagates in a virtual environment. increase. If the confirmation is positive, the virus may delete itself and the file will not be encrypted. However, in a real operating system, when an encrypted virus invades your system, it will begin encrypting your files.
Keywords:
Cite Article: "ENCRYPTING VIRUSES", International Journal for Research Trends and Innovation (www.ijrti.org), ISSN:2455-2631, Vol.7, Issue 6, page no.1763 - 1767, June-2022, Available :http://www.ijrti.org/papers/IJRTI2206262.pdf
Downloads: 000205288
ISSN: 2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publication Details: Published Paper ID: IJRTI2206262
Registration ID:182295
Published In: Volume 7 Issue 6, June-2022
DOI (Digital Object Identifier):
Page No: 1763 - 1767
Country: Pune, Maharashtra, India
Research Area: Engineering
Publisher : IJ Publication
Published Paper URL : https://www.ijrti.org/viewpaperforall?paper=IJRTI2206262
Published Paper PDF: https://www.ijrti.org/papers/IJRTI2206262
Share Article:

Click Here to Download This Article

Article Preview
Click Here to Download This Article

Major Indexing from www.ijrti.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

ISSN Details

ISSN: 2456-3315
Impact Factor: 8.14 and ISSN APPROVED, Journal Starting Year (ESTD) : 2016

DOI (A digital object identifier)


Providing A digital object identifier by DOI.ONE
How to Get DOI?

Conference

Open Access License Policy

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Creative Commons License This material is Open Knowledge This material is Open Data This material is Open Content

Important Details

Join RMS/Earn 300

IJRTI

WhatsApp
Click Here

Indexing Partner