1
00:00:00,080 --> 00:00:06,879
for as long as cyber criminals have been cooking up malicious software to do

2
00:00:04,520 --> 00:00:11,840
stuff like steal your precious data the security industry has been thinking up

3
00:00:08,960 --> 00:00:18,199
creative names for their little schemes Trojans worms ransomware you get the

4
00:00:15,559 --> 00:00:22,519
idea but one of the most Sinister forms of malware prevalent today is the

5
00:00:20,400 --> 00:00:27,080
dreaded root kit and although to the Layman this sounds like some kind of

6
00:00:24,640 --> 00:00:32,559
dental procedure an actual root kit on your PC can be far more unpleasant but

7
00:00:30,560 --> 00:00:36,960
then what exactly are they and why can they be even more problematic than other

8
00:00:34,600 --> 00:00:41,360
types of computer infections great question like with a lot of the other

9
00:00:39,200 --> 00:00:46,800
threats to your system the name rootkit reveals a lot it's derived from the

10
00:00:43,800 --> 00:00:49,520
concept of root access in the operating

11
00:00:46,800 --> 00:00:54,320
system Unix which allows a user broad permissions to change files and settings

12
00:00:52,280 --> 00:01:00,600
and while the means by which different rootkits access to uh usually off-limits

13
00:00:57,879 --> 00:01:07,000
parts of the computer differ all root kits serve the same general function to

14
00:01:03,519 --> 00:01:09,560
conceal either their own presence or the

15
00:01:07,000 --> 00:01:13,759
presence of another piece of malware so that it can carry out its nefarious

16
00:01:11,520 --> 00:01:17,920
Deeds on your system without you ever knowing and it's because of this

17
00:01:15,680 --> 00:01:23,600
concealing behavior that root kits are often very difficult to remove as many

18
00:01:21,439 --> 00:01:29,079
users in the mid 2000s found out when they realized Sony had shipped a metric

19
00:01:26,159 --> 00:01:34,680
butt ton of music CDs with root kits designed for you guessed it copy

20
00:01:31,200 --> 00:01:36,840
protection these rootkits hid the DRM

21
00:01:34,680 --> 00:01:41,840
software which limited what users could do with their Optical drives and also

22
00:01:39,280 --> 00:01:47,119
caused serious system slowdowns and introduced a ton of security flaws that

23
00:01:44,320 --> 00:01:51,560
other malware creators were able to take advantage of and then when Sony finally

24
00:01:49,479 --> 00:01:56,640
released a removal tool after news of the root kit went viral all it did was

25
00:01:53,719 --> 00:02:01,600
cause even more issues so how do rootkits hide themselves anyway while

26
00:01:59,360 --> 00:02:05,880
some root kits just inject themselves into your programs somewhat like

27
00:02:03,640 --> 00:02:11,120
traditional computer viruses the more dangerous forms run as part of your

28
00:02:08,280 --> 00:02:16,440
operating systems kernel no not the Chicken Guy but the core part of your OS

29
00:02:14,080 --> 00:02:21,280
that allows your programs to communicate with your Hardware through things like

30
00:02:18,280 --> 00:02:24,560
device drivers since drivers usually run

31
00:02:21,280 --> 00:02:27,120
in kernel mode many rootkits disguise

32
00:02:24,560 --> 00:02:31,760
themselves as drivers which is why you should only download drivers from

33
00:02:29,160 --> 00:02:35,959
trusted sources like the manufacturer's website no matter how badly you want to

34
00:02:33,680 --> 00:02:40,319
get your fancy new graphics card working what makes kernel mode rootkit so

35
00:02:38,040 --> 00:02:45,280
Insidious is that they essentially appear to be a part of the OS itself

36
00:02:43,480 --> 00:02:49,319
meaning you can't really trust your antivirus program to detect it or

37
00:02:47,879 --> 00:02:53,120
anything else your system says about itself for that matter and as if that

38
00:02:51,200 --> 00:02:57,080
weren't bad enough other kinds of root kits even go beyond infecting your OS

39
00:02:55,519 --> 00:03:02,200
kernel by doing things like contaminating your hard drive's boot

40
00:02:59,080 --> 00:03:04,280
sector often done to break encryption or

41
00:03:02,200 --> 00:03:11,000
getting into your systems firmware such as your motherboard or GPU BIOS if that

42
00:03:07,840 --> 00:03:14,720
happens not even completely reformatting

43
00:03:11,000 --> 00:03:17,879
your PC will help well lonus that all

44
00:03:14,720 --> 00:03:19,840
sounds pretty darn awful um if I don't

45
00:03:17,879 --> 00:03:24,959
even know I have a root kit how can I get rid of them that admittedly is a

46
00:03:22,799 --> 00:03:30,080
challenge larger organizations have tried strategies like logging suspicious

47
00:03:27,640 --> 00:03:34,360
access requests through a firewall or dumping everything in A System's memory

48
00:03:31,959 --> 00:03:38,879
to look for malicious code but these aren't the kinds of things a home user

49
00:03:36,200 --> 00:03:43,879
can easily do modern motherboards with UEFI biosis have some features to block

50
00:03:41,360 --> 00:03:48,120
rootkits such as secure boot but this solution has been criticized for keeping

51
00:03:45,760 --> 00:03:53,959
a user from doing legitimate things like installing multiple operating systems so

52
00:03:51,400 --> 00:03:57,760
while some simpler root kits can be detected and removed by your favorite

53
00:03:55,480 --> 00:04:03,799
anti- malware program the best counter strategy is to just be super careful

54
00:04:00,799 --> 00:04:06,280
about what you download speaking of

55
00:04:03,799 --> 00:04:10,840
things to be downloaded why don't you download some knowledge to your brain

56
00:04:08,720 --> 00:04:15,760
little bits lets everyone use Electronics as modular building blocks

57
00:04:13,439 --> 00:04:21,680
their modules snap together with magnets so you can create circuits in seconds

58
00:04:18,199 --> 00:04:23,720
it's perfect for kids parents big kids

59
00:04:21,680 --> 00:04:27,520
yo coders Hardware hackers makers artists designers engineers and students

60
00:04:25,639 --> 00:04:33,320
with little bits you can even get your dog to like send text messages or make a

61
00:04:31,039 --> 00:04:37,639
robotic snack server so why buy electronic toys and gadgets when you can

62
00:04:35,280 --> 00:04:42,960
literally invent them the modules range from very simple you know power sensors

63
00:04:40,240 --> 00:04:47,080
LEDs to very complex with wireless and programmable modules and there's over 60

64
00:04:45,120 --> 00:04:51,400
modules that can be used in a vast number of creative combinations and

65
00:04:49,600 --> 00:04:55,520
better yet little bits is offering new customers 20 bucks off their first kit

66
00:04:53,800 --> 00:04:59,639
and free shipping anywhere in the Continental us all you got to do is go

67
00:04:57,120 --> 00:05:06,000
to little bits.com tequ that's little bits.com tequ I don't know why that's in

68
00:05:01,919 --> 00:05:08,360
there twice and uh go ahead and get 20

69
00:05:06,000 --> 00:05:12,240
bucks off woo after you make something actually send me an Instagram or better

70
00:05:10,840 --> 00:05:16,080
yet tag me on Twitter because I'm more likely to check that I would love to see

71
00:05:14,039 --> 00:05:19,520
it so thanks for watching guys if you like the video do that thing if you

72
00:05:17,600 --> 00:05:23,080
disliked it do the other thing uh check out our other channels we've got a great

73
00:05:20,960 --> 00:05:28,360
video on Channel Super Fun right now it's like part two of the Nerf battle uh

74
00:05:26,039 --> 00:05:31,840
the fire department shows up so definitely not going to want to miss

75
00:05:30,080 --> 00:05:35,440
that and also leave a comment under the video if you have suggestions for feature fast as posses and don't forget

76
00:05:33,960 --> 00:05:38,759
to subscribe and follow and all that good stuff see you next time
