1 00:00:00,580 --> 00:00:07,030 Hello and welcome in this new lesson, we are going to learn how to download and install when I click. 2 00:00:12,890 --> 00:00:18,120 This is the site for the Arctic that is a free, open source. 3 00:00:18,140 --> 00:00:21,770 This encryption software for Windows, Mac and Linux. 4 00:00:22,880 --> 00:00:24,680 You can download it from the link here. 5 00:00:26,090 --> 00:00:30,590 Or you can also use the version that I provided for you. 6 00:00:31,040 --> 00:00:37,000 I would suggest you use the version that I provided for you so that you can follow along using the same 7 00:00:37,000 --> 00:00:40,670 machine in case the later version has made some changes. 8 00:00:41,840 --> 00:00:48,890 So this is a version I was using very creepy setup and I have downloaded here that you've set up. 9 00:00:50,090 --> 00:00:53,630 So just to say the installation process. 10 00:00:55,160 --> 00:00:55,580 Yes. 11 00:00:56,180 --> 00:00:57,590 And so the language. 12 00:00:57,830 --> 00:00:58,280 Okay. 13 00:00:59,210 --> 00:01:07,340 And click the Accept license, click next, click on Install, Select Install and then click Next. 14 00:01:08,650 --> 00:01:19,000 And just leave to default, to install and take note of the program to it is installed in program files. 15 00:01:19,700 --> 00:01:21,460 Had a clean install. 16 00:01:31,710 --> 00:01:34,890 There actually has been successfully installed, Clokey. 17 00:01:37,050 --> 00:01:38,310 You can donate if you like. 18 00:01:38,760 --> 00:01:42,840 Click Finish if you are never use Mercury. 19 00:01:43,560 --> 00:01:48,000 You can follow the beginner's tutorial so you want to view click on. 20 00:01:48,000 --> 00:01:48,420 Yes. 21 00:01:51,310 --> 00:01:56,830 So this is the beginning, etc. Just follow it, step one, step two, and so on. 22 00:01:57,550 --> 00:02:00,010 So the first thing you need to do is create a folder. 23 00:02:00,280 --> 00:02:03,640 So we go to our CGI. 24 00:02:04,940 --> 00:02:14,810 And Korea, for the very one to put the path for where you're going to install the your your encrypted 25 00:02:15,110 --> 00:02:15,680 file. 26 00:02:16,070 --> 00:02:18,050 So let's create new for there. 27 00:02:19,190 --> 00:02:23,210 And that's clearly very, very there. 28 00:02:25,490 --> 00:02:31,430 OK, so now this is the fourth we are going to install our data, which will be encrypted. 29 00:02:31,880 --> 00:02:36,190 So this data will be mounted as a hard disk drive. 30 00:02:36,220 --> 00:02:44,480 If a drive letter later on, I'll show you, then follow the next step create volume kill. 31 00:02:44,630 --> 00:02:49,510 There is now a lunch hour that actually takes a shortcut on a desktop here. 32 00:02:50,210 --> 00:02:55,450 If you don't find it, you can go to the C drive and run the program files. 33 00:02:55,500 --> 00:02:58,220 You can also find the actually inside here. 34 00:03:01,900 --> 00:03:02,390 His son. 35 00:03:05,280 --> 00:03:07,710 So just click on it to launch her trip. 36 00:03:10,240 --> 00:03:12,100 So the first thing you do is create volume. 37 00:03:13,170 --> 00:03:15,150 So you had to select the. 38 00:03:16,590 --> 00:03:18,060 I'm going to mony on why. 39 00:03:19,590 --> 00:03:24,180 This is just up to you if anyone can create volume. 40 00:03:25,170 --> 00:03:29,400 And let me be the default for the first one. 41 00:03:29,790 --> 00:03:32,880 Create an encrypted file container Kleenex. 42 00:03:34,780 --> 00:03:38,770 And the default just accepted that script volume, click next. 43 00:03:40,740 --> 00:03:42,870 And now you're supposed to say fine. 44 00:03:43,530 --> 00:03:46,620 And here he can lead a default, never say history. 45 00:03:47,190 --> 00:03:55,830 So click on Select File and then go to the folder, which you newly created and the CGI. 46 00:03:58,580 --> 00:04:07,610 They are here, and they give her father and my data and keep safe. 47 00:04:10,700 --> 00:04:11,540 And Kleenex. 48 00:04:13,880 --> 00:04:15,720 Christine Levy, guys, yes. 49 00:04:16,240 --> 00:04:20,300 Hash liveries Shah 5+2 clinics. 50 00:04:22,760 --> 00:04:28,790 What I'm saying is we don't need so much, just more testing by fitness. 51 00:04:30,250 --> 00:04:32,380 No, he supposedly keen to pursue it. 52 00:04:32,980 --> 00:04:33,850 He's a part it. 53 00:04:34,450 --> 00:04:39,820 You are going to outrage is going to sniff and capture soon. 54 00:04:39,820 --> 00:04:46,660 But for now, we as a user, we have to create a pathway so he can put any password you want. 55 00:04:47,230 --> 00:04:55,180 So I'm going to click on this display so I can see the password and I'm typing and. 56 00:05:02,020 --> 00:05:03,760 So I guess I'm going to put taxpayers with. 57 00:05:08,530 --> 00:05:10,930 That's password and Kleenex. 58 00:05:11,140 --> 00:05:14,660 So you have to remember what posture you take. 59 00:05:14,730 --> 00:05:18,010 So anytime you can go in and capture. 60 00:05:19,680 --> 00:05:20,550 So click on this. 61 00:05:23,230 --> 00:05:23,710 Yes. 62 00:05:24,700 --> 00:05:26,860 And then just randomly use your mouse. 63 00:05:27,310 --> 00:05:29,980 Move your mouse until this thing becomes green. 64 00:05:36,440 --> 00:05:37,760 You smooth your mouth, OK? 65 00:05:38,210 --> 00:05:38,930 Keep from it. 66 00:05:49,950 --> 00:05:53,790 So they take their trip, but volume has been successfully created to OK. 67 00:05:55,190 --> 00:05:55,760 The next. 68 00:05:57,500 --> 00:05:58,030 They actually. 69 00:05:59,130 --> 00:06:02,490 So here you can just cancel, so and now you're done. 70 00:06:03,330 --> 00:06:06,830 You can now mount your volume so you can close the tutorial. 71 00:06:09,240 --> 00:06:16,560 So in order to manually select the draft letter that you'll see that you like to use, I'm going to 72 00:06:16,560 --> 00:06:20,640 use why and here I'm going to select the far. 73 00:06:21,770 --> 00:06:26,120 So go to the far in the sea driving a very straightforward. 74 00:06:28,660 --> 00:06:31,210 And so like the father who just created. 75 00:06:33,930 --> 00:06:35,700 10 stand around 10 megabytes. 76 00:06:36,510 --> 00:06:37,350 So please open. 77 00:06:39,320 --> 00:06:40,820 And now he can keep mum. 78 00:06:44,110 --> 00:06:50,590 So is this case always hung is correct because our past has got gaps, so this screen is very passive 79 00:06:50,590 --> 00:06:52,960 so you can see what you type. 80 00:06:54,070 --> 00:06:57,430 So we'll hear that in the past, that's possible. 81 00:06:59,110 --> 00:07:04,420 And then here, auto detection selecta Charlie Scharf, I want to. 82 00:07:07,310 --> 00:07:18,040 And then here, click OK, so your password is correct, he is going to mount new on this new drive, 83 00:07:18,110 --> 00:07:21,740 I took a while and then he successfully mounted, as you can see. 84 00:07:22,990 --> 00:07:29,560 He shows you here, William, why this is the fog that is mounted as a drive drive, right, and why 85 00:07:30,070 --> 00:07:32,520 the size of it as early as this time. 86 00:07:33,220 --> 00:07:37,300 So now you can start using your your this way. 87 00:07:38,090 --> 00:07:39,610 You can see here this in this way. 88 00:07:40,420 --> 00:07:43,510 So whatever you drain to here would be automatically encrypted. 89 00:07:44,770 --> 00:07:51,310 You can put anything, any floppy Curacao music video or whatever, so you can use it. 90 00:07:52,290 --> 00:07:53,190 Create new fire. 91 00:07:59,920 --> 00:08:07,000 OK, so this father being cryptic, so whenever you you here automatically guessing, did then you and 92 00:08:07,090 --> 00:08:09,880 this dysphonia when you're finished dragging you, this man? 93 00:08:12,420 --> 00:08:14,530 Translator Why would be removed? 94 00:08:15,040 --> 00:08:20,140 And then now, when you checked Your Highness again, he received a normal little away. 95 00:08:20,470 --> 00:08:26,440 So this is how that actually allows you to protect your secrets. 96 00:08:27,100 --> 00:08:30,580 So secret files so you can go to here and there. 97 00:08:30,580 --> 00:08:33,280 There are great for great listing. 98 00:08:33,490 --> 00:08:36,040 You won't be able to see anything you want if you open it. 99 00:08:36,580 --> 00:08:40,030 You won't be able to see anything because this file will be cryptic. 100 00:08:42,640 --> 00:08:43,010 All right. 101 00:08:43,030 --> 00:08:45,340 So that's how the retreat is being used. 102 00:08:49,450 --> 00:08:56,050 All right, so our objective now is to write a Trojan and install it in this computer. 103 00:08:56,770 --> 00:09:00,010 And when the computer, when this virtual machine boots. 104 00:09:01,190 --> 00:09:06,980 You will ultimately start, and once the trading starts, he's going to monitor whether or not there 105 00:09:06,980 --> 00:09:08,120 actually is loaded. 106 00:09:09,830 --> 00:09:14,540 So once it starts loading, you will in the hook. 107 00:09:15,680 --> 00:09:22,560 So this, you know, that game, which we study in the previous lecture instead of who. 108 00:09:24,600 --> 00:09:30,750 You were in the air, you unpack idea first and then you said, Yeah. 109 00:09:31,930 --> 00:09:38,290 And this day, I hope the one on the EPA function that is used for capturing and storing passwords. 110 00:09:39,760 --> 00:09:42,370 OK, so this is how it works. 111 00:09:43,060 --> 00:09:45,040 So that's all for this video. 112 00:09:45,310 --> 00:09:46,600 I'll see you in the next lecture. 113 00:09:46,930 --> 00:09:47,950 Thank you for watching.