1 00:00:00,690 --> 00:00:01,650 Hello and welcome. 2 00:00:02,190 --> 00:00:07,800 We are going to get rid of this mean a substitute for the women. 3 00:00:08,730 --> 00:00:10,680 So where does women come from? 4 00:00:11,370 --> 00:00:14,880 It came from the Microsoft releasing signature. 5 00:00:15,660 --> 00:00:20,070 You can search for in Google by searching for women's signature. 6 00:00:20,910 --> 00:00:24,240 And then the first hit is the correct one. 7 00:00:24,630 --> 00:00:25,350 Click on this. 8 00:00:28,760 --> 00:00:31,790 And then over here, you will see the main signature. 9 00:00:36,410 --> 00:00:40,520 So just copy this and then base it here. 10 00:00:42,990 --> 00:00:43,710 Peter here. 11 00:00:47,500 --> 00:00:53,240 Removed to semicolon, pull back the bracket, this getting worse every day. 12 00:00:54,320 --> 00:00:57,700 Then you should comment on your original integer. 13 00:00:58,700 --> 00:01:04,820 So now this becomes a Glee based program so he won't pop up the command line terminal when he runs. 14 00:01:05,750 --> 00:01:11,810 The other thing you need to do is to comment on your previous statement like this because whenever he 15 00:01:11,810 --> 00:01:13,670 works in the command line terminal. 16 00:01:14,450 --> 00:01:21,710 So I mean, you do to do that, to replace to command all your brain, to such search for all the Prenez. 17 00:01:26,830 --> 00:01:31,360 And then this comment one by one, as I have already done here. 18 00:01:35,020 --> 00:01:35,350 All right. 19 00:01:35,380 --> 00:01:36,340 So that's the first thing. 20 00:01:37,190 --> 00:01:40,960 Now then you say this and then you can recount party. 21 00:01:47,370 --> 00:01:52,370 So copy the path for this dear Trojan project. 22 00:01:53,610 --> 00:01:56,520 Open your eyes, need foreign aid to someone from. 23 00:02:00,810 --> 00:02:08,730 And then we get to the food, therefore you and Regan, by running the compound that could hit enter. 24 00:02:11,740 --> 00:02:16,930 So there's an area on line one, two, three, four six, so let's fix that. 25 00:02:25,140 --> 00:02:27,720 One, two, three, four six. 26 00:02:34,810 --> 00:02:35,190 All right. 27 00:02:35,290 --> 00:02:42,220 So the Cosby comment is something you're not able to buy illegal aliens who are making it. 28 00:02:44,230 --> 00:02:44,500 All right. 29 00:02:44,500 --> 00:02:48,760 So if you can guess, comment on the entire East Haven here. 30 00:02:53,040 --> 00:02:54,750 And news like this sick. 31 00:03:00,770 --> 00:03:03,170 OK, so just compile again. 32 00:03:06,930 --> 00:03:15,990 Nine one two four zero zero two nine zero one two four zero zero one two four. 33 00:03:19,770 --> 00:03:25,100 OK, safe hanging recompile. 34 00:03:30,350 --> 00:03:39,800 All right, now, we try to run the AL injector hit enter and there is no paper black screen. 35 00:03:42,380 --> 00:03:49,430 And you can confirm that it is running by opening, opening the process hacker. 36 00:03:54,700 --> 00:03:56,380 And you can see it is already, Tony. 37 00:03:56,890 --> 00:03:58,420 All right, let's kill it and try again. 38 00:03:59,200 --> 00:04:06,850 So we turn to the Gulf region and this time we try to run you by clicking here. 39 00:04:11,320 --> 00:04:14,050 And you see, there is no public screen. 40 00:04:14,440 --> 00:04:16,600 It is completely stealth, stealthy. 41 00:04:17,560 --> 00:04:19,240 And you can see this in the movie. 42 00:04:20,440 --> 00:04:22,100 Let's see if he works with Iraq. 43 00:04:22,750 --> 00:04:29,290 So now let's open Iraq, creep back before you delete the passport file. 44 00:04:31,540 --> 00:04:35,190 Are you going to pass out far from the first? 45 00:04:41,550 --> 00:04:43,730 Right now, we running the Iraqi. 46 00:04:47,080 --> 00:04:48,340 So the market has started. 47 00:04:50,300 --> 00:04:59,240 And then let's go and check the rhetoric to see whether the more he has been injected with the DNA. 48 00:04:59,780 --> 00:05:04,100 So click on Verity and go to more news and you will see process ne4 has been injected. 49 00:05:07,430 --> 00:05:20,500 Now we try to mount fans and why, and it's select the file and you want to mount the terror for my 50 00:05:20,510 --> 00:05:23,960 data and then mount. 51 00:05:25,590 --> 00:05:34,680 Display passports 5+2 and type in the password hit, OK. 52 00:05:41,390 --> 00:05:41,900 Yes. 53 00:05:42,600 --> 00:05:47,130 So it's mounted, so now there's this money, and I see. 54 00:05:47,700 --> 00:05:51,760 And have you open the pacifier and she got it? 55 00:05:51,810 --> 00:05:52,730 Yeah, there you go. 56 00:05:53,480 --> 00:05:54,100 So you watch. 57 00:05:54,620 --> 00:06:01,310 So this is how we can make our Trojan more stealthy by converting it into a cookie based program. 58 00:06:02,570 --> 00:06:06,620 There's one more thing I forgot to mention the compost needs to be changed. 59 00:06:10,570 --> 00:06:11,800 Before we can compare. 60 00:06:13,390 --> 00:06:23,920 So, Mr. Nader, to go through this the computer screen, you need to change it, even though you need 61 00:06:23,920 --> 00:06:28,780 the changes to windows and then only you run your computer screen compact group. 62 00:06:29,980 --> 00:06:33,310 OK, so that's reality then is changing. 63 00:06:36,920 --> 00:06:39,980 OK, so that's all for this session. 64 00:06:40,020 --> 00:06:43,040 You have successfully completed our project. 65 00:06:43,550 --> 00:06:44,750 Thank you for watching.