1 00:00:00,570 --> 00:00:01,410 Welcome back. 2 00:00:01,740 --> 00:00:06,720 In this video, I'm going to show you how to download and install Yaara. 3 00:00:08,070 --> 00:00:15,000 To download this file from the resource section containing all the links, the first link is shown here. 4 00:00:15,690 --> 00:00:18,110 It is a place where you can download Yarah. 5 00:00:19,020 --> 00:00:23,850 So it will go to this website and then click on the download button. 6 00:00:24,970 --> 00:00:32,710 He we take you to a beach in GitHub and then select the Windows version of Yaro here. 7 00:00:33,250 --> 00:00:36,280 In 60-40 Hosek Foggy Windows. 8 00:00:36,760 --> 00:00:38,110 Click to download the file. 9 00:00:39,970 --> 00:00:42,730 No, do the same thing for the year. 10 00:00:43,560 --> 00:00:43,800 Yeah. 11 00:00:44,290 --> 00:00:49,780 He's found in this thing here, which is also provided in this farm. 12 00:00:52,700 --> 00:00:57,320 Click on this green button here and then select download zip. 13 00:01:02,860 --> 00:01:09,390 Once download for both files, I completed this open show in Fulda. 14 00:01:12,880 --> 00:01:17,140 And here you can see the two files that we just downloaded. 15 00:01:17,770 --> 00:01:21,580 One is the application, one is very narrow. 16 00:01:22,870 --> 00:01:24,520 So just copy both of them. 17 00:01:27,330 --> 00:01:30,960 Cutting them and put in a C right over here. 18 00:01:34,260 --> 00:01:35,100 Please continue. 19 00:01:39,630 --> 00:01:47,670 Now we are going to unzip Yaro, the mean program with rightly and zip here. 20 00:01:50,150 --> 00:01:51,570 Straight to this for the. 21 00:01:53,730 --> 00:01:58,640 Then open it and confirm that you have the 64 AC. 22 00:02:01,430 --> 00:02:08,420 Now they're are going to rename this, but this folder to make it shorter, to use Reichling rename 23 00:02:10,310 --> 00:02:16,700 and yes, remove all the unnecessary characters in the U.S. and then. 24 00:02:20,020 --> 00:02:21,490 Next, we are going to drink. 25 00:02:21,550 --> 00:02:25,360 They are ruthless and pretty insane. 26 00:02:25,390 --> 00:02:25,930 Here are. 27 00:02:30,020 --> 00:02:33,650 And we are going to unzip the rules here rightly. 28 00:02:36,310 --> 00:02:38,320 Saluzzi, a string here. 29 00:02:42,190 --> 00:02:44,770 Navigating the issue arose all day. 30 00:02:45,580 --> 00:02:53,260 The important one here in this year in Asia will continue in the index of how the rules. 31 00:02:56,610 --> 00:03:04,950 Reading this, my clicking and deleting necessary characters on when roofs. 32 00:03:07,390 --> 00:03:10,920 Next, we create a folder for storing our malware. 33 00:03:11,740 --> 00:03:15,430 So right click here, select new folder. 34 00:03:18,280 --> 00:03:18,910 Meaning type. 35 00:03:21,940 --> 00:03:25,510 So this is where you're going to put and therefore yaro to skin. 36 00:03:26,920 --> 00:03:34,240 Now we have to create an environment variable to point to this spot for here and ask for. 37 00:03:35,440 --> 00:03:41,140 So click in the windows icon here and search for environment. 38 00:03:43,890 --> 00:03:49,690 The N.V. son hated the system environment variables. 39 00:03:51,620 --> 00:03:54,110 Ending select environmental variables. 40 00:03:55,220 --> 00:03:57,980 Notice that I'm using Windows seven, 64 bit. 41 00:04:00,050 --> 00:04:07,670 So make sure you copy Scarface, rankly copy and then come here to the system variables. 42 00:04:08,750 --> 00:04:14,600 Scroll down and look for stuff there in the edit, click edit. 43 00:04:15,960 --> 00:04:26,160 And then say here, walking right through to the end of the string and insert a semicolon after a semicolon 44 00:04:27,060 --> 00:04:30,300 correctly and piece your path for yare. 45 00:04:32,340 --> 00:04:35,730 Now, OK, OK, OK, again. 46 00:04:38,210 --> 00:04:45,260 And now you have a star, yaro, and also the system environment so that you can now use yaara from 47 00:04:45,260 --> 00:04:46,670 anywhere in your machine. 48 00:04:47,390 --> 00:04:53,930 So to test this aerosol predicament from taxi in the and coming from. 49 00:04:56,360 --> 00:05:03,440 And you can use Tariana, you go to California first, see no way. 50 00:05:04,850 --> 00:05:06,440 See the space. 51 00:05:06,740 --> 00:05:12,140 See, they hit enter at a moment when the food is empty. 52 00:05:13,340 --> 00:05:16,220 So in in this lesson, we will be putting something over here. 53 00:05:17,420 --> 00:05:27,700 We have developed to use Yaara this time of year 64 and then followed by the path to the jaros. 54 00:05:31,430 --> 00:05:34,370 Hanging in next year. 55 00:05:36,490 --> 00:05:40,020 So this tells Yarah where to find your roots. 56 00:05:40,840 --> 00:05:47,650 So you should always pointing to next year, next one would be the name of your tradition if you have 57 00:05:47,650 --> 00:05:47,980 one. 58 00:05:49,990 --> 00:05:56,920 So I'm going to copy this reversing leap frogging from the previous lessons, estrogen we develop. 59 00:05:57,680 --> 00:05:59,170 So I'm just going to copy this. 60 00:05:59,680 --> 00:06:01,810 You can download it from the recession. 61 00:06:02,710 --> 00:06:06,670 And I'm going to put it in that folder. 62 00:06:10,500 --> 00:06:18,540 Now we can scan this since this type name of the malware, and then if you hit enter, you will find 63 00:06:18,540 --> 00:06:22,740 is a long list of warnings. 64 00:06:26,040 --> 00:06:27,870 So this one, these are quite harmless. 65 00:06:28,200 --> 00:06:32,730 But we don't want to see them, so we have to do two things. 66 00:06:33,420 --> 00:06:36,270 We have to put some parameters to suppress the warnings. 67 00:06:37,110 --> 00:06:41,580 And you also just want to see the important facts, which is down here. 68 00:06:42,600 --> 00:06:45,480 But you also notice that our windows used to KREM. 69 00:06:46,200 --> 00:06:50,700 So we need to adjust the windows to make him wider to. 70 00:06:50,700 --> 00:06:56,190 Do they click on the this icon here selling properties. 71 00:06:57,330 --> 00:07:00,970 And then Leah, change to be making bigger. 72 00:07:01,710 --> 00:07:02,820 Two hundred and forty. 73 00:07:03,600 --> 00:07:05,660 I mean your size Pilkey. 74 00:07:06,300 --> 00:07:08,310 So now you're being a SICP double. 75 00:07:09,690 --> 00:07:10,010 This. 76 00:07:11,670 --> 00:07:12,850 He refuses to be. 77 00:07:12,880 --> 00:07:14,100 You can always say, Jostein. 78 00:07:14,730 --> 00:07:21,180 Maybe this is too big to our mcilhaney, smaller C, two hundred K, OK. 79 00:07:23,080 --> 00:07:30,730 So if I repeat my skin by pressing the key, this time is easier theory. 80 00:07:36,630 --> 00:07:38,310 So you see a lot of warnings here. 81 00:07:38,970 --> 00:07:41,880 So normally we use yaara history. 82 00:07:43,270 --> 00:07:46,250 We put the barometer test time. 83 00:07:46,270 --> 00:07:51,120 You do suppress the warnings and then dash messages. 84 00:07:58,560 --> 00:08:06,880 So what this amnesty mean, amnesty means and print metadata as a supreme matching strings, inducive 85 00:08:06,900 --> 00:08:07,710 print tax. 86 00:08:08,550 --> 00:08:12,210 So DSW used to suppress the warnings. 87 00:08:12,690 --> 00:08:15,330 So this is what you see for Yaara. 88 00:08:15,960 --> 00:08:18,570 So now if he type it into. 89 00:08:22,950 --> 00:08:24,200 So we have a clean up. 90 00:08:31,410 --> 00:08:33,240 See this this is our final point. 91 00:08:33,990 --> 00:08:36,840 So the important one is that here. 92 00:08:38,300 --> 00:08:38,570 And. 93 00:08:40,010 --> 00:08:44,180 And then this is a pattern that matches in Geneva. 94 00:08:46,030 --> 00:08:47,540 And then his injector. 95 00:08:48,400 --> 00:08:50,860 This is a pattern impetuousness injector. 96 00:08:52,460 --> 00:08:56,210 Very fast operation and these effect in the matches very fast operation. 97 00:08:57,260 --> 00:09:01,190 And so and so this is how we are presenting this report. 98 00:09:02,000 --> 00:09:03,320 So as you can see here. 99 00:09:05,120 --> 00:09:09,200 So one wishes to that for our region. 100 00:09:10,730 --> 00:09:14,580 It has detected our Drugeon is capable of injecting. 101 00:09:16,820 --> 00:09:19,430 So this is how useful Hera can be. 102 00:09:20,330 --> 00:09:24,140 So probably Yarah will be the best tool for us. 103 00:09:24,650 --> 00:09:32,390 Maybe are trained in the Trojans because we don't submit our sample to any online portal. 104 00:09:32,930 --> 00:09:37,400 Also, the virus will not quarantine our fans. 105 00:09:37,850 --> 00:09:43,580 We have more freedom to develop Trojans in this kind of environment. 106 00:09:44,330 --> 00:09:49,070 So in the next lesson, I will continue further how to antivirus. 107 00:09:49,550 --> 00:09:50,810 We do have Oliviera. 108 00:09:51,350 --> 00:09:57,210 And so using the Trojan development cycle that we discussed in our previous. 109 00:09:58,400 --> 00:09:59,570 Thank you for watching. 110 00:09:59,600 --> 00:10:00,740 I'll see you in the next one.