{"id":25584,"date":"2024-03-31T09:04:36","date_gmt":"2024-03-31T09:04:36","guid":{"rendered":"https:\/\/sagarindia.in\/blog\/?p=25584"},"modified":"2025-08-18T13:34:49","modified_gmt":"2025-08-18T13:34:49","slug":"malicious-software-malware-in-computer","status":"publish","type":"post","link":"https:\/\/sagarindia.in\/blog\/malicious-software-malware-in-computer\/","title":{"rendered":"Malicious Software (Malware) in Computer"},"content":{"rendered":"\n<p>Computer \u092e\u0947\u0902 Malicious Software (Malware) \u0915\u094d\u092f\u093e \u0939\u0948\u0902 ?<\/p>\n\n\n\n<p>Malicious Software, \u091c\u093f\u0938\u0947 \u0906\u092e\u0924\u094c\u0930 \u092a\u0930 <strong>Malware<\/strong> \u0915\u0947 form \u092e\u0947\u0902 \u091c\u093e\u0928\u093e \u091c\u093e\u0924\u093e \u0939\u0948, \u0915\u093f\u0938\u0940 \u092d\u0940 \u0910\u0938\u0947 software \u0915\u094b referred \u0915\u0930\u0924\u093e \u0939\u0948 \u091c\u094b intentional harm \u092a\u0939\u0941\u0902\u091a\u093e\u0928\u0947, operation \u092e\u0947\u0902 \u092c\u093e\u0927\u093e \u0921\u093e\u0932\u0928\u0947 \u092f\u093e computer system, network \u092f\u093e device \u0924\u0915 unauthorized \u092a\u0939\u0941\u0902\u091a \u092a\u094d\u0930\u093e\u092a\u094d\u0924 \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948\u0964 Malware various forms \u0932\u0947 \u0938\u0915\u0924\u093e \u0939\u0948 \u0914\u0930 \u0909\u0938\u0915\u0947 different purposes \u0939\u094b \u0938\u0915\u0924\u0947 \u0939\u0948\u0902, \u091c\u093f\u0938\u092e\u0947\u0902 sensitive information \u091a\u0941\u0930\u093e\u0928\u0947 \u0938\u0947 \u0932\u0947\u0915\u0930 \u092b\u093f\u0930\u094c\u0924\u0940 \u0915\u0947 \u0932\u093f\u090f data \u0930\u0916\u0928\u093e \u092f\u093e system crash \u0915\u0930\u0928\u093e \u0936\u093e\u092e\u093f\u0932 \u0939\u0948\u0964 <\/p>\n\n\n\n<p>\u092f\u0939\u093e\u0902 malware \u0915\u0947 some common types \u0926\u093f\u090f \u0917\u090f \u0939\u0948\u0902<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li style=\"line-height:1.8\">Viruses<\/li>\n\n\n\n<li style=\"line-height:1.8\">Trojans<\/li>\n\n\n\n<li style=\"line-height:1.8\">Spyware<\/li>\n\n\n\n<li style=\"line-height:1.8\">Ransomware<\/li>\n\n\n\n<li style=\"line-height:1.8\">Adware<\/li>\n\n\n\n<li style=\"line-height:1.8\">Rootkits<\/li>\n\n\n\n<li style=\"line-height:1.8\">Keyloggers<\/li>\n\n\n\n<li style=\"line-height:1.8\">Backdoors<\/li>\n\n\n\n<li style=\"line-height:1.8\">Logic bombs<\/li>\n\n\n\n<li style=\"line-height:1.8\">Rogue security software<\/li>\n\n\n\n<li style=\"line-height:1.8\">Exploit kits<\/li>\n\n\n\n<li style=\"line-height:1.8\">Cryptominers<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">Viruses<\/h3>\n\n\n\n<p>Viruses \u090f\u0915 type \u0915\u0947 Malicious Software (Malware) \u0939\u0948\u0902 \u091c\u094b valid program \u092f\u093e files \u0938\u0947 \u091c\u0941\u0921\u093c\u0915\u0930 \u0914\u0930 \u092b\u093f\u0930 \u090f\u0915 system \u0938\u0947 \u0926\u0942\u0938\u0930\u0947 system \u092e\u0947\u0902 \u092b\u0948\u0932\u0915\u0930 computer system \u0914\u0930 devices \u0915\u094b infected \u0915\u0930 \u0938\u0915\u0924\u0947 \u0939\u0948\u0902\u0964 \u092f\u0939\u093e\u0902 computer viruses \u0915\u0940 Some Key Features \u0914\u0930 behavior \u0926\u093f\u090f \u0917\u090f \u0939\u0948\u0902:<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Trojans<\/h3>\n\n\n\n<p>Trojans, \u091c\u093f\u0938\u0915\u093e \u0928\u093e\u092e Greek mythology \u0915\u0947 deceptive Trojan Horse \u0915\u0947 \u0928\u093e\u092e \u092a\u0930 \u0930\u0916\u093e \u0917\u092f\u093e \u0939\u0948, \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u094b users \u0915\u094b \u0905\u092a\u0928\u0947 computer \u092a\u0930 install \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f legitimate software \u092f\u093e files \u0915\u0947 form \u092e\u0947\u0902 disguised \u0915\u0930\u0924\u093e \u0939\u0948\u0964 \u090f\u0915 \u092c\u093e\u0930 established \u0939\u094b\u0928\u0947 \u0915\u0947 \u092c\u093e\u0926, trojan user \u0915\u0940 information \u092f\u093e agreement \u0915\u0947 \u092c\u093f\u0928\u093e various harmful task \u0915\u0930 \u0938\u0915\u0924\u0947 \u0939\u0948\u0902\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Spyware<\/h3>\n\n\n\n<p>Spyware \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u093f\u0938\u0947 \u0915\u093f\u0938\u0940 user \u0915\u0940 information \u092f\u093e agreement \u0915\u0947 \u092c\u093f\u0928\u093e \u0909\u0928\u0915\u0947 computer \u092f\u093e device \u092a\u0930 secret form \u0938\u0947 monitoring \u0915\u0930\u0928\u0947 \u0914\u0930 \u0909\u0928\u0915\u0947 \u092c\u093e\u0930\u0947 \u092e\u0947\u0902 information collected \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f  \u0915\u093f design \u092f\u093e \u0917\u092f\u093e \u0939\u0948\u0964 \u092f\u0939 sensitive information \u091c\u0948\u0938\u0947 Browsing habits, keystrokes, login credentials, personal data \u0914\u0930 \u092c\u0939\u0941\u0924 \u0915\u0941\u091b collect \u0915\u0930 \u0938\u0915\u0924\u093e \u0939\u0948\u0964 Collect \u0915\u093f\u092f\u093e \u0917\u092f\u093e data \u0906\u092e \u0924\u094c\u0930 \u092a\u0930 advertisers, data brokers \u092f\u093e cyber criminals \u091c\u0948\u0938\u0947 third parties \u0915\u094b transmitted \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948, \u091c\u094b targeted advertising, identity theft, financial fraud, espionage \u092f\u093e blackmail \u0938\u0939\u093f\u0924 various purposes \u0915\u0947 \u0932\u093f\u090f \u0907\u0938\u0915\u093e advantage \u0909\u0920\u093e \u0938\u0915\u0924\u0947 \u0939\u0948\u0902\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Ransomware<\/h3>\n\n\n\n<p>Ransomware \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u093f\u0938\u0947 victim \u0915\u0947 computer \u092f\u093e network \u092a\u0930 files \u0915\u094b encrypt \u0915\u0930\u0928\u0947, \u0909\u0928\u094d\u0939\u0947\u0902 unattainable \u092c\u0928\u093e\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948, \u0914\u0930 \u092b\u093f\u0930 files \u0915\u094b decrypt \u0915\u0930\u0928\u0947 \u0915\u0947 \u092c\u0926\u0932\u0947 \u092e\u0947\u0902 ransom payment \u0915\u0940 \u092e\u093e\u0902\u0917 \u0915\u0940 \u091c\u093e\u0924\u0940 \u0939\u0948\u0964 \u092f\u0939 cyber attacks \u0915\u0947 \u0938\u092c\u0938\u0947 harmful \u0914\u0930 prevalent forms \u092e\u0947\u0902 \u0938\u0947 \u090f\u0915 \u0939\u0948, \u091c\u094b whole world \u092e\u0947\u0902 individuals, businesses, government agencies \u0914\u0930 other organizations \u0915\u094b targeted \u0915\u0930\u0924\u093e \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Adware<\/h3>\n\n\n\n<p>Adware, \u091c\u093f\u0938\u0915\u093e Short form &#8220;Ad-supported software&#8221; \u0939\u0948, \u090f\u0915 type \u0915\u093e software \u0939\u0948 \u091c\u094b user \u0915\u0947 computer \u092f\u093e device \u092a\u0930 unwanted advertisements displaying \u0915\u0930\u0924\u093e \u0939\u0948\u0964 \u091c\u092c\u0915\u093f \u0905\u0928\u094d\u092f type \u0915\u0947 malware, \u091c\u0948\u0938\u0947 virus \u092f\u093e ransomware , \u0915\u0940 \u0924\u0930\u0939 natural form \u0938\u0947 malicious \u0928\u0939\u0940\u0902 \u0939\u0948, adware \u0905\u092d\u0940 \u092d\u0940 disruptive \u0914\u0930 hacker \u0939\u094b \u0938\u0915\u0924\u093e \u0939\u0948, \u0905\u0915\u094d\u0938\u0930 user \u0915\u0947 browsing experience \u092e\u0947\u0902 interference \u0915\u0930\u0924\u093e \u0939\u0948 \u0914\u0930 \u0909\u0928\u0915\u0940 confidentiality \u0938\u0947 \u0938\u092e\u091d\u094c\u0924\u093e \u0915\u0930\u0924\u093e \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Rootkit<\/h3>\n\n\n\n<p>Rootkit \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u093f\u0938\u0947 computer \u092f\u093e device \u092a\u0930 \u0905\u092a\u0928\u0940 appearance \u0914\u0930 activities \u0915\u094b hide \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948, \u091c\u093f\u0938\u0938\u0947 system \u092a\u0930 unauthorized \u092a\u0939\u0941\u0902\u091a \u0914\u0930 control \u0915\u0940 permission \u092e\u093f\u0932\u0924\u0940 \u0939\u0948\u0964 Rootkit special form \u0938\u0947 secret \u0939\u094b\u0924\u0947 \u0939\u0948\u0902 \u0914\u0930 \u0909\u0928\u0915\u093e \u092a\u0924\u093e \u0932\u0917\u093e\u0928\u093e difficult \u0939\u094b\u0924\u093e \u0939\u0948 \u0915\u094d\u092f\u094b\u0902\u0915\u093f \u0935\u0947 operating system \u0915\u0947 inside deep level \u092a\u0930 \u0915\u093e\u092e \u0915\u0930\u0924\u0947 \u0939\u0948\u0902, \u0905\u0915\u094d\u0938\u0930 privilege \u092a\u094d\u0930\u093e\u092a\u094d\u0924 \u092a\u0939\u0941\u0902\u091a \u0939\u093e\u0938\u093f\u0932 \u0915\u0930\u0928\u0947 \u0914\u0930 traditional security measures \u0938\u0947 \u0905\u092a\u0928\u0940 presence \u0915\u094b hide \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f weaknesses \u0915\u093e advantage \u0909\u0920\u093e\u0924\u0947 \u0939\u0948\u0902\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Keyloggers<\/h3>\n\n\n\n<p>Keyloggers \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u093f\u0938\u0947 \u0915\u093f\u0938\u0940 user \u0926\u094d\u0935\u093e\u0930\u093e \u0905\u092a\u0928\u0947 computer \u092f\u093e device \u092a\u0930 \u091f\u093e\u0907\u092a \u0915\u093f\u090f \u0917\u090f keystrokes \u0915\u0940 secret form \u0938\u0947 monitoring \u0914\u0930 record \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948\u0964 Keyloggers \u0915\u093e primary purpose user \u0915\u0940 information \u092f\u093e permission \u0915\u0947 \u092c\u093f\u0928\u093e sensitive information, \u091c\u0948\u0938\u0947 username, password, credit card number \u0914\u0930 \u0905\u0928\u094d\u092f personal \u092f\u093e financial data capture \u0915\u0930\u0928\u093e \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Backdoor<\/h3>\n\n\n\n<p>Backdoor \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u094b computer system \u092e\u0947\u0902 \u090f\u0915 \u091b\u093f\u092a\u093e \u0939\u0941\u0906 entry point \u092f\u093e &#8220;backdoor&#8221; \u092c\u0928\u093e\u0924\u093e \u0939\u0948, \u091c\u093f\u0938\u0938\u0947 attackers \u0915\u094b unauthorized \u092a\u0939\u0941\u0902\u091a \u0914\u0930 control \u0915\u0940 permission \u092e\u093f\u0932\u0924\u0940 \u0939\u0948\u0964 Backdoor \u0915\u094b common authentication mechanism \u0914\u0930 security controls \u0915\u094b bypass \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948, \u091c\u094b attackers \u0915\u094b user \u0915\u0940 information \u092f\u093e permission \u0915\u0947 \u092c\u093f\u0928\u093e agreement \u0915\u093f\u090f \u0917\u090f system \u0924\u0915 \u0932\u0917\u093e\u0924\u093e\u0930 \u092a\u0939\u0941\u0902\u091a \u092a\u094d\u0930\u0926\u093e\u0928 \u0915\u0930\u0924\u093e \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Logic Bombs<\/h3>\n\n\n\n<p>Logic Bomb \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u092f\u093e code \u0939\u0948 \u091c\u093f\u0938\u0947 \u0915\u0941\u091b conditions \u0915\u0947 \u092a\u0942\u0930\u093e \u0939\u094b\u0928\u0947 \u092a\u0930 harmful \u0915\u093e\u0930\u094d\u0930\u0935\u093e\u0908 \u0915\u094b \u0905\u0902\u091c\u093e\u092e \u0926\u0947\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f intentional computer system \u092e\u0947\u0902 \u0921\u093e\u0932\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964 \u0905\u0928\u094d\u092f \u092a\u094d\u0930\u0915\u093e\u0930 \u0915\u0947 malware \u0915\u0947 \u0935\u093f\u092a\u0930\u0940\u0924, \u091c\u094b infection \u092f\u093e activation \u092a\u0930 immediate loss \u092a\u0939\u0941\u0902\u091a\u093e \u0938\u0915\u0924\u0947 \u0939\u0948\u0902, logic bomb \u0906\u092e\u0924\u094c\u0930 \u092a\u0930 \u0924\u092c \u0924\u0915 inactive \u0930\u0939\u0924\u0947 \u0939\u0948\u0902 \u091c\u092c \u0924\u0915 \u0915\u093f attacker \u0926\u094d\u0935\u093e\u0930\u093e defined specific events \u092f\u093e norms \u0926\u094d\u0935\u093e\u0930\u093e trigger \u0928\u0939\u0940\u0902 \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Rogue Security Software<\/h3>\n\n\n\n<p>Rogue security software, \u091c\u093f\u0938\u0947 fake antivirus \u092f\u093e scareware \u0915\u0947 \u0930\u0942\u092a \u092e\u0947\u0902 \u092d\u0940 \u091c\u093e\u0928\u093e \u091c\u093e\u0924\u093e \u0939\u0948, \u090f\u0915 type \u0915\u093e Malicious Software (Malware) \u0939\u0948 \u091c\u094b legitimate security software \u0915\u0947 form \u092e\u0947\u0902 \u0938\u093e\u092e\u0928\u0947 \u0906\u0924\u093e \u0939\u0948, \u091c\u094b user \u0915\u0947 computer \u092a\u0930 malware infections \u0915\u093e \u092a\u0924\u093e \u0932\u0917\u093e\u0928\u0947 \u0914\u0930 \u0909\u0928\u094d\u0939\u0947\u0902 remove \u0915\u0930\u0928\u0947 \u0915\u093e false claims \u0915\u0930\u0924\u093e \u0939\u0948\u0964 \u0935\u093e\u0938\u094d\u0924\u0935 \u092e\u0947\u0902, rogue security software \u0938\u094d\u0935\u092f\u0902 \u090f\u0915 scam \u0939\u0948 \u091c\u093f\u0938\u0947 users \u0915\u094b unnecessary \u092f\u093e ineffective safety products \u0916\u0930\u0940\u0926\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0927\u094b\u0916\u093e \u0926\u0947\u0928\u0947 \u0915\u0947 \u0938\u093e\u0925-\u0938\u093e\u0925 \u0909\u0928\u0915\u0947 computer \u0915\u0940 security \u0914\u0930 confidentiality \u0938\u0947 \u0938\u092e\u091d\u094c\u0924\u093e \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Exploit Kits<\/h3>\n\n\n\n<p>Exploit Kits \u090f\u0915 type \u0915\u093e malicious software tools \u0939\u0948 \u091c\u093f\u0938\u0915\u093e \u0909\u092a\u092f\u094b\u0917 cyber criminals \u0926\u094d\u0935\u093e\u0930\u093e software applications, web browsers \u0914\u0930 operating system \u092e\u0947\u0902 weaknesses \u0915\u0947 \u0936\u094b\u0937\u0923 \u0915\u094b automatic \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964 \u0907\u0928 kits \u0915\u094b target systems \u092e\u0947\u0902 security flaws \u0915\u0940 \u092a\u0939\u091a\u093e\u0928 \u0915\u0930\u0928\u0947 \u0914\u0930 \u0909\u0928\u0915\u093e \u092b\u093e\u092f\u0926\u093e \u0909\u0920\u093e\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948, \u091c\u093f\u0938\u0938\u0947 attackers \u0915\u094b victim \u0915\u0947 computer \u092f\u093e device \u092a\u0930 trojan, ransomware \u092f\u093e spyware \u091c\u0948\u0938\u0947 malware payload \u092a\u0939\u0941\u0902\u091a\u093e\u0928\u0947 \u0915\u0940 \u0905\u0928\u0941\u092e\u0924\u093f \u092e\u093f\u0932\u0924\u0940 \u0939\u0948\u0964<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Cryptominers<\/h3>\n\n\n\n<p>Cryptominers, \u091c\u093f\u0928\u094d\u0939\u0947\u0902 cryptocurrency miners \u092f\u093e cryptojacking malware \u0915\u0947 form \u092e\u0947\u0902 \u092d\u0940 \u091c\u093e\u0928\u093e \u091c\u093e\u0924\u093e \u0939\u0948, \u090f\u0915 type \u0915\u093e malicious software \u0939\u0948 \u091c\u093f\u0938\u0947 victim \u0915\u0940 permission \u0915\u0947 \u092c\u093f\u0928\u093e cryptocurrency mine \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0909\u0938\u0915\u0947 computer resources \u0915\u094b hijack \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f design \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u0948\u0964 Cryptocurrency mining \u092e\u0947\u0902 blockchain network \u092a\u0930 \u0932\u0947\u0928\u0926\u0947\u0928 \u0915\u094b valid \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f complex mathematical puzzles \u0915\u094b solve \u0915\u0930\u0928\u093e \u0936\u093e\u092e\u093f\u0932 \u0939\u0948, \u0914\u0930 miners \u0915\u094b \u0909\u0928\u0915\u0947 efforts \u0915\u0947 \u0932\u093f\u090f \u0928\u090f \u092c\u0928\u093e\u090f \u0917\u090f cryptocurrency token \u0938\u0947 rewarded \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer \u092e\u0947\u0902 Malicious Software (Malware) \u0915\u094d\u092f\u093e \u0939\u0948\u0902 ? Malicious Software, \u091c\u093f\u0938\u0947 \u0906\u092e\u0924\u094c\u0930 \u092a\u0930 Malware \u0915\u0947 form \u092e\u0947\u0902 \u091c\u093e\u0928\u093e \u091c\u093e\u0924\u093e \u0939\u0948, \u0915\u093f\u0938\u0940 \u092d\u0940 \u0910\u0938\u0947 software \u0915\u094b referred \u0915\u0930\u0924\u093e&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-25584","post","type-post","status-publish","format-standard","hentry","category-computer-courses-certification"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"blogsite_featured_large_thumb":false,"blogsite_featured_small_thumb":false,"blogsite_post_thumb":false,"blogsite_widget_thumb":false},"uagb_author_info":{"display_name":"Sagar Prashikshan Sansthan","author_link":"https:\/\/sagarindia.in\/blog\/author\/digital-ramavi\/"},"uagb_comment_info":0,"uagb_excerpt":"Computer \u092e\u0947\u0902 Malicious Software (Malware) \u0915\u094d\u092f\u093e \u0939\u0948\u0902 ? Malicious Software, \u091c\u093f\u0938\u0947 \u0906\u092e\u0924\u094c\u0930 \u092a\u0930 Malware \u0915\u0947 form \u092e\u0947\u0902 \u091c\u093e\u0928\u093e \u091c\u093e\u0924\u093e \u0939\u0948, \u0915\u093f\u0938\u0940 \u092d\u0940 \u0910\u0938\u0947 software \u0915\u094b referred \u0915\u0930\u0924\u093e...","_links":{"self":[{"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/posts\/25584"}],"collection":[{"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/comments?post=25584"}],"version-history":[{"count":3,"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/posts\/25584\/revisions"}],"predecessor-version":[{"id":26308,"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/posts\/25584\/revisions\/26308"}],"wp:attachment":[{"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/media?parent=25584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/categories?post=25584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sagarindia.in\/blog\/wp-json\/wp\/v2\/tags?post=25584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}