{"id":1009,"date":"2024-05-30T06:09:33","date_gmt":"2024-05-30T04:09:33","guid":{"rendered":"https:\/\/edu.prodesign387.com\/software\/?p=1009"},"modified":"2024-05-30T16:55:02","modified_gmt":"2024-05-30T14:55:02","slug":"10-virusi-i-malware","status":"publish","type":"post","link":"https:\/\/edu.prodesign387.com\/software\/2024\/05\/30\/10-virusi-i-malware\/","title":{"rendered":"10. Virusi i malware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1009\" class=\"elementor elementor-1009\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1561422 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1561422\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a9976c\" data-id=\"9a9976c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71739dd elementor-widget elementor-widget-text-editor\" data-id=\"71739dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Definicije<\/h1><h3>Malware &#8211; Malicious software<\/h3><p><strong>Virus &#8211; <\/strong>Kod koji se replicira u sistemima sa korisni\u010dkom intervencijom<\/p><p><strong>Worm &#8211; <\/strong>Kod koji se sam \u0161iri\/replicira kroz sisteme bez korisni\u010dke intervencije<\/p><p><strong>Bot &#8211; <\/strong>Automatizovani proces koji komunicira sa drugim mre\u017enim servisima\/aplikacijama<\/p><p><strong>Trojan &#8211; <\/strong>Malware koji se predstavlja kao legitimni softver<\/p><p><strong>Ransomware &#8211; <\/strong>Malware koji enkriptuje podatke korisnika i tra\u017ei otkupninu<\/p><p><strong>Rootkit &#8211; <\/strong>Sakriva svoje prisustvo ili prisustvo drugih malwarea<\/p><p><strong>Backdoor &#8211; <\/strong>Omogu\u0107ava udaljenom napada\u010du da upravlja sa zara\u017eenim kompjuterom<\/p><p><strong>RAT &#8211; <\/strong>Remote Access Trojan, sli\u010dno backdooru (kamera, mikrofon, hard disk&#8230;)<\/p><p><strong>Info Stealer &#8211; <\/strong>Krade informacije od \u017ertve, \u0161ifre i druge privatne stvari<\/p><p><strong>Keylogger &#8211;<\/strong> Bilje\u017ei sve \u0161to otkucate na tastaturi<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d92bae4 elementor-widget elementor-widget-video\" data-id=\"d92bae4\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=jXrSSq1D0e8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b044e0 elementor-widget elementor-widget-spacer\" data-id=\"0b044e0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab0d90 elementor-widget elementor-widget-text-editor\" data-id=\"3ab0d90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Metode inficiranja<\/h1><h3><strong>USB<\/strong><\/h3><p>Mnogi od vas su se susreli sa nekom vrstom USB virusa. Ve\u0107inom su vam sakrivali fajlove ili inficirali neki od fajlova (Word, Excel) ali to nije njihov pravi cilj.<\/p><p>Sam USB interfejs omogu\u0107ava mnogo toga i odre\u0111eni malware-i znaju biti mnogo opasni. Ispod imate jedan chart koji vam pokazuje sve mogu\u0107nosti zloupotrebe USB interfejsa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b56dd8 elementor-widget elementor-widget-image\" data-id=\"9b56dd8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/USB-attacks-1.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8189e8b elementor-widget elementor-widget-video\" data-id=\"8189e8b\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=7YpJQT55_Y8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c5e537 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c5e537\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-384a23c\" data-id=\"384a23c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e263547 elementor-widget elementor-widget-spacer\" data-id=\"e263547\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6b81b4 elementor-widget elementor-widget-text-editor\" data-id=\"f6b81b4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>PDF<\/h3><div class=\"flex flex-grow flex-col gap-3 max-w-full\"><div class=\"min-h-[20px] flex flex-col items-start gap-3 overflow-x-auto whitespace-pre-wrap break-words\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>PDF fajlovi nisu posebno opasni, ali mogu predstavljati rizik zbog nekoliko potencijalnih sigurnosnih problema:<\/p><ol><li><p><strong>Malware i virusi<\/strong>: PDF fajlovi mogu sadr\u017eati zlonamjerni softver (malware) ili viruse koji mogu o\u0161tetiti ili zaraziti ure\u0111aj na koji se otvaraju.<\/p><\/li><li><p><strong>Exploit-i sigurnosnih propusta<\/strong>: PDF fajlovi mogu sadr\u017eavati exploit-e koji iskori\u0161tavaju sigurnosne propuste u softveru za pregledanje PDF-a. Ovo mo\u017ee dovesti do neovla\u0161tenog pristupa va\u0161em ra\u010dunaru ili mre\u017ei.<\/p><\/li><li><p><strong>Phishing napadi<\/strong>: PDF fajlovi mogu biti deo phishing napada. Na primjer, mo\u017eda \u0107ete dobiti PDF koji izgleda kao legitimni dokument (npr. bankovni izvod), ali mo\u017ee vas preusmjeriti na la\u017ene web stranice gde \u0107e se poku\u0161ati prikupiti va\u0161e li\u010dne informacije ili ostvariti neovla\u0161tene transakcije.<\/p><\/li><li><p><strong>Embedded scripts<\/strong>: PDF fajlovi mogu sadr\u017eavati skripte koje se automatski izvr\u0161avaju kada se fajl otvori. Ove skripte mogu biti zlonamjerne i izvr\u0161iti ne\u017eeljene akcije, kao \u0161to su prikupljanje informacija ili pokretanje zlonamjernih aktivnosti.<\/p><\/li><li><p><strong>Pharming<\/strong>: PDF fajlovi mogu biti kori\u0161\u0107eni u kombinaciji sa pharming tehnikama, gdje se poku\u0161ava preusmeriti korisnike na la\u017ene web stranice kako bi se prikupili podaci o va\u0161im \u0161iframa.<\/p><\/li><\/ol><p>Da biste se za\u0161titili od potencijalnih opasnosti, preporu\u010duje se slijede\u0107e:<\/p><ul><li><p><strong>Update softvera<\/strong>: Redovno a\u017eurirajte softver za pregledanje PDF-a kako biste ispravili poznate sigurnosne propuste.<\/p><\/li><li><p><strong>Budite oprezni sa nepoznatim izvorima<\/strong>: Ne otvarajte PDF fajlove koji dolaze od nepoznatih izvora ili koji vam sti\u017eu putem sumnjivih e-mailova.<\/p><\/li><li><p><strong>Koristite antivirusni softver<\/strong>: Instalirajte i redovno a\u017eurirajte antivirusni softver kako biste detektovali i blokirali zlonamjerni softver.<\/p><\/li><li><p><strong>Isklju\u010dite automatsko izvr\u0161avanje skripti<\/strong>: Konfiguri\u0161ite svoj softver za pregledanje PDF-a tako da automatski ne izvr\u0161ava skripte.<\/p><\/li><li><p><strong>Provjerite URL adrese<\/strong>: Ako dobijete PDF koji sadr\u017ei linkove, pa\u017eljivo provjerite URL adrese pre nego \u0161to ih kliknete kako biste bili sigurni da nisu sumnjive ili la\u017ene.<\/p><\/li><\/ul><p>Pravilno upravljanje PDF fajlovima i oprez pri otvaranju mo\u017ee zna\u010dajno smanjiti rizike i obezbijediti sigurnost va\u0161eg ra\u010dunara i podataka.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73ffecf elementor-widget elementor-widget-video\" data-id=\"73ffecf\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/-rQPwVipDjo&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb80ed9 elementor-widget elementor-widget-spacer\" data-id=\"bb80ed9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6e1c57 elementor-widget elementor-widget-text-editor\" data-id=\"f6e1c57\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>MITM (Main In The Middle)<\/strong><\/h3><p>Dok se obavlja prenos podataka izme\u0111u ure\u0111aja (ra\u010dunar, telefon) i servera, napada\u010d se pomo\u0107u vje\u0161tina i alata postavlja izme\u0111u 2 endpointa (ra\u010dunar 1, ra\u010dunar 2) i presre\u0107e podatke. Dok 2 strane vjeruju da komuniciraju me\u0111usobno, one u stvari komuniciraju sa napada\u010dem (i preko njega). MiTM napadi se ne doga\u0111aju samo kod komunikacije ure\u0111aj-server, ve\u0107 se mogu dogoditi kad god 2 sistema virtuelno razmjenjuju podatke.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51981bf elementor-widget elementor-widget-image\" data-id=\"51981bf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/MITM.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c91926 elementor-widget elementor-widget-video\" data-id=\"0c91926\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=kqgn-HF4gKg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d52622d elementor-widget elementor-widget-spacer\" data-id=\"d52622d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4a640a elementor-widget elementor-widget-text-editor\" data-id=\"f4a640a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Torrent<\/h3><p>Mnogo je torrenta zara\u017eeno raznoraznim malware-ima. Morate biti vrlo vrlo pa\u017eljivi jer poku\u0161avaju da vas namame na raznorazne na\u010dine.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2674bf8 elementor-widget elementor-widget-image\" data-id=\"2674bf8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/Torrent-Flowchart.jpeg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7ff946 elementor-widget elementor-widget-image\" data-id=\"f7ff946\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/pr_russian_doll-style_malware.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0506ad5 elementor-widget elementor-widget-spacer\" data-id=\"0506ad5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-540d25c elementor-widget elementor-widget-text-editor\" data-id=\"540d25c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Phishing<\/b><\/h3><p>Phishing (varijanta engleske rije\u010di za pecanje, fishing) je vrsta socijalnog in\u017eenjeringa koja se odnosi na prijevare, kojima se slu\u017ee zlonamjerni korisnici \u0161alju\u0107i la\u017ene poruke koriste\u0107i pritom postoje\u0107e internet servise. Rije\u010d je o kriminalnoj aktivnosti. Koriste\u0107i razne na\u010dine manipulacije, kriminalci od korisnika poku\u0161avaju prikupiti povjerljive podatke (korisni\u010dka imena, \u0161ifre, podaci s kreditnih kartica i sl.) kako bi ostvarili financijsku korist. U pravilu, phishing poruke prenose se putem elektroni\u010dke po\u0161te koja navodi korisnika da klikne na odre\u0111eni link koji ga dalje vodi na stranice zlo\u0107udnog web poslu\u017eitelja. Takve zlo\u0107udne Web stranice obi\u010dno se la\u017eno predstavljaju kao Web stranice banaka, servisa za elektroni\u010dko pla\u0107anje (PayPal i dr.) i sl. krivotvore\u0107i, odnosno imitiraju\u0107i njihov izgled.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc8197d elementor-widget elementor-widget-image\" data-id=\"fc8197d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/email-screenshot-fresh-phish_0-1.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0bb017 elementor-widget elementor-widget-image\" data-id=\"a0bb017\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/Phishing-infographic_HR_4-1-scaled-e1575498652844.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f55d9cc elementor-widget elementor-widget-spacer\" data-id=\"f55d9cc\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d31a31 elementor-widget elementor-widget-text-editor\" data-id=\"8d31a31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Punny code<\/strong><\/h3><p>Od prije 3 godine, postale su dozvoljene domene koje imaju u sebi druge karaktere osim engleske abecede. To zna\u010di da sada mo\u017eete registrovati domene sa slovima &#8220;\u010c\u0110\u017d\u0106&#8221; i npr. arapskim, kineskim, \u0107irili\u0107nim karakterima.<\/p><p>Hakeri ovo na\u017ealost zloupotrebljavaju kako bi registrovali domene sli\u010dne poznati stranicama koje svakodnevno koristimo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ae1051 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5ae1051\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.\u0430\u0440\u0440\u04cf\u0435.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">La\u017ena web stranica koja li\u010di na www.apple.com<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e7a572 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"9e7a572\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.apple.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Prava web stranica www.apple.com<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bd9ec2 elementor-widget elementor-widget-text-editor\" data-id=\"6bd9ec2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>https:\/\/twitter.com\/LukasStefanko\/status\/1072770484633255936<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51808df elementor-widget elementor-widget-text-editor\" data-id=\"51808df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Exploiti<\/b><\/p><p>Pojam &#8216;exploit&#8217; ozna\u010dava program, dio koda ili neke podatke koje pi\u0161u hakeri ili developeri virusa sa namjerom da iskoriste &#8216;bug&#8217; ili ranjivost u aplikaciji ili operativnom sistemu. Kori\u0161tenjem &#8216;exploit&#8217;-a, napada\u010d mo\u017ee neovla\u0161teno pristupiti ili koristiti aplikaciju ili operativni sistem.<\/p><p><strong>CVE<\/strong> &#8211; <em>Common Vulnerabilities and Exposures<\/em><\/p><p><strong>0-day<\/strong> &#8211; <em>Exploit koji je poznat proizvo\u0111a\u010du ili hakerima a za koji trenutno nema patch.<\/em><\/p><p><strong>Exploit kits<\/strong> &#8211; <em>To je program koji sadr\u017ei raznorazne vrste exploita u sebi. Lagan je za kori\u0161tenje za osobe koji nisu upu\u0107ene u detalje exploita.<\/em><\/p><p>Da bi ste bili u toku \u0161ta se to de\u0161ava na sceni exploita, mo\u017eete saznati putem ove web stranice <a href=\"http:\/\/www.exploit-db.com\">www.exploit-db.com<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f87df61 elementor-widget elementor-widget-video\" data-id=\"f87df61\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=rZoslioj1zg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ba6874 elementor-widget elementor-widget-spacer\" data-id=\"9ba6874\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7bd09 elementor-widget elementor-widget-text-editor\" data-id=\"4a7bd09\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Ransomware<\/h1><h3><strong>\u0160ta trebate znati <\/strong><\/h3><p>1. Napada\u010d ne bira metu, nebitno je da li ste siromah, advokatska kancelarija ili bolnica &#8230;<br \/>2. Va\u0161i fajlovi su kriptovani velikom brzinom<br \/>3. Pla\u0107anje se vr\u0161i putem kripto valuta<br \/>4. \u0160to vi\u0161e \u010dekate, cijena otkupa je sve ve\u0107a<br \/>5. Pla\u0107anjem otkupa, nemate garanciju da \u0107ete dobiti fajlove nazad<br \/>6. Napadi su vrlo sofisticirani, tako da je te\u0161ko prona\u0107i odgovornu osobu<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2026d5 elementor-widget elementor-widget-video\" data-id=\"b2026d5\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=O36wWU4TfrI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7f92c1 elementor-widget elementor-widget-video\" data-id=\"d7f92c1\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=PqBpSKTC0ak&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f30bd1e elementor-widget elementor-widget-spacer\" data-id=\"f30bd1e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c48a9c elementor-widget elementor-widget-text-editor\" data-id=\"9c48a9c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Identifikacija i dekripcija fajlova<\/b><\/h3><p>Svaki ransomware \u0107e vam ostaviti neku vrstu poruke gdje se nalaze informacije kako ih mo\u017eete kontaktirati i na koji bitcoin ra\u010dun da uplate. Pored toga obi\u010dno svaki kriptovani fajl ima dodatnu ekstenziju.<\/p><p>Shodno ovim informacijama putem stranice <a href=\"https:\/\/www.nomoreransom.org\/\">No More Ransom<\/a> mo\u017eemo identifikovati koji nas je ransomware zarazio i saznati da li postoji Decryptor za njega.<\/p><p>Rje\u0161enje za ransomware jeste izolirani backup podataka. Nakon napada ransomware-om mora se izvr\u0161iti detaljna analiza svih ure\u0111aja kako bi se poku\u0161alo otkriti na koji na\u010din je upad izvr\u0161en.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb7a25d elementor-widget elementor-widget-image\" data-id=\"fb7a25d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"790\" height=\"355\" src=\"https:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/2-1-1024x460.png\" class=\"attachment-large size-large wp-image-464\" alt=\"\" srcset=\"https:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/2-1-1024x460.png 1024w, https:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/2-1-300x135.png 300w, https:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/2-1-768x345.png 768w, https:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/2-1-1200x539.png 1200w, https:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/2-1.png 1275w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ac740 elementor-widget elementor-widget-spacer\" data-id=\"47ac740\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0e265f elementor-widget elementor-widget-text-editor\" data-id=\"d0e265f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>WannaCry<\/b><\/p><p>WannaCry, tako\u0111er poznat po imenu WanaCrypt0r 2.0, jest ransomware (ucjenjiva\u010dki softver, vrsta zlonamjernog softvera). Koristio se u masivnom cyber-napadu u maju 2017. kojim je zara\u017eeno 75.000 ra\u010dunara u 99 zemalja.<\/p><p>Napad je pogodio Telef\u00f3niku i nekoliko drugih ve\u0107ih kompanija u \u0160paniji, dijelove britanske Nacionalne zdravstvene slu\u017ebe (NHS), FedEx i Deutsche Bahn. Druge mete napada u najmanje 99 zemalja prijavile su da su napadnute otprilike u isto vrijeme. Rusko Ministarstvo unutra\u0161njih poslova, Ministarstvo vanrednih situacija i telekomunikacijska kompanija MegaFon prijavili su da je zara\u017eeno preko 1000 ra\u010dunara.<\/p><p>Smatra se da softver koristi exploit pod nazivom EternalBlue koji je navodno razvila ameri\u010dka Agencija za nacionalnu bezbjednost (NSA) da bi napala ra\u010dunare koji koriste operativni sistem Microsoft Windows. Iako je 14. marta 2017. objavljena sigurnosna zakrpa kojom je uklonjen propust koji omogu\u0107ava rad ovog softvera, spor proces i\/ili odga\u0111anje instaliranja sigurnosnih a\u017euriranja ostavilo je neke korisnike i organizacije ranjivim.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8c32f4 elementor-widget elementor-widget-video\" data-id=\"d8c32f4\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=vveLaA-z3-o&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ace24e1 elementor-widget elementor-widget-spacer\" data-id=\"ace24e1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea8440a elementor-widget elementor-widget-text-editor\" data-id=\"ea8440a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Virus Total<\/h1><p>Kada na VirusTotal uploadujemo neki fajl, on \u0107e u isto vrijeme datoteku skenirati i \u201dpro\u010de\u0161ljati\u201d je sa barem desetak druga\u010dijih antivirusnih programa. Nadalje, ako je ta ista datoteka nedavno bila skenirana od strane drugih korisnika i u slu\u010daju da su ono ne\u0161to prona\u0161li \u0161to nisu trebali prona\u0107i, rezultati \u0107e se odmah vidjeti.<\/p><p>Ako vidite poruku u kojoj pi\u0161e ne\u0161to tipa \u201d0\/65\u201d to je dobar znak. Ta poruka zna\u010di da unutar datoteke nije prona\u0111eno ni\u0161ta \u0161tetno i da je to potvr\u0111eno od strane 65 antivirusnih programa koji su datoteku skenirali. To opet ne zna\u010di da je VirusTotal savr\u0161en u svome skeniranju i u svojim pretragama. Ali opet, niti jedan softver, kao niti hardver nije savr\u0161en.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-838a1bc elementor-widget elementor-widget-video\" data-id=\"838a1bc\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/qDunOHGVS7k&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a08e4d elementor-widget elementor-widget-spacer\" data-id=\"0a08e4d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0481045 elementor-widget elementor-widget-text-editor\" data-id=\"0481045\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Antivirus i antimalware alati<\/h1><p><strong>Kaspersky, Avast, NOD32 &#8230;<\/strong><\/p><p>Besplatna verzija svakog antivirusa \u0107e pru\u017eiti osnovne funkcije potrebne svakom obi\u010dnom korisniku. Za one naprednije u pla\u0107enoj verziji dobijate mnogo bolju za\u0161titu shodno verziji koju odaberete.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-530e28b elementor-widget elementor-widget-image\" data-id=\"530e28b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/Main_features_of_the_Avast_packages.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efbec15 elementor-widget elementor-widget-image\" data-id=\"efbec15\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"http:\/\/edu.prodesign387.com\/software\/wp-content\/uploads\/sites\/3\/2019\/12\/main-qimg-2e86a2f17742f527a1f5501e2e00c2a4.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-660c91c elementor-widget elementor-widget-spacer\" data-id=\"660c91c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed7fc8 elementor-widget elementor-widget-text-editor\" data-id=\"7ed7fc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><b>LiveCD Antivirus<\/b><\/h1><div class=\"flex flex-grow flex-col gap-3 max-w-full\"><div class=\"min-h-[20px] flex flex-col items-start gap-3 overflow-x-auto whitespace-pre-wrap break-words\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Kaspersky RescueCD (<a href=\"https:\/\/www.kaspersky.com\/downloads\/free-rescue-disk\">https:\/\/www.kaspersky.com\/downloads\/free-rescue-disk<\/a>) je alat koji se koristi u svrhu spa\u0161avanja sistema od ozbiljnih sigurnosnih problema, posebno kada je ra\u010dunar zara\u017een ozbiljnim malware-om, virusima, rootkit-ovima.<\/p><ol><li><p><strong>Spa\u0161avanje zara\u017eenih sistema<\/strong>: Kaspersky RescueCD omogu\u0107ava pokretanje ra\u010dunara sa nezavisnog medija (poput CD-a, DVD-a ili USB ure\u0111aja) i pristupanje ra\u010dunaru koji je zara\u017een ozbiljnim malverom. Time se omogu\u0107ava analiza i \u010di\u0161\u0107enje sistema kada sistem a ni virus nisu aktivni.<\/p><\/li><li><p><strong>Offline skeniranje i uklanjanje malvera<\/strong>: Kada se ra\u010dunar pokrene sa Kaspersky RescueCD-a, alat omogu\u0107ava offline skeniranje sistema, identifikaciju i uklanjanje zlonamjernog softvera bez potrebe za pokretanjem operativnog sistema koji mo\u017ee biti kompromitovan.<\/p><\/li><li><p><strong>Pronala\u017eenje rootkit-ova<\/strong>: Kaspersky RescueCD je posebno efikasan u detekciji i uklanjanju rootkit-ova, koji su sofisticirani oblici malvera koji se mogu sakriti u sistemu i te\u0161ko ih je otkriti dok je operativni sistem pokrenut.<\/p><\/li><\/ol><p>U su\u0161tini, Kaspersky RescueCD je koristan alat za spa\u0161avanje i popravku sistema koji su pogo\u0111eni ozbiljnim sigurnosnim pretnjama, pru\u017eaju\u0107i efikasne na\u010dine za \u010di\u0161\u0107enje, oporavak i za\u0161titu ra\u010dunara.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e42b59 elementor-widget elementor-widget-video\" data-id=\"9e42b59\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=-EH4_ozo_C8&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f34789a elementor-widget elementor-widget-spacer\" data-id=\"f34789a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04139c2 elementor-widget elementor-widget-text-editor\" data-id=\"04139c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Vje\u017eba<\/h1><h3><strong>Vje\u017eba 1<\/strong><\/h3><ol><li>U\u010ditati Kaspersky LiveCD i dr. Web u virtuelnoj ma\u0161ini i pokrenuti skeniranje.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DefinicijeMalware &#8211; Malicious softwareVirus &#8211; Kod koji se replicira u sistemima sa korisni\u010dkom intervencijomWorm &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":488,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/posts\/1009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/comments?post=1009"}],"version-history":[{"count":19,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/posts\/1009\/revisions"}],"predecessor-version":[{"id":1218,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/posts\/1009\/revisions\/1218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/media\/488"}],"wp:attachment":[{"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/media?parent=1009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/categories?post=1009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edu.prodesign387.com\/software\/wp-json\/wp\/v2\/tags?post=1009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}