The most common supply technique for ransomware is a phishing e-mail that includes an attachment or simply a hyperlink. For person machines in the event the consumer opens the attachment or clicks the url, the ransomware runs a plan that locks the system, and shows a need for payment. When this occurs, the only solution to decrypt the information i