: Software that locks your files and demands payment for their release.
: Turning your computer into a tool for cyberattacks without your knowledge. Recommendations:
: .json or .ini files that store user settings or API keys.