Monday, October 15, 2018

BotNet Attacks



A botnet is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.A botnet refers to a type of bot running on an IRC network that has been created with a Trojan. 




      When an infected computer is on the Internet the bot can then start up an IRC client and connect to an IRC server. The Trojan will also have been coded to make the bot join a certain chat room once it has connected. Multiple bots can then join in one channels and the person who has made them can now spam IRC chat rooms, launch huge numbers of Denial of Service attacks against the IRC servers causing them to go down.
A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.
            

 Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based. According to a report from Russian-based Kaspersky Labs, botnets -- not spam, viruses, or worms -- currently pose the biggest threat to the Internet.

The word Botnet is formed from the words ‘robot’ and ‘network’. Cyber criminals use special Trojan viruses to breach the security of several users’ computers, take control of each computer,and organize all of the infected machines into a network of ‘bots’ that the criminal can remotely manage. Often, the cyber criminal will seek to infect and control thousands, tens of thousands, or even millions of computers. 






 How to prevent your computer becoming part of a Botnet

Installing effective anti-malware software will help to protect your computer against Trojans and other threats.




References: 

kaspersky.com




Related Posts:

  • Speed Up Your Computer Virtual memory combines your computer’s RAM with temporary space on your hard disk. When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file … Read More
  • CMD Path Options 1. Go to Drive(Home Drive Path) Open CMD then test these codes. The Code cd\ Example Before After 2. Go to a Folder Example You can go in to the folder path by type the code  and… Read More
  • Hide Files inside a Image First of all you should compress your files what you need to hide.Then Hide compressed file using a CMD(Command Prompt) code. After doing that when you double click you output(.jpg image) it will open as a ima… Read More
  • Windows Password Hack There are 2 ways of resetting user password. 1. Renaming cmd.exe as sethc.exe 2. Using manage option Renaming cmd.exe as sethc.exe Require : A windows DVD(Windows 7 or Windows 8) Ability to use CMD(Command… Read More
  • Matrix Style CMD Screen You can create this by using notepad easily. Green colored numbers randomly goes up repeatedly. Steps : First open notepad. Win key + R then Enter Type notepad now Enter Then type These codes. … Read More

0 comments:

Post a Comment