Documente Academic
Documente Profesional
Documente Cultură
ISK601 K4
ZOMBIE COMPUTER AND BOTNETS
World of cyber got many advantages for hackers. Internet crimes like zombies computer, and
botnets frequently get attetntion. Its not hard to figure out from the context that these are
computer or network security threats. But what exactly are they, how do they work, and what
damage do they cause?
Ping of Death - bots create huge electronic packets and sends them on to victims
Mailbomb - bots send a massive amount of e-mail, crashing e-mail servers
Smurf Attack - bots send Internet Control Message Protocol (ICMP) messages to reflectors
Teardrop - bots send pieces of an illegitimate packet; the victim system tries to recombine the
pieces into a packet and crashes as a result
Firewalls can be part of a software package or even incorporated into some hardware like
routers or modems.
Set your computers personal firewall to its maximum-security level because this will
require applications seeking access to the Internet to notify you, enabling you to track all
incoming as well as outgoing traffic. In turn, this can help you identify repeated requests
from the same application to access just a few destinationsa telltale sign the application
is a zombie.
Password
-
Antivirus
-
Always update your antivirus and scan your computers hard drive to find and remove the
malware.
Keep in mind some types of malware will prevent your antivirus software from running. In
that event, download additional antivirus software and try to run each one until you find a
program that will get past the zombies self-defenses.
Zombie/bot malware frequently hides from security software scanners by installing a
rootkit. A rootkit is a stealth piece of software thats usually malicious. Installing rootkit
detection to prevent the zombie.