123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

About Botnet

Profile Picture
By Author: Ashley Weir
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

BotNet, also called zombie network and network of bots is a group of computers which are used to discreetly send data like spam and viruses to other computers on the internet. These actions are carried out by malicious programs without the knowledge of the users. These malicious programs mainly consist of viruses, Trojans and worms. Infected computers are called bots or zombies. Most computers which are infected are personal home internet PCs which are inadequately protected.

When a PC becomes part of a BotNet, it can be instructed to do almost anything by the creator of botnet. In effect it becomes a drone which cannot resist the commands of its master. In this case, the master is the creator of the malicious software (malware). Most Bots are employed in propagation of spam and viruses. Often malware is used for key-press logging which can result in mass identity theft. Zombie computers can also be used for denial of service attacks in which many bots simultaneously log onto a particular server, thus exceeding the server's bandwidth and crashing it. This technique is particularly effective when the Botnet is large and ...
... contains thousands of computers. Many advanced malware can even spread themselves via email while the malware of smaller botnets lack this capability.

BotNets are programmed in such a way that they are difficult to find and analyze. Normally they receive instructions from their creators through IRC (Internet Relay Channels). As of April 2008, the Storm BotNet and the Kraken BotNet are the largest BotNets in the world with an estimated 400,000 bots. Other significant BotNets are Rbot and Bobax with an estimated 20,000 bots each.

So on a day to basis, the best way to protect your computer properly is to frequently scan and update your antivirus and firewall software. Special sensors called 'honeynets' have also been set up on the internet these nets mimic the characteristics of computers with known security flaws in an effort to lure hackers into them and track down malware creators. It has been recently quoted by Kaspersky Labs (creators of Kaspersky anti-virus) that botnets pose more of a threat to the internet community than individual viruses and worms.

Total Views: 340Word Count: 364See All articles From Author

Add Comment

Computers Articles

1. What Identity Governance Really Means In Modern Enterprises
Author: Mansoor Alam

2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates

3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma

4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions

5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights

6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point

7. Spark Matrix™: Data Governance Solutions
Author: Umangp

8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david

9. Naming Development & Management
Author: brainbell10

10. Mysql Database Development & Management Services
Author: brainbell10

11. Mongodb Development & Management
Author: brainbell10

12. Spark Matrix™: Conversational Automation
Author: Umangp

13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK

14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams

15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: