What is Bot Net?

Notice that the Are you suddenly creeped out for some reason you can't explain? It could be nothing, but it could be (Bot Net) that your computer is busy with other things. Among these, it is the hacker attack that has made the computer part or slave of a bot.

bot net attack
Bot Bot Attack

"How can this happen; I use software constantly to this day? ”

The software used by the Bots is clean and is usually installed on the victim's computer by the victim himself / herself, who has been deceived in some way. The software could appear as a legitimate product claiming to be an anti-virus scanner when in fact it is malicious Scareware. Once installed, a "door" opens on your system from where malware developers can install rootkits and applications that allow bot networks.

bot net

Bot net software effectively puts your computer at the disposal of the hacker. It works "normally" and waits to receive instructions from a master control terminal controlled by the bot net owner who is usually a criminal.

The system of computers i.e. those who deal only with system hacking, earn a lot of money by selling the rights to manage the infected computer to owners Bot Net.

Well read, an infected computer can be "sold" without the permission of its owner.

A typical bot can consist of tens of thousands of computers that are all controlled by a command and control terminal. Hackers use bot nets because they allow them to combine the computing power and network of all infected computers to attack a single target. You know the distributed Denial of Service (DDoS) attacks.

These attacks are very strong, and the target of the attack may not be able to manage the network and the resources of a Bot Net which may also contain 20.000 computers.

Some of the criminals, having such a "weapon" in their hands, also carry out blackmail to stop the attacks. Some companies (although it is a wrong policy) pay to have access to their systems again.

How do Bot Nets become so big?

Developers who create bots can have net tax-free earnings. Many times they pay 250 or more for 1000 infected computers that can be enslaved by a bot. Of course the bad guys will use all the tools needed to trick unsuspecting users and install crapware. Via spam e-mails, or malicious links from forums and various other malicious websites, or anything else they can think of to get the victim to click on installation of the malware.

How can we stop hackers from slave our computer?

1. Install a special malware scanner

The program that Antivirus may be great, but it's not so good at finding scareware, malware, rootkits, and other forms of malware. Think something like Malwarebytes which is known for finding malware that is often not "seen" by traditional antivirus programs.

2. Watch out for some fake anti-virus

In your search for a malware protection program you could end up installing something malicious if you do not cross out the first view you read somewhere. Never install anything sent to you e-mail or from a pop-up window.

3. Back up to your NET system.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).