• 🏆 Texturing Contest #33 is OPEN! Contestants must re-texture a SD unit model found in-game (Warcraft 3 Classic), recreating the unit into a peaceful NPC version. 🔗Click here to enter!
  • 🏆 Hive's 6th HD Modeling Contest: Mechanical is now open! Design and model a mechanical creature, mechanized animal, a futuristic robotic being, or anything else your imagination can tinker with! 📅 Submissions close on June 30, 2024. Don't miss this opportunity to let your creativity shine! Enter now and show us your mechanical masterpiece! 🔗 Click here to enter!

Zombie Computers

Status
Not open for further replies.
Level 8
Joined
Apr 4, 2005
Messages
499
Have you ever heard of zombiecomputers [you]?

A hacker can use your computer with help from a little program and you can't almost not feel it on the speed of your comp. As you can with spyware.
These "zombiecomputers" can be used to shut down servers and threaten companys like those firms who selling Internet connections or earn money on their internet shop (It's mostly a problem for small firms which don't have a high security).
You can also hire a zombiecomputer army (wow) to shut down a server.
It's very expensive (and i don't know how to hire them)

This is a fact, not some science fiction shit. I have Read an article in an newspaper. Which NOT one of those which spread gossip.

Link to the fact: http://politiken.dk/VisArtikel.sasp?PageID=374222 (danish)
And their source: http://www.honeynet.org/papers/bots/ (english)

This is what the Zombiecomputers do:

DDoS-attack (Distributed Denial-of-Service): The hacker break into nummerous pc's and install a bot. He use the computers from his own pc so the police only track the zombie computers ip, and not his. When he attack he overload servers so nobody else can use the server.

Spamming: He can also use the zombies to send tons of spam mails, often as mercenary for a greater firm.

Sniffing: Bot's can also place a sniffer (a spy) which looks for passwords and personal informations. And if the zombie is being used by more than one hacker, he can spy on the other hackers network of zombies and might be able to steal the other hackers zombies.

Spreading of bots: Often zombies can also be used to spread more bots, virus and worms.

Manipulation of polls: Online polls can also be manipulated 'coz each zombie have its own ip and it's vote have the same value as a real person.
 
Level 3
Joined
May 16, 2005
Messages
60
Why was this adressed to me?

Out of curiosity.
Is it another one of thoes cool things that makes it sound like your talking directly to whoever is looking at it?
 
Status
Not open for further replies.
Top