123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

About Botnet

Profile Picture
By Author: Ashley Weir
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

BotNet, also called zombie network and network of bots is a group of computers which are used to discreetly send data like spam and viruses to other computers on the internet. These actions are carried out by malicious programs without the knowledge of the users. These malicious programs mainly consist of viruses, Trojans and worms. Infected computers are called bots or zombies. Most computers which are infected are personal home internet PCs which are inadequately protected.

When a PC becomes part of a BotNet, it can be instructed to do almost anything by the creator of botnet. In effect it becomes a drone which cannot resist the commands of its master. In this case, the master is the creator of the malicious software (malware). Most Bots are employed in propagation of spam and viruses. Often malware is used for key-press logging which can result in mass identity theft. Zombie computers can also be used for denial of service attacks in which many bots simultaneously log onto a particular server, thus exceeding the server's bandwidth and crashing it. This technique is particularly effective when the Botnet is large and ...
... contains thousands of computers. Many advanced malware can even spread themselves via email while the malware of smaller botnets lack this capability.

BotNets are programmed in such a way that they are difficult to find and analyze. Normally they receive instructions from their creators through IRC (Internet Relay Channels). As of April 2008, the Storm BotNet and the Kraken BotNet are the largest BotNets in the world with an estimated 400,000 bots. Other significant BotNets are Rbot and Bobax with an estimated 20,000 bots each.

So on a day to basis, the best way to protect your computer properly is to frequently scan and update your antivirus and firewall software. Special sensors called 'honeynets' have also been set up on the internet these nets mimic the characteristics of computers with known security flaws in an effort to lure hackers into them and track down malware creators. It has been recently quoted by Kaspersky Labs (creators of Kaspersky anti-virus) that botnets pose more of a threat to the internet community than individual viruses and worms.

Total Views: 290Word Count: 364See All articles From Author

Add Comment

Computers Articles

1. Find Your Perfect Device At The Best Acer Store Near Me – Explore Acer Aspire In Chennai
Author: Prachi Grey

2. Case Study: Enhance Customer Satisfaction Using Deliveroo Food Delivery Scraping
Author: Food Data Scrape

3. Custom Wordpress Plugin Development: Why It’s Essential For A High-performance Website
Author: Egrove Systems

4. How To Create An Email Marketing Plan That Works?
Author: goodcoders

5. How To Create An E-learning Platform Like Udemy And Coursera?
Author: goodcoders

6. Build A Strong Online Presence With Wordpress: Celebrate The Content With A Professional Wordpress Website Development Agency
Author: Egrove Systems

7. Top Features To Look For In An Invoice Management Tool In 2025
Author: sneha

8. Boost Accuracy And Efficiency With Sales Order Management Tools
Author: vishva

9. Real Time Cricket Score Trends Via Crex Data Scraping
Author: Retail Scrapes

10. Unlocking Digital Excellence: The Value Of Professional Wordpress Developer Services
Author: Egrove Systems

11. The 7 Most Important Seo Tips For Higher Rankings
Author: Akshay Sharma

12. Effortless Ordering: How Cloud-based Purchase Order Solutions Streamline Procurement
Author: sneha

13. Why Wordpress Remains The Top Choice For Website Development In 2025
Author: Egrove Systems

14. Making Ai Chatbots Simple For Everyone
Author: davidbeckam

15. Scraping Mcdonalds Menu Prices And Items Data
Author: Food Data Scrape

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: