123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Are You A Spam Zombie?

Profile Picture
By Author: Niall Roche
Total Articles: 9
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Over the past few years you've all become familiar with the terms spam, spam filter, whitelists, blacklists and a whole myriad of other terminology associated with the problem of spam. You now have to add a new and extremely worrying phrase to that list - spam zombie.

With the net closing in around them spammers are looking for new and more inventive ways to send out their junk email. Spam filters and challenge response systems are becoming progressively more intelligent and blocking more spam each day. What was a spammer to do? The spammers took the next step - infiltrating your PC and using it as a spamming tool.

When most of you think of the word zombie you're reminded of old B movies with groaning zombies chasing the terrified actress through a castle, swamp or whatever low cost setting the movie revolved around. Spam zombies are, however, far more real and far more dangerous.

A spam zombie is when your computer is taken over by a type of virus called a Trojan. Once this Trojan virus is on your computer it sets up an SMTP (Simple Mail Transfer Protocol) application which allows it to begin ...
... sending email directly from your PC to tens of thousands of victims. This all happens invisibly in the background and can be difficult to detect for even the experienced computer user.

How do these Trojans get onto your computer? As in most cases they come from porn, warez or similar sites. One of the first spam zombie trojans to appear became available via a link on sites promising viewers free access to a porno webcam. One click later and the Trojan is installed on your computer ready to send out spam. Phatbot and Proxy-Guzu are two of the more common Trojans used for the purpose of turning your computer into a spam zombie.

How can you check if your computer has become a spam zombie? Make absolutely certain that both your anti-virus and firewall software have current detection signatures and have been completely patched and updated. Working online without taking these necessary security precautions is simply asking for trouble.

Internet Service Providers are under huge pressure to quarantine the IP address of any computer which has been turned into a spam zombie. This is done on the basis that the ISP risks their entire IP range being blacklisted or banned by some spam filtering services or companies.

The very least you owe yourself is to run a full virus and spyware scan on your computer today. You might be unpleasantly surprised at what you'll find lurking there.
About the Author This article provided courtesy of Spam-site.com which reviews spam blocker software
and other anti spam utilties.

Total Views: 260Word Count: 446See All articles From Author

Add Comment

Computers Articles

1. Choose The Right Version Of Windows 10 Iot Enterprise Or Windows 10 Pro
Author: michellumb44

2. Choose The Right Edition Of Windows 10 Or Windows 10 Enterprise
Author: michellumb44

3. Tools For Designing And Developing For Modern Teams
Author: michellumb44

4. How To Pick The Best Sql Server Edition And Core Licensing For Your Workloads
Author: michellumb44

5. Balance Remote Access And Database Power: Rds User Cals And Sql Server Cores
Author: michellumb44

6. A Practical Guide For It Teams On How To Choose The Right Rds Cals
Author: michellumb44

7. The Practical Guide To Windows Server 2022 Remote Desktop Licensing
Author: michellumb44

8. Choose The Right Licensing Path: Rds Cals And Windows Server Datacenter
Author: michellumb44

9. Pick The Right Number Of Windows Server 2019 Datacenter Cores For Your Workloads
Author: michellumb44

10. Top Food Delivery Apps Data Scraping Api In Germany
Author: FoodDataScrape

11. Employee Attendance Management
Author: James

12. Budget Website Design
Author: James

13. Nfc Guard Tour System Singapore
Author: James

14. Guard Patrol Tour System
Author: James

15. Call A Specialist In Network Support To Keep Your Business Data Safe
Author: Aneesa Stein

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: