Thursday, May 9, 2019

Homework Essay Example | Topics and Well Written Essays - 1000 words

Homework - Essay ExampleThe second video explains the bot endeavours the outgrowth potential attack is Distributed Denial of Services (DDOS) can be activated by sending a huge amount of traffic b from many bots herders on the victims computer so that the customers cannot access the online server. The video explains the second attack named Command Line Control through an Rlogin server in easy to understand method. Further, the video talks about the third bot attack known as catching on Zombies. The video makes you understand regarding spying the victims computer through a key-logger, mailboat sniff, capturing screenshots etc. The third part of the video emphasis on defenses your system from the potential threat of botnet by care bots out, mute bots and detecting the bots activities. The video explains to install firebox, upgrading patch promptly, using antivirus with auto-update, using firebox proxies and GAV, and training of the professionals and users for keeping bots out of yo ur computer system. Organizations can mute and detect activities of bots as well by configuring the firebox appropriately as explained in the video. The word titled Microsoft disrupts Nitol botnet spreading on counterfeit Windows PCs written by Lee Mathews and promulgated on 13th September, 2012. The article explains that the digital crime unit of the Microsoft identified enormous botnet and they have taken control of the domains as per instructions of the court order. The report from the Microsofts digital crime unit notifies a malicious attack of Nitol, the botnet. It classifies that the domain Nitol, 3322.org along with over 70,000 subdomains have been found to be affected by 500 different malware. Following the court orders, Peng Yong, a Chinese businessman surrendered, giving not wholly the DNS control of Nitol but also the effecting domains to Microsoft, allowing them to filter the incoming and outgoing traffic for the security of users from the suspected attack by Nitol, a nd other malware from 3322.org and other sub-domains. At this time, the action taken by Microsoft was not as sprightly as against Waledac, Kalihos or Rustock. Because the investigation teams vigilant the Microsoft while investigating the problems of illegal Windows Installation in China, that to a greater extent than 20% of the systems have pre-installed unnecessary software product including, but not limited to HP or Toshiba-style software bloat. It was the thing as Microsoft suspected from Nitol botnet, developed catastrophic malware that could not only able producing spam and redirect DNS requests but also proliferate through flash drives. http//www.geek.com/articles/news/microsoft-disrupts-nitol-botnet-spreading-on-counterfeit-windows-pcs-20120913/ The student has summarized the article titled Botnet get the hang Hide Command and Control Server inside the Tor Network, by Lucian Constantin. The student has spectacularly discussed the article regarding research of Germans as th ey found a botnet that is hidden in the Tor secrecy network. The botnet can operate on an Internet Relay chat server and it has advantages as well as disadvantages. According to them, it is hard to learn its specific location so that is very difficult to locate and shut down. A signal is displace to another computer from the users computer, when one uses Tor for internet access.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.