answersLogoWhite

0


Best Answer

Botnets are networks of infected computers that can be controlled by a master computer. Such compromised computers are infected due a malicious code. The malicious code or malware is sent to computers through various means like email attachments, spam emails, video downloads, music downloads etc. Computers that are vulnerable are the first ones to be targeted.

User Avatar

Wiki User

16y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

a large number of compromised computers that are used to create and send spam or viruses.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is a botnets?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is the purpose of rootkit?

A rootkit is a type of malicious software (malware) designed to gain unauthorized access to a computer system or network and maintain privileged, undetected access to that system. The primary purpose of a rootkit is to enable attackers to control the compromised system while avoiding detection by security mechanisms and antivirus software. Rootkits typically operate at a low level of the operating system, often directly interacting with the kernel or other core components, which gives them extensive control over the system's behavior. Here are some of the main purposes and functionalities of rootkits: 1. Stealth: Rootkits are designed to hide their presence and activities on the compromised system. They may employ techniques such as concealing files, processes, registry entries, and network connections from system administrators and security tools. 2. Privilege Escalation: Rootkits often exploit vulnerabilities in the operating system or software to gain escalated privileges, allowing them to perform actions that would otherwise be restricted to system administrators or root users. 3. Backdoor Access: Rootkits can create backdoors or remote access points on the compromised system, enabling attackers to remotely control the system, steal sensitive information, install additional malware, or use the system for malicious purposes. 4. Persistence: Rootkits aim to maintain long-term access to the compromised system by installing themselves persistently, even after system reboots or security measures are taken. They may modify system boot processes, system files, or registry settings to ensure their continued presence and functionality. 5. Data Theft and Surveillance: Some rootkits are designed to monitor user activities, capture sensitive information such as login credentials, banking details, or personal data, and send this information to remote servers controlled by attackers. 6. Distributed Denial of Service (DDoS) Attacks: Rootkits can be used as part of botnets—networks of compromised computers—to launch DDoS attacks against targeted websites, servers, or networks, causing disruption or downtime. Overall, the purpose of a rootkit is to facilitate unauthorized access, control, and manipulation of computer systems for malicious intent. Detecting and removing rootkits can be challenging due to their sophisticated evasion techniques and deep integration into the compromised system. Regular security measures such as antivirus software, intrusion detection systems, and system hardening practices are essential for protecting against rootkit attacks.


Related questions

What is a good software to get rid of botnets?

Some sources say there is not a way to get rid of botnets. Other sources claim that using software by Microsoft or using a specialized removal tool such as Antobot or RUBotted will get rid of botnets.


How big are botnets?

very big gigity


Is a mailbomb a form of dos?

It can be explanied as a DDOS. it is most commonly used with botnets


Why are botnets so dangerous?

Because they are capable of conducting a very hard to prevent DDoS attack.


What has the author George V Jacobson written?

George V. Jacobson has written: 'Cybersecurity, botnets, and cyberterrorism'


How is a denial of service attack mounted and carried out?

It is a 3 staged approach:Stage 1 - Infect computers with programs such as Trojans that will allow remote access to take over control or initiate a program to perform a specific task(s). This will convert the computer to become a botnet.Stage 2 - Collect botnets - so that the bot master will be able to make all the botnets to perform a specific task simultaneously.Stage 3 - Perform DDoS (Distributed Denial of Service) attack! The bot master will activate his/her botnets to perform the denial of service (DOS) attack.


How far behind the hackers do you think the computer security industry is in regards to technological experience and equipment?

Very far, there is no remedy against botnets and DoS attacks.


What is the punishment for owning a botnet that is used for maliciuos use?

Exploiting computers with botnets is a federal crime because you are exploiting computers across state borders, which means the FBI gets involved. I don't know for sure, but it's a federal offense. Of course, the above answer applies to U.S. borders; there are no specific universal laws that apply to other countries.


What is cybeterrorism?

Cyberterrorism is where terrorists take control of one country's entire server network and crash it using a variety of methods, including, but not limited to: botnets, Trojan horse viruses. Once a cyberterrorist has control of a system they can take control of anything controlled by the internet, including the national power grid. They can also access anything that is connected to that network of computers, including home computers, but especially government computers.


What are some seven letter words with 1st letter B and 2nd letter O and 3rd letter T and 4th letter N?

According to SOWPODS (the combination of Scrabble dictionaries used around the world) there are 1 words with the pattern BOTN---. That is, seven letter words with 1st letter B and 2nd letter O and 3rd letter T and 4th letter N. In alphabetical order, they are: botnets


What are some seven letter words with 2nd letter O and 3rd letter T and 4th letter N and 6th letter T?

According to SOWPODS (the combination of Scrabble dictionaries used around the world) there are 1 words with the pattern -OTN-T-. That is, seven letter words with 2nd letter O and 3rd letter T and 4th letter N and 6th letter T. In alphabetical order, they are: botnets


What are some seven letter words with 1st letter B and 3rd letter T and 6th letter T and 7th letter S?

According to SOWPODS (the combination of Scrabble dictionaries used around the world) there are 2 words with the pattern B-T--TS. That is, seven letter words with 1st letter B and 3rd letter T and 6th letter T and 7th letter S. In alphabetical order, they are: batlets botnets