answersLogoWhite

0

Zombie computers are any system attached to a network that silently (unannounced to the user) perform tasks on the network to reach a predetermined goal. A computer system can become a zombie computer by being infected via a network transferable source such as via email, or via a local source delivered from a flash drive or other external source. It is most common for each zombie computer to be performing a small portion of the larger goal, and be part of a larger group of zombie computers that are all working together for the same purpose. This way, if one zombie computer is brought offline, the goal can still be reached. It also ensures that each infected system is not diverting a great deal of resources to the zombie process, which helps to ensure the zombie node is not detected and repaired.

Network consequences are dependent on what the task is that the zombie collective is working on, and how many zombie nodes are contributing vs the scale of the network they sit on. For example, if 10 systems on a network of 10,000 systems are infected, the likelihood of the network being bogged down by the zombie traffic is minimal. However, it also depends on whether the goal the zombie collective is trying to achieve is targeting the local network they are on, or something outside the network on the internet, as 10 computers working to overload a local server, may achieve some results, while 10 computers trying to overload Google for instance would have little effect.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

Does having lots of computers connected to a wireless network affect the signal?

yes it does affect the signal.


Can three computers on the same network cause your PC to be slow?

NO, but it does affect your Internet connection if you have one.


How do you detect zombies in a network?

If you monitor traffic on computers on a network and find traffic occurring when no user is logged on, you probably have a zombie, especially when you are getting outbound traffic when no authorized used is actually using the system.


What is administration network security and why is it so important?

I think you mean network administration security. It's important because a compromised network allows all sorts of problems: viruses, vulnerability of sensitive data, and your computers become "zombie PCs" are all hazards of an insecure network.


What could damage the network or the computers attached to the network with malware?

Various virus on internet could affect. Malware's could be used to harm the computer.


What is a large group of software programs that run autonomously on zombie computers is called?

zombie


Which termonology referes to the arrangement of computers in a network?

The arrangement of computers in a network is known as Network topology.


What is a group of computers is called?

A group of computers might form a network, but this is not necessarily the case. There is no commonly used collective noun for computers.


Specialized computers that manage network resources and allow computers access to the network are called?

Servers


What is created when one computer is connected to other computers?

Two or more computers connected together create a computer network. Computers within a network can interchange data.


Do all computers have network and internet?

Not all - although most 'modern' computers do. Modern computers tend to be supplied with either an 'on-board' network adaptor or network card plugged into one of the slots on the motherboard. Older computers came without a network card, and needed additional hardware to connect to a network.


Areas where computers affect management?

List and explain the three areas of how computers affect management