What is a zombie computer?
Zombie Computer or "Drone" is a computer that has been secretly endangered by hacker tools that allow a third party to control the computer and its resources remotely. When the zombie computer connects to the Internet, a remote hacker can secretly make contact with the computer to have data from it or use it for any number of purposes. Communication between a hacker and a computer passes through the rear channels of a targeted system and keeps these processes hidden from the owner. Rootkit is not considered malware because there are legitimate use for rootkits in the network. However, Rootkits can also be used to target random computers on the Internet. Once the computer lifts Rootkit, it becomes a "unwilling accomplice" of a hacker, blindly watching the instructions, leading to the name "Zombie Computer".
Hacker has full access to data and resubs on a zombie computer. The infiltrator can copy, infect, damage or even erase the entire hard drive. It can also install tools that report everything entered on the zombie computer, including userNames, passwords and financial data such as credit card numbers and bank accounts. This private information can be used to commit fraud, identity theft, or can be sold or traded to others.
In addition to personal violations of privacy and the inherent dangers it brings, the perpetrator can also use the zombie computer to engage in illegal online activities. A hacker that threatens many computers can combine them into a zombie net called "Botnet". Hacker can control zombies by broadcasting individual commands, which negates the need to communicate with each goal individually. Botnet becomes the kind of army that has hacker offers. Botnets are used to send spam, attack web page, maintain fraud with phishing, commit clicks and grow larger botnets by infirming new computers that are susceptible to attack.
Unfortunately, the risk that your system will become a victim of a computer attack zombie,It can be bigger than you imagine. In the highly promoted reports of 2005, one dismantled botnet dominated by three young men in the Netherlands of 1.5 million zombies of computers. In the United States, teenagers are called "Kiddies scripts" by competitively building botnets to gain mutual recognition, and in 2000 the Canadian 15 -year -old boy of zombie drones used several large websites, causing $ 1.7 million in US dollars.
you want to minimize the growing threat of becoming assimilated in the drone:
- Keep your anti-spyware and antivirus software.
- Use Firewall.
- Delete spam without opening.
- Avoid installing programs from untrustworthy sources.
- Don't let the untrustworthy websites install software.
- You hold the operating system and a web browser with the latest hotfixes.
- To scan rootkits, use a good Anti-Rootkit program.
- back up withYstem every week after a clean scan.
In many cases, there is an excellent freeware to help you with these tasks. By taking these measures, you will significantly reduce the chances of targeting botnet or zombie by computer scanning new drones.