Trending
  • How to change DNS address on Mac, Windows, iOS, Android
    How to change DNS address on Mac, Windows, iOS, Android
  • How To Take a Selfie of Whoever Is Trying to Unlock Your Android
    How To Take a Selfie of Whoever Is Trying to Unlock Your Android
  • Best Free Download Manager For Windows in 2016
    Best Free Download Manager For Windows in 2016
  • How to Extract PDF Pages From a PDF File
    How to Extract PDF Pages From a PDF File
  • Security Settings You Should Have on Your iOS 10 Device

    Security Settings You Should Have on Your iOS 10 Device

    The security setting you either need to turn off or on are only a few taps away. You won't have to go through a sea of settings jut to get to it. Let's get to it and secure your iOS 10 device!

    Read more...

  • How You Can Keep Your WiFi Safe

    How You Can Keep Your WiFi Safe

    Even if having to deal with WiFi security is a real pain for some, it is something that needs to attention. Someone could steal your WiFi and use it for who knows what and cross your fingers that it is not for anything illegal.

    Read more...

  • What You Should Keep in Mind Before Buying a Used Smartphone

    What You Should Keep in Mind Before Buying a Used Smartphone

    As long as the phone works fine and has what you need, who care if it's not this years model. So, you've decided that the best thing you can do is buy a used phone. Before you go phone shopping, there are some things you need to keep in mind before you buy.

    Read more...

  • The Most Effective Ways to Get More Followers on Instagram

    The Most Effective Ways to Get More Followers on Instagram

    Before you give up and think about closing your Instagram account, there are some tips and tricks on how to increase your Instagram followers you should know about. By following these tips,...

    Read more...

  • How to Make a GIF From a Video (Windows, Mac, iOS, Android)

    How to Make a GIF From a Video (Windows, Mac, iOS, Android)

    ver the certain period of time, GIF images have gained so much popularity, and you can see them on the Social Networking websites. In the comments section of a website or your Twitter timeline, GIF is actually an animated image format which is created from different images or videos.

    Read more...

  • How to Take Great Pictures with Your Android Device

    How to Take Great Pictures with Your Android Device

    When was the last time you used a digital camera to take a picture? It's probably been a while, right? Most of us used our smartphone to take a million pictures of our pets or of that beautiful sunset you were lucky enough to see.

    Read more...

  • The Best iPhone 7 Tips and Tricks You're Probably Not Using

    The Best iPhone 7 Tips and Tricks You're Probably Not Using

    iOS offers an endless amount of great features you can enjoy, but you may not be taking advantage of them because you might not even know they exist or are too afraid you'll mess something up by tampering with it.

    Read more...

What Botnets Are and What They Do to Your Computer

What Botnets Are and What They Do to Your Computer

7.0/7 rating 1 vote

No one has to remind you that the Internet can be a scary place. It is full of phishing sites, viruses, malware, and the list just keeps on going and on. Unfortunately, this is something that is not going to go away and may even get worse. Despite the dangers on the Internet, you can protect yourself. It is all about informing yourself about the dangers you fear most and following some expert advice.

Out of all the dangers out there, you may have heard about Botnets. There are dangerous, and if you want to know what to do so they won't take control of your computer, read on. Botnets haven't been around forever; they are a 21st Century problem. No one knows how long they will continue to be a problem, but there are things you can do to stay safe.

What Are Botnets?

what botnets are

Even though Botnet is one word, it is made up for two. The first part of the word Bot means robot. This is a name that the experts give computers that have been infected with a vicious software. The second part of the word, net comes from the word network. The people that spread malware are not able to get into your computer manually. What they do instead is they use Botnets to control a lot of computers that are infected automatically. In a nutshell, a Botnet is a network of computers that are infected; this network uses malware to spread.

How to Tell If Your Computer Has Been Infected with a Botnet

You will know that your computer has been infected with a Botnet because it will start doing things you would never do. For example, an infected computer will start sending Spam or overload a website with inquiries. If you have unlimited bandwidth, there is a good chance that you won't even notice this behavior, but if you don't, then you might be able to detect it.

what botnets are

So, what, if my computer is infected, I have no way of knowing? You can find out if your computer is part of a Botnet. There are tools you can use that will help you find out such as ESET SysInspector. I use Este software's, and I can tell you they are very effective. You can also detect if your computer is infected with a Botnet by finding out what programs are currently in use on your computer and the ones that are installed. Unfortunately, this is a sure way to know since it can be difficult to detect its presence.

Botnets are used to send Spam as I mentioned before, but they can also be used for identity theft purposes. Have you ever heard of someone extorting someone with pictures they got by spying through their webcam? You can bet that Botnets played a role in that, but they are also used in more sophisticated things such as stealing bank credentials.

How Botnets Work

what botnets are

The good news is that there is a way to bring down Botnets, How? If the Botnet is using a command and control server (C&C or C2), then you only have to put down that server, and the Botnet is gone. The bad news is that not all Botnets work this way and there are some that use a P2P (peer-to-peer) networks to communicate, so in this case, there is no server to get rid of. The final way Botnets work is through various servers. Since no one server helps them work, you can't bring them all down simultaneously.

You should be careful with Botnets because they can also do things such as steal information from your computer and that includes all your passwords. Botnets can affect anyone since there are all kinds of malware. So, just because you are a business, doesn't mean that you are less likely to become a victim. A Botnet can have as little as a few hundred computers under control and as many as hundreds of thousands.

There are a few things you can watch out for to know if your computer is a zombie, it may crash, slow down or show weird messages. If you have experienced some of these signs, don't panic, the cause may be something else, but it wouldn't hurt to consider the Botnet possibility.

How to Protect Yourself from Botnets

what botnets are

As I mentioned before, having a software like Eset can prevent a Botnet from taking over your computer, but there are other things you can do. Other security software's you can try is Norton 360 or Norton Internet Security. You can also turn the security settings on your browser up a notch and limit the user right when using the Internet. If you don't know who the Email is from, never click on any click or attachments the Email has. Since updates usually bring bug and security fixes, having your computers, OS up to date also helps.

What To Do If Your Computer's Been Infected with Botnet

No one's perfect, so you may do something that has given a Botnet the access it needs. So, now what? After making sure that your computer is infected, the first thing you need to do is to isolate the Botnet. By doing this, you are disconnecting them the network and that way they will not be able to cause any damage to anyone else's computer. It is not uncommon that certain software's are unable to uninstall the Botnet, but if that were your case them, you would need to rebuild your computer.

What I mean by rebuilding is reinstalling everything from a clean backup. That's why it is important to regularly backup everything on your computer. You never know when you might be a victim of some attack and that includes Botnets. Disabling the auto-run is another security tip to follow, this is going to prevent your computer from launching commands from unknown or foreign sources.

The answer to your problems could be summed up in two words; Network Compartmentalization. In the majority of the computing environments, computers don't need to communicate with one another. By shutting this down, you have a high chance of stopping Botnets in their tracks. IT managers can limit exposure by creating a virtual local are network (VLANs) or access control lists (ACLs).

Conclusion

There are so many threats you need to protect yourself from that if you stop think of all of them, you only end up with a headache. That's why learning about them one by one is never a bad idea and that could give you the information you need to keep your computer safe. How do you keep your computer from becoming a zombie? Share your thoughts in the comments.


Latest

  • Security Settings You Should Have on Your iOS 10 Device
    Security Settings You Should Have on Your iOS 10 Device
  • How You Can Keep Your WiFi Safe
    How You Can Keep Your WiFi Safe
  • How to Hide Pictures, App Icons and Files on Android
    How to Hide Pictures, App Icons and Files on Android
  • What You Should Keep in Mind Before Buying a Used Smartphone
    What You Should Keep in Mind Before Buying a Used Smartphone
  • 10 Best Backpacks for College Students
    10 Best Backpacks for College Students
  • Top 5+ Best Point and Shoot Digital Camera
    Top 5+ Best Point and Shoot Digital Camera

Author

Judy Sanhz
Judy Sanhz

I can never get enough of tech in general, whether it's Android or web apps, but helping others solve their tech problems also brings great satisfaction. I carry a device wherever I go and I'm always connected. Life without Internet just sounds too scary to me. :-).

comment

Leave a comment

You are commenting as guest.

Recent Comment

doesn't work -- using 10.12.1

bc tried several times including cd'ing to /

bernard 03. December, 2016 |

Great article

I run Directory Report as an administrator
That way it can find hidden file
http://www.file-utilities.com

It can...

Allan Man 23. November, 2016 |

This article is best google chorme are install.This extensions are help different email autuomatically introduce to user. This is must...

Tilly Wilson 10. November, 2016 |

About Website

OMG!HOWTO is a technology website where we cover the latest from Apple, Facebook, Microsoft and Tips & Tricks. We seek to present fresh news, useful tips, tutorials, applications that the modern technology user will appreciate. OMGHOWTO.COM is powered by Joomla.

0
Shares
0
Shares