TIP: How does a computer become a zombie computer in botnet ?

TIP: How does a computer become a zombie computer in botnet ?

Clicking the “You need to install a codec for player to view – click ”

Beware Fake Codecs – it could be a trojan
http://www.dslreports.com/faq/14427 

OR – Attempting to retrieve illegal software …..

Warez – Wikipedia, the free encyclopedia
The word warez is intended as a plural of “ware”, short for computer
software. Thus it is intended to be pronounced like the word wares,
/’w??rz/, …
http://en.wikipedia.org/wiki/Warez 

….at places like this….

P2P Dangers (Peer to Peer file swapping)
Summary: A peer network used primarily for music file sharing. In an
organization, can degrade network performance and consume vast amounts of
storage. Is bundled with many spyware/adware products. Category: P2P… Any
peer-to-peer file swapping program, such as Audiogalaxy, Bearshare,
Blubster, E-Mule, Gnucleus, Grokster, Imesh, KaZaa, KaZaa Lite, Limewire,
Morpheus, Shareaza, WinMX and Xolox. In an organization, can degrade network
performance and consume vast amounts of storage. May create security issues
as outsiders are granted access to internal files. Often bundled with Adware
or Spyware.
http://www.ca.com/securityadvisor/pest/pest.aspx?id=453088059 

…… will leave your computer NEVER seeing the light of day again as being
here….

World computers hijacked into botnets went from estimates in 2007 at 7 to 11
percent to a year later at 25 percent.
They are now reported as high as 40 percent of the 800,000,000 (800 million)
world computers…..
Understanding and Defending against Botnets and Stealthy Malware
http://www.ddj.com/security/218500947?cid=RSSfeed_DDJ_All
Dr. Dobb’s Journal Thu, 16 Jul 2009 09:35 AM PDT
Developing anti-botnet defense strategies Sponsored Topics: Botnet –
Security –
Federal Trade Commission – Spyware – Law

Who are responsible for catastrophic damage to one and attempt on another of my computers and who are also responsible for up to 90 percent of world spam (UCE) and is why these people are hated by everyone who engages this and software piracy.

Business Software Alliance – Software Piracy Prevention
Informing the public of the effects of software piracy, and of action
that can be taken to curb this ongoing activity.
http://www.bsa.org/usa/antipiracy/ 

Genuine Microsoft Software
http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx
One of the many benefits of owning genuine Microsoft software is gaining
access to Microsoft Support Services. Below are two ways to help you
determine whether your version of Windows is genuine.

Software Piracy Protection
http://www.microsoft.com/piracy/default.mspx
Information on piracy as well as tips on how to protect yourself against it.

Microsoft Security Center fake warnings in your task bar…
Briefly: “How to Remove SpyFalcon” (Review in full at website)
http://www.bleepingcomputer.com/forums/topic43659.html
SpyFalcon is a anti-spyware program that is known to issue fake warnings on
your computer in order to manipulate you into buying its full commercial
version. If you are infected with this program you may receive warnings in
your task bar that appear to be from Microsoft Security Center stating that
you are infected with spyware and to run its special anti-spyware tool. This
tool turns out to be the commercial version of SpyFalcon. These warnings are fake and are a goad to have you buy the commercial version of this
software…..

World computers hijacked into botnets went from estimates in 2007 at 7 to 11 percent to a year later at 25 percent. They are now (ending 2009) reported as high as 40 percent of the 800,000,000 (800 million) world computers…..

Read up a great article here….

Understanding and Defending against Botnets and Stealthy Malware
http://www.ddj.com/security/218500947?cid=RSSfeed_DDJ_All
Dr. Dobb’s Journal Thu, 16 Jul 2009 09:35 AM PDT
Developing anti-botnet defense strategies Sponsored Topics: Botnet – Security –
Federal Trade Commission – Spyware – Law

PLAY))) Malware Botnet Cartel (BCPCNet-Modcasts) 26.2M
www. bluecolla rpc. net/d ownloadsMOVED—  /Des troyBotnetC  artel.mp3
RELOCATED: http://gerald60606.spaces.live.com/default.aspx
PLAY)))
http://cid-fcc2f336d2d2fa26.skydrive.live.com/self.aspx/.Public/DestroyBotnetCartel.wma
January 18, 2007 – Size 26.2M AUDIO MP3
Malware Botnet Cartel
This Modcast contains my personal blunt observations about the actual greatest threat today – what is called in slang the “zombie networks” in the world. Plainly, zombie networks are made up of hijacked average user computers that are infested with malware and are called zombie computers individually. The other term mostly used is Botnets – meaning the same thing – but jargon here as malware botnets rather than any other valid use type ones – but here meaning with nefarious or extremely wicked or villainous use. I propose a new term to describe what possibly may be an alarming truth – a nefarious Botnet Cartel – and the dawn of a Magna Carta to destroy the evil Botnot Cartel worldwide. This is a challenge in discussion for every user, new an old, as a last ditch campaign to free every user from the “Botnet Cartel” as it is my opinion that the World Raid on them may result in wholesale arrests even against the average user that neglected security or simply refused to purposely. The current reports in January 2007 right off the presses are estimates of 7 to 11 percent of world computers are in a malware botnet either by choice or neglect and directly responsible for up to 4 percent of the United States population that are suffering Identity Theft annually and up to 60 to 70 percent of all world (UCE) Unsolicited Commercial Email – “Spam”. The challenge… listen up and join in the proposal. “Malware Botnet Cartel”.

An Uptick on the Council of Europe Treaty on Cybercrime……

Hacker-Tool Law Still Does Little
On August 10, 2007, a new section of the German Penal code went into effect. The statute, intended to implement certain provisions of the Council of Europe Treaty on Cybercrime, could be interpreted to make the creation or distribution of computer security software a criminal offense.
http://www.securityfocus.com/columnists/502

Advertisements
%d bloggers like this: