Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is BotNet?

What is BotNet?

A botnet is a network of computers that are infected with a virus that hackers can control from a remote location for the purpose of attacks and similar activities.

So, if a virus like this is "inserted" into your computer, you will not know it, but your computer becomes part of hacker attacks from that moment on.

The latest such botnet, called TDL-4, is the most dangerous of all and almost indestructible!

TDL-4 is a type of Trojan that can infect a computer at the level of MBR (Master Boot Record), which makes it more resistant than most malware.

In translation, if this Trojan gets to your computer, you will not even notice it because AntiVirus will not detect it.

More such infected computers are botnets, and TDL-4 today has about four and a half million computers, whose owners have no idea that their computers are under someone else's control.

Namely, unlike ancient, ordinary, viruses that deleted data from your disk, TDL-4 can do much more sophisticated actions on your computer: for example: install other forms of viruses, and botnet owners can then give such computers to some a form of sublease to other criminals, who can use them to install advertisements or to hack a DDoS attack on a server.

Basically, your computer is a "puppet" that BotNet owners use when they need it for an attack.

TDL-4 is so sophisticated that it will even remove other malicious programs that are a threat to it from an infected computer, especially if there is a danger that an antivirus program will detect them.

Computers infected with the TDL-4 Trojan communicate with control centers (computers that give them orders, and which are in the hands of criminals) encrypted communication, but through a public P2P (peer-to-peer) network, which makes it almost impossible to completely destroy this botnet !!

The average user does not have much left but to watch what he does on the Internet and uses several antiviruses and antispyware programs he regularly scans his computer and hopes for the best.

In the video below, experts from Microsoft and other organizations explain how the botnet works and how Microsoft and Pfizer brought down the "Rustock" botnet, a notorious source of spam, fraud, and cybercrime.

Comments

Popular this month

How to ROOT a phone in 30 seconds

Recently, an application appeared that ROOTs some Android devices in a few seconds! You don't need Odin or anything else, just that app, and in a few seconds, your phone is rooted. An app called  ExynosAbuse can be found on the XDA forum, downloaded, and installed for free on your phone. After starting, all you have to do is press " Root device " and it will do its job in a few seconds. You don't even have to restart your phone, you will only be notified that the ROOT has passed successfully and you will see the SuperSu icon.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

Create your own data encryption program

Create a data encryption program in Notepad in 3 minutes! How? All you need is Notepad++ (maybe a regular Notepad). If you are ready to get started!

Hacker Typer - Knock like a hacker!

Hacker Typer is a site where you can type in the console like a real hacker! Just open the site  hackertyper.net , select the background color, text color, file type, and typing speed, and press " Hack ".

YouTube Vanced is down! These are alternatives

The popular replacement for the YouTube app - Vanced - will no longer be available for download. Namely, the authors (due to "legal reasons") had to stop the development of their application and announce that the download links will be unavailable soon.