Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is BotNet?

What is BotNet?

A botnet is a network of computers that are infected with a virus that hackers can control from a remote location for the purpose of attacks and similar activities.

So, if a virus like this is "inserted" into your computer, you will not know it, but your computer becomes part of hacker attacks from that moment on.

The latest such botnet, called TDL-4, is the most dangerous of all and almost indestructible!

TDL-4 is a type of Trojan that can infect a computer at the level of MBR (Master Boot Record), which makes it more resistant than most malware.

In translation, if this Trojan gets to your computer, you will not even notice it because AntiVirus will not detect it.

More such infected computers are botnets, and TDL-4 today has about four and a half million computers, whose owners have no idea that their computers are under someone else's control.

Namely, unlike ancient, ordinary, viruses that deleted data from your disk, TDL-4 can do much more sophisticated actions on your computer: for example: install other forms of viruses, and botnet owners can then give such computers to some a form of sublease to other criminals, who can use them to install advertisements or to hack a DDoS attack on a server.

Basically, your computer is a "puppet" that BotNet owners use when they need it for an attack.

TDL-4 is so sophisticated that it will even remove other malicious programs that are a threat to it from an infected computer, especially if there is a danger that an antivirus program will detect them.

Computers infected with the TDL-4 Trojan communicate with control centers (computers that give them orders, and which are in the hands of criminals) encrypted communication, but through a public P2P (peer-to-peer) network, which makes it almost impossible to completely destroy this botnet !!

The average user does not have much left but to watch what he does on the Internet and uses several antiviruses and antispyware programs he regularly scans his computer and hopes for the best.

In the video below, experts from Microsoft and other organizations explain how the botnet works and how Microsoft and Pfizer brought down the "Rustock" botnet, a notorious source of spam, fraud, and cybercrime.

Comments

Popular this month

Check if your computer is male or female

One small and interesting trick you can use to check whether your computer is male or female. All you have to do is an open notepad and copy the following script: CreateObject("SAPI.SpVoice").Speak"Am I male or female" (I recommend copying it from THIS link)

How to hack WiFi using Android device

" How to hack wifi " - is one of the common questions I get, so I decided to present here some Android applications that can help with that. Let me immediately mention: in this text, you will not learn how to hack a WiFi password, but how to hack other users on that network. If you still want to hack your WiFi password, look for instructions HERE .

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

New Google mobile internet saving application - Datally

I wrote an article on how to save internet traffic on an Android device and I suggested the Onavo Extend and Opera Max apps because they were the most popular back then. Meanwhile, Opera Max has been discontinued and Onavo has been completely redesigned and is now a VPN application with the option to save internet traffic. Their compression technology is probably now used by Facebook in its application because they bought Onavo - link . Google has decided to seize the opportunity and "push" with a new application called " Datally ".