Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is BotNet?

What is BotNet?

A botnet is a network of computers that are infected with a virus that hackers can control from a remote location for the purpose of attacks and similar activities.

So, if a virus like this is "inserted" into your computer, you will not know it, but your computer becomes part of hacker attacks from that moment on.

The latest such botnet, called TDL-4, is the most dangerous of all and almost indestructible!

TDL-4 is a type of Trojan that can infect a computer at the level of MBR (Master Boot Record), which makes it more resistant than most malware.

In translation, if this Trojan gets to your computer, you will not even notice it because AntiVirus will not detect it.

More such infected computers are botnets, and TDL-4 today has about four and a half million computers, whose owners have no idea that their computers are under someone else's control.

Namely, unlike ancient, ordinary, viruses that deleted data from your disk, TDL-4 can do much more sophisticated actions on your computer: for example: install other forms of viruses, and botnet owners can then give such computers to some a form of sublease to other criminals, who can use them to install advertisements or to hack a DDoS attack on a server.

Basically, your computer is a "puppet" that BotNet owners use when they need it for an attack.

TDL-4 is so sophisticated that it will even remove other malicious programs that are a threat to it from an infected computer, especially if there is a danger that an antivirus program will detect them.

Computers infected with the TDL-4 Trojan communicate with control centers (computers that give them orders, and which are in the hands of criminals) encrypted communication, but through a public P2P (peer-to-peer) network, which makes it almost impossible to completely destroy this botnet !!

The average user does not have much left but to watch what he does on the Internet and uses several antiviruses and antispyware programs he regularly scans his computer and hopes for the best.

In the video below, experts from Microsoft and other organizations explain how the botnet works and how Microsoft and Pfizer brought down the "Rustock" botnet, a notorious source of spam, fraud, and cybercrime.

Comments

Popular this month

Insert a handwritten font into your Android phone!

There are various fonts, but you can create your own unique font printed on your hand. You can use such a font anywhere, even on an Android phone.

Facebook i Open Graph

What they were most afraid of had just arrived. Namely, Facebook last year published Open Graph - a protocol that allows the creation of applications that share user activities on Facebook. As early as tomorrow, Facebook will enable the use of Open Graph by all developers, with the help of which they will create applications so that users can share what they are doing on Facebook.

How to watch 3D movies on any monitor?

If you want to watch 3D movies on your regular monitor, you will need 3 things: a player that supports 3D movies, 3D glasses, and 3D movies. You only need to invest some money in 3D glasses if you don't already have some. The good thing is that you can use any 3D glasses because this player supports all types of 3D movies.

New smileys - New possibilities

As the news about the new opportunity on Facebook appeared a few days ago, so did the various creations of the users. So we have a list of Troll smileys for FB chat, and from now on I can read all the inscriptions, names ... etc.

CCleaner 3.09.1493

CCleaner is a free tool for cleaning, privacy, and system optimization . In addition, CCleaner removes unused files from the system, freeing up valuable hard disk space and allowing Windows to run faster.