Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is BotNet?

What is BotNet?

A botnet is a network of computers that are infected with a virus that hackers can control from a remote location for the purpose of attacks and similar activities.

So, if a virus like this is "inserted" into your computer, you will not know it, but your computer becomes part of hacker attacks from that moment on.

The latest such botnet, called TDL-4, is the most dangerous of all and almost indestructible!

TDL-4 is a type of Trojan that can infect a computer at the level of MBR (Master Boot Record), which makes it more resistant than most malware.

In translation, if this Trojan gets to your computer, you will not even notice it because AntiVirus will not detect it.

More such infected computers are botnets, and TDL-4 today has about four and a half million computers, whose owners have no idea that their computers are under someone else's control.

Namely, unlike ancient, ordinary, viruses that deleted data from your disk, TDL-4 can do much more sophisticated actions on your computer: for example: install other forms of viruses, and botnet owners can then give such computers to some a form of sublease to other criminals, who can use them to install advertisements or to hack a DDoS attack on a server.

Basically, your computer is a "puppet" that BotNet owners use when they need it for an attack.

TDL-4 is so sophisticated that it will even remove other malicious programs that are a threat to it from an infected computer, especially if there is a danger that an antivirus program will detect them.

Computers infected with the TDL-4 Trojan communicate with control centers (computers that give them orders, and which are in the hands of criminals) encrypted communication, but through a public P2P (peer-to-peer) network, which makes it almost impossible to completely destroy this botnet !!

The average user does not have much left but to watch what he does on the Internet and uses several antiviruses and antispyware programs he regularly scans his computer and hopes for the best.

In the video below, experts from Microsoft and other organizations explain how the botnet works and how Microsoft and Pfizer brought down the "Rustock" botnet, a notorious source of spam, fraud, and cybercrime.

Comments

Popular this month

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

How to hack WiFi using Android device

" How to hack wifi " - is one of the common questions I get, so I decided to present here some Android applications that can help with that. Let me immediately mention: in this text, you will not learn how to hack a WiFi password, but how to hack other users on that network. If you still want to hack your WiFi password, look for instructions HERE .

"Revive" ancestral photos with this free app

If a picture is worth a thousand words, how much is a video worth? So if the video lasts 10 seconds then it is worth 300,000 words considering that the video has 30 FPS. Now imagine having a video of your ancestor? You'd love it, wouldn't you? Well, if you have a picture of that person, you can make a video from just that one picture!

AI assistants - comparison for 2018

Personal assistants with artificial intelligence are improving more and faster as time goes on. We now have four leading AI assistants coming to us from four different companies. Of course, every company wants to have the best assistant, so tests are done to get ranking results.