Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is BotNet?

What is BotNet?

A botnet is a network of computers that are infected with a virus that hackers can control from a remote location for the purpose of attacks and similar activities.

So, if a virus like this is "inserted" into your computer, you will not know it, but your computer becomes part of hacker attacks from that moment on.

The latest such botnet, called TDL-4, is the most dangerous of all and almost indestructible!

TDL-4 is a type of Trojan that can infect a computer at the level of MBR (Master Boot Record), which makes it more resistant than most malware.

In translation, if this Trojan gets to your computer, you will not even notice it because AntiVirus will not detect it.

More such infected computers are botnets, and TDL-4 today has about four and a half million computers, whose owners have no idea that their computers are under someone else's control.

Namely, unlike ancient, ordinary, viruses that deleted data from your disk, TDL-4 can do much more sophisticated actions on your computer: for example: install other forms of viruses, and botnet owners can then give such computers to some a form of sublease to other criminals, who can use them to install advertisements or to hack a DDoS attack on a server.

Basically, your computer is a "puppet" that BotNet owners use when they need it for an attack.

TDL-4 is so sophisticated that it will even remove other malicious programs that are a threat to it from an infected computer, especially if there is a danger that an antivirus program will detect them.

Computers infected with the TDL-4 Trojan communicate with control centers (computers that give them orders, and which are in the hands of criminals) encrypted communication, but through a public P2P (peer-to-peer) network, which makes it almost impossible to completely destroy this botnet !!

The average user does not have much left but to watch what he does on the Internet and uses several antiviruses and antispyware programs he regularly scans his computer and hopes for the best.

In the video below, experts from Microsoft and other organizations explain how the botnet works and how Microsoft and Pfizer brought down the "Rustock" botnet, a notorious source of spam, fraud, and cybercrime.

Comments

Popular this month

The Galaxy Note was ridiculed when it appeared, and now…

Did you know that the first Samsung Galaxy Note was ridiculed by users and the media? Everyone laughed at his "huge" case and said that it would fall apart immediately after it appeared. They said that it was too big and that such a phone would never be used every day.

The difference between Sleep, Hibernate and Hybrid sleep options

What is the difference between regular Sleep mode and Hybrid sleep mode? And what is Hibernate ? I will try to explain in the simplest way possible so that everyone understands nicely. 1. Sleep When you select Sleep mode , all components of the computer except RAM are shut down to store data. So, if you do something on the computer and press Sleep, the computer shuts down and everything you did (left open windows, documents, etc.) is stored in RAM.

What is GLONASS?

If you've looked at the detailed specification of an Android or GPS device, you may have seen another term next to the GPS tag and didn't know exactly what it represents. Well,  GLONASS is a global navigation system that was started by the USSR in 1976, so this project could be taken over by Russia after the collapse of the Soviet Union.

Update for IE9

Microsoft has released a new update for Internet Explorer 9 that brings patches for several different security vulnerabilities.

Pokemon Go - how to play in any country?

Pokemon Go is a game similar to Ingress that attracted a lot of attention and received a lot of positive comments even before it appeared. Ever since the appearance of the first pictures and the video, Pokemon Go has become a game that has been eagerly awaited, and now it is finally here!