29-09-2010, 09:24 AM
I want a seminar report on the topic "Zombie Computers" in ppt and doc file.
I am Raju Parmar, a student of B. Tech. in Jaipur(Raj) India.
29-09-2010, 09:24 AM
I want a seminar report on the topic "Zombie Computers" in ppt and doc file. I am Raju Parmar, a student of B. Tech. in Jaipur(Raj) India.
27-10-2010, 03:05 PM
Introduction A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. Reference:http://en.wikipediawiki/Zombie_computer
10-02-2012, 11:59 AM
zombie computers
10-27-05ZombiePresentation - Copy.ppt (Size: 663 KB / Downloads: 53) What are Bots Bots are automated scripts that are designed to perform specific operations Good bots are used for housekeeping functions in networks such as robotic helpers in instant-messaging systems. Malicious bots, however, open up a victim's machine to remote access. What is a Zombie Computer A Zombie computer is a computer attached to the internet that has been compromised by a hacker,a computer virus or a trojan horse Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction Most owners of zombie computers are unaware that their system is being used in this way Because the owner tends to be unaware, these computers are metaphorically compared to zombies. Intrusion Prevention Systems Network Intrusion-prevention systems (NIPS) are purpose-built hardware/software platforms that are designed to analyze, detect, and report on security related events. NIPS are designed to inspect traffic and based on their configuration or security policy, they can drop malicious traffic Intrusion-prevention system (IPS) could detect and block denial of service attacks;
03-04-2012, 11:44 PM
yash want to get more idea about new topics
04-04-2012, 09:44 AM
to get information about the topic "zombie computers" full report refer the link bellow
https://seminarproject.net/Thread-zombie-computers |
|