Hello :) MBARK TiéSTO
Botnets quietly transformed millions of computers in PC Zombies, ready to send spam or participate in cyber attacks without users noticing. Therefore, how to tell if a computer is a PC Zombie?A Zombie PC is infected with malicious code, waiting patiently to be remotely activated by its author, the "bot master" computer. Meanwhile, malware hibernate the machine, and give rise to suspicion in the eyes of the user. A Zombie PC itself is fairly insignificant, but it is généralementpartie an army of infected computers (botnet). When enabled, this army can participate in sending bulk mails (spam), host of fraudulent sites, generate a DDoS attack on a targeted website, etc..
It is quite possible that the computer that sits on your desktop part in these misdeeds!
?How to prevent my computer from becoming a zombie
The best prevention is primarily a vigilant user, especially when on the Internet. Attendance suspicious websites or downloading files is uncertain enough to install malware in less than five minutes. Technically, other precautions are necessary:
Maintain its operating system update (eg Windows)
Use a firewall (firewall), antivirus and anti-spyware/malware solution, and maintain
Eventually adopt a URL filtering solution (check popular web addresses)
Prevention is essential. But it is already too late, how to know if ?my PC belongs to a botnet
?How do I know if my computer is a PC Zombie
When a computer is infected with spyware or malware, some suspicious activity can be detected:
The fan starts at full speed when the computer is idle
The computer takes a long time to stop
Your friends receive emails with your email address that you have not sent
Internet access is very slow
Advertising pop-ups open inadvertently, even when your web browser is closed
?How to find specific infection
Infection takes place by creating a back door (backdoor) on the system. Find backdoor that door, and you'll malware. Here's how:
Download TCPView, a free software that allows you to monitor and analyze specifically the TCP / IP system activity
Unzip the file and run it (no installation required)
The window that appears shows all network traffic between the PC and the outside world
Search Telnet and Netcat references (see screenshot below)
If these references are not your doing, get rid of in one click
TCPView
For information, Telnet is a network that can allow the creation of a session on a remote machine, and Netcat is a utility that can open network connections, transfer files, open a backdoor protocol to establish Basic a proxy server, etc..
But be careful, make sure that the process removed or disabled are not essential to the functioning of your computer
!!.
Thank you do not forget to post the topic and written comments Featured :)
Was with you MBARK TiéSTO
The best prevention is primarily a vigilant user, especially when on the Internet. Attendance suspicious websites or downloading files is uncertain enough to install malware in less than five minutes. Technically, other precautions are necessary:
Maintain its operating system update (eg Windows)
Use a firewall (firewall), antivirus and anti-spyware/malware solution, and maintain
Eventually adopt a URL filtering solution (check popular web addresses)
Prevention is essential. But it is already too late, how to know if ?my PC belongs to a botnet
A. Thank you, brother
ردحذفthank you
ردحذفموضوع جميل رغم أنه بالإنجليزي لاكن لا مشكلة يبقى المضمون هو المهم
ردحذفمشكور على مرورك الجميل يا أخي وأتمنى أن تكون قد إستفدت
ردحذف