What is a Botnet

Bots can also be used to act like malware and carry out malicious tasks. Then can be used to assemble a network of computers and then compromise them. These are called Computer Botnets and can be controlled remotely by hackers or Bot Herders. Each computer in the Botnet is called a Node and they could be any computer, anywhere in the world – even yours, if an attacker has managed to surreptitiously install malware on your computer, by exploiting vulnerabilities in your operating system or installed software, or by tricking you into installing it. Such Nodes are then used to spread the malware further, send spam mail or even attack other computers. Such Botnets are controlled en masse via protocols such as IRC. Some of you may want to learn more about Botnets.

Botnets should be of concern to governments and businesses because of their ability to harness large numbers of individual computers to direct an attack against information technology infrastructure. Microsoft is taking an aggressive approach to fighting botnets by collaborating with governments and others to take them down. Microsoft is also providing businesses, governments, and consumers with security tools and guidance. Working towards this goal, Microsoft has released a document titled Botnets: Guidance for Governments, which can be downloaded at Microsoft. Infographic McAfee has created a nice easy-to-understand Infographic explaining, what are botnets. With the rapid growth in malware and bot infections all around, it becomes important for all to understand what Botnets are and what Zombies are.

This Infographic nails the botnet lifecycle and economics just right… not too technical, not too simple. Click on it to see the larger image. Fear that your computer may be a part of a Botnet? Have a look at these Botnet Removal Tools. This Global Botnet Visualizer keeps you up-to-date on Bot activity. These Botnet Trackers will help you keep track of the Bot activity globally.

Is a botnet attack illegal?

If you or anyone operators a botnet attack, it’s illegal, and mostly punishable by law. While every Botnet attack has a different purpose, a lot of data is stolen, and a lot of time and work is hampered. Imagine a hospital not able to register for incoming patients because the system has been taken down by a botnet attack.

Can a VPN protect you from DDoS?

No, it cannot, but it can hide your primary PC helping you safeguard the data on the PC. However, the VPN has to include security measures to ensure your data is not compromised.