|
||
|
|
|
|
|
|
|||
|
The DataGuard Data Protection Newsletter January/February, 2006
Bullet Points
Backing Up Outlook Express Email & Address Book Test Your Firewall Happy Birthday, PC Virus! What is a Rootkit? What is a Bot?
Welcome! If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com
Programs called 'bots or agents automate actions that are typically performed by people. 'Bots can be used for good purposes - there are 'bot programs that play games over the Internet, for example, and 'bots that collect information for search engines. Programmers have used 'bots to automatically search eBay for bargains. 'Bots are common on the Internet Relay Chat (IRC) network, where they can moderate a channel by "listening" for profanity or other undesirable conversation and removing violators from the discussion. So-called ChatBots can carry on conversations over Instant Messaging programs. Unfortunately, 'bots have gotten a bad reputation because attackers can use them for malicious purposes, such as coordinating a distributed denial of service (DDoS) attack to overwhelm and crash a company's network. Other uses of 'bots include:
'Bots can work in conjunction with each other. "BotMasters" are people who run robot networks called BotNets, using worms, Trojans and backdoors to install the 'bot software on the systems of unsuspecting users. Then each user's computer becomes a part of the BotNet, which is controlled by the BotMaster. The 'bot software is hidden from the user, who has no idea his/her computer is being used to commit attacks, intrusions and theft of data, or to distribute spam, spyware, and viruses. Because the systems are under the control of a remote entity, they're often called "zombies." For a quick overview of how BotNets work, watch the video called "About BotNets" linked here: http://www.wxpnews.com/rd/rd.cfm?id=060207ED-Bots (you'll need Quicktime Player to watch). Last October, Dutch police shut down a BotNet that included more than 100,000 computers and arrested its perpetrators. The BotMasters were using the zombie computers to attack networks and hack into bank accounts and PayPal and eBay accounts. How do you protect your computer from becoming a member of a BotNet? The same way you secure it against other threats: install good firewall and anti-spyware software. Keep your anti-virus software updated. XP Service Pack 2 also helps to protect against 'bots.
DataGuard archives: Click Here |