BOTNETS EXPLAINED: ZOMBIE COMPUTERS?
There's a lot of malicious software out there. A botnet is an especially sneaky type of malware. An attacker setups up a botnet by downloading Trojan horse virus's onto unsuspecting devices. A Trojan horse virus masquerades as a harmless file and most times goes undetected. These virus's lay dormant on users computers for days, months or even years! The number of devices infected can range from just a few to a few hundred thousand. The attacker infects this devices to coordinate an attack on one central device, usually a server. The users of these devices have no idea their computers have become "zombies".....
Finish reading this blog over at Master I.T.
Community Development/Integration I Disaster Risk Management I Climate Change Adaptation and Mitigation │Agricultural
5yHi Dwaine...good morning....i am not so IT savvy ...but I do own a laptop and cell phone, so what kind of software would I need to safe guard against or remedy any such issue?