- bot-infected computer
- Интернет: заражённый вирусом компьютер, инфицированный компьютер
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Computer worm — Morris Worm source code disk at the Computer History Museum … Wikipedia
Computer virus — Not to be confused with Malware. A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term virus is also commonly but erroneously used to refer to other types of malware, including but… … Wikipedia
bot herder — n. A hacker who controls a large number of compromised computers for malicious purposes. Also: bot herder, botnet herder. bot herd n. bot herding pp. Example Citations: Attackers use automated techniques to scan specific network ranges and… … New words
Operation: Bot Roast — is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through the Internet without the owners’ knowledge, which turns the computer into a zombie computer that then sends out… … Wikipedia
Zotob (computer worm) — The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC, CNN, The Associated Press, The New York Times, and Caterpillar Inc. mdash; Business Week, August 16, 2005.Zotob is … Wikipedia
Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… … Wikipedia
Timeline of computer viruses and worms — Contents 1 1960–1969 1.1 1966 2 1970–1979 2.1 1 … Wikipedia
Zombie (computer science) — This article is about the computing term. For the Irish electro band, see Zombie Computer (Band). Zombie virus redirects here. For the use of the term in science fiction, see Zombie apocalypse. In computer science, a zombie is a computer… … Wikipedia
List of computer criminals — Hacker Adrian Lamo (left) with contemporaries Kevin Mitnick (center) and Kevin Poulsen … Wikipedia
Storm botnet — The typical lifecycle of spam that originates from a botnet: (1) Spammer s web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic The Storm… … Wikipedia
Spyware — is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,… … Wikipedia