云本身可以说就是最大的僵尸网络。
确定你的电脑是否陷入了僵尸网络。
要发现有所动作的僵尸网络并非不可能的事。
大量的攻击活动来源于僵尸网络的自动化攻击。
虽然近期在拆卸僵尸网络,但它仍旧继续激增。
Botnets continue to proliferate, despite recent botnet takedowns.
首个移动僵尸网络?
但陷入僵尸网络到底意味着什么?有什么对策吗?
But what does it really mean to be part of a botnet, and is there anything that can you do about it?
它也可以用来完全的劫持电脑,加入到一个僵尸网络。
It could also be used to completely hijack the computer, adding it to a botnet.
老的僵尸网络又在网上再现,新的僵尸网络正在形成。
Old botnets are being brought back online, and new botnets are being created.
正如前面提到的,88%的垃圾邮件都来自于僵尸网络。
As we mentioned above, 88% of all spam is sent from botnets.
网页过滤服务是打击僵尸网络最有效的方法之一。
Web-filtering services are one of the best ways to fight bots.
另外一个有趣的应用程序被创建用于识别僵尸网络的垃圾邮件。
Another interesting application was created to identify botnets for email spam.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
正如你所见,欧洲尤其是东欧,已经逐步成为僵尸网络的聚合之地。
As you can see, Europe, especially Eastern Europe, has become a major hotbed for botnets.
以下便是2010年整理的垃圾邮件制造者——僵尸网络的分布地图。
韦德曼的程序就是其中一种最先知道的可用于加入僵尸网络节点的软件。
Weidman's program is one of the first known to turn smart phones into nodes of a botnet.
他们利用僵尸网络(就是被挟持的个人电脑组成的网络)发送垃圾邮件。
They send the spam from "botnets", networks of hacked personal computers.
上周,调查人员很快在英国和其他国家定位了控制僵尸网络的部分计算机。
Last week, investigators quickly located computers that were involved with the control of the botnet in Britain and several other countries.
关于僵尸网络构成的威胁有着广泛的投机,从唤醒命令直至破坏性的攻击。
There has been a range of speculation about the nature of the threat posed by the botnet, from a wake-up call to a devastating attack.
识别并进而迅速发现那些既狡猾又令人害怕的“僵尸网络”正变得愈加容易。
It is becoming easier to identify botnets and to spot the clever and scary ones quickly.
僵尸网络曾经使用IaaS作为命令和控制中心直接恶意更新虚拟机的基础设施。
IaaS has been used as Command and Control centers to direct operations of a botnet for use in malicious updates of the infrastructure within and across the virtual machines.
这不禁让赛门铁克的研究人员想这是否就是手机僵尸网络在现实中的第一个实例呢。
This led the Symantec researchers to wonder if this was, in fact, the first case of a mobile botnet being spotted in the wild.
而使用Web2.0技术通过社会化网络传播的僵尸网络数量正不断增长。
Botnets using Web 2.0 technology via social networks also are on the rise.
Rustock僵尸网络平均每天发送300亿封垃圾邮件,或许只由两三个人控制。
The Rustock botnet, which sent up to 30 billion spam messages per day, might have been run by two or three people.
对于僵尸网络而言使用通讯网络替代因特网能够有更大的优势,那就是隐匿攻击者的身份。
Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users.
他们使用僵尸网络(botnet)发送电邮,试图造成股价的短期飙升,进而从中牟利。
Using a so-called "botnet" network of infected computers to send the emails, the ruse was designed to cause a brief spike in the shares' price from which the conspirators reaped a profit.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。
The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。
The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
应用推荐