点到点难在它不是一个集中式网络,每台僵尸电脑可以自可以僵尸网络己发送命令。
Peer-to-peer is difficult because it's not a centralized network, each bot can send commands on its own.
互联网服务供应商说,在DDoS攻击后,他们很少能查到僵尸电脑网络的主控计算机。
Internet service providers say they're rarely able to identify the master computer behind a DDoS attack.
但是一台被Korset化的计算机就可能受到保护,避免成为僵尸电脑的境地,这使得攻击者召集大批电子僵尸去做肮脏的工作变得更为困难。
But a Korset-ized computer could be protected from sinking to zombie status, making it harder for the attacker to muster the legions of digital undead to do the dirty work.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
利用一个由单一主机控制的电脑网络(称为僵尸网络),黑客竭力地颠覆一个网站的服务器。
Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers.
最初,FBI表示,它希望在僵尸网络中追捕到它已确定并警告过其拥有人的那些受感染电脑。
Initially the FBI said it wanted to track down infected computers in the botnets it had identified and warn their owners.
因此,攻击活动源于美国的重要原因是许多美国人的电脑感染了恶意病毒,并因此成为了僵尸网络的一部分。
The important thing about the attacks coming from the U.S. is that a lot of American's computers are infected with malware, thus part of some botnet.
比如,植入了恶意代码的电表,能够扰乱输电网络——就像电脑的“僵尸网络”能够扰乱因特网一样。
Smart meters injected with malware, for instance, could disrupt the grid just as networks of PC botnets-home computers hijacked by viruses-now disrupt the Internet.
他们利用僵尸网络(就是被挟持的个人电脑组成的网络)发送垃圾邮件。
They send the spam from "botnets", networks of hacked personal computers.
当过滤器开始阻拦从嫌疑网络地址发来的邮件,发送者开始在其中放入僵尸网络(劫持电脑的网络)。
When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead.
它也可以用来完全的劫持电脑,加入到一个僵尸网络。
It could also be used to completely hijack the computer, adding it to a botnet.
接下来,感染病毒的电脑被连起来形成“僵尸网络”,并被外部控制。“僵尸网络”能被用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击。
Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
确定你的电脑是否陷入了僵尸网络。
这说明一旦智能手机连到用户的个人电脑上之后,很容易成为僵尸网络的主要攻击对象。
It provide a clear example for how smartphones are prime targets to become botnets once connected to a user's personal computer.
受到感染的机器将会组成Internet史上最大的"Botnets"(僵尸网络) - 由"机器人"电脑组成的网络。
The infected machines thus comprise one of the biggest "botnets" – a network of "robot" computers – in internet history.
位于僵尸网络中的电脑被一种名为Torpig的木马程序控制,它的目的是窃取Windows用户的隐私及财务信息。
The botnet in question is controlled by Torpig (also known as Sinowal), a malware program that aims to gather personal and financial information from Windows users.
博泰扎图认为,最令人担忧的是,各种不安全的XP电脑可能会被黑客改造成新的僵尸网络。
Most troubling of all, Botezatu predicts that unsecured XP machines of all kinds will be compromised by hackers to form new botnets.
新!僵尸网络检测,阻止他人控制你的电脑来存取您的私人信息或使用它来举办一次攻击。
New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.
还可以控制受感染的电脑,将其变为“网络僵尸”,暗中访问一些按访问流量付费的网站,从而获利。
Infection also can be controlled by computer, to turn it into a "zombie network" that secretly visited by some of Flux the website pays to profit.
在这些网上流氓目的:他们希望包括刑事僵尸网络感染的计算机中或想进入个人电脑用户私人信息的。
The aim of these online gangsters: They want to include the infected computer in a criminal Botnet or want access to the private information of the PC owner.
这个升级启用新的僵尸(电脑)通讯和恶僵尸通讯升级意能力,并被经常用来避免检测。
The updates enable new bot communication and malicious capabilities, and are often used to avoid detection.
据赛门铁克称英国约有22%的电脑是“僵尸”电脑。
Symantec said the British about 22% of the computers are "zombie" computers.
而不知情的垃圾邮件发送者和病毒传递者将得到帮助清除他们电脑中的“僵尸”邮件。
And unknowingly sending spam and virus transmission will get their computers to help remove the "mummy" mail.
研究员布莱克2008年介绍了僵尸网络,系统地改变了它使用的恶意软件攻击电脑每10分钟。
A researcher at Black 2008 described a BotNet that systematically alters the malware it USES to attack computers every ten minutes.
你的电脑成了你最可怕的敌人,它看着你的一举一动,收集你所有的秘密,然后将这些数据传送给僵尸牧人—发起僵尸网络的人。
Your computer becomes your worst enemy, watching everything you do, collecting all of your secrets, and then delivering all that data to the bot-herder;
你的电脑成了你最可怕的敌人,它看着你的一举一动,收集你所有的秘密,然后将这些数据传送给僵尸牧人—发起僵尸网络的人。
Your computer becomes your worst enemy, watching everything you do, collecting all of your secrets, and then delivering all that data to the bot-herder;
应用推荐