<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.mywot.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Botnets</id>
	<title>Botnets - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.mywot.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Botnets"/>
	<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Botnets&amp;action=history"/>
	<updated>2026-04-24T01:53:53Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://www.mywot.com/wiki/index.php?title=Botnets&amp;diff=7186&amp;oldid=prev</id>
		<title>Nixiewot at 09:04, 2 February 2012</title>
		<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Botnets&amp;diff=7186&amp;oldid=prev"/>
		<updated>2012-02-02T09:04:13Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 09:04, 2 February 2012&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A Botnet &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;(also called a &lt;/del&gt;robot network) is a group of computers running an application controlled and manipulated &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;only &lt;/del&gt;by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, [[Malware]]) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it. [http://www.topbits.com/botnet.html]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A Botnet&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, or &lt;/ins&gt;robot network) is a group of computers running an application controlled and manipulated by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, [[Malware]]) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it. [http://www.topbits.com/botnet.html]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Uses of Botnets ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Uses of Botnets ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There are many uses of Botnets, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;some of them are&lt;/del&gt;:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There are many uses of Botnets, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;an example is&lt;/ins&gt;:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== Denial of Service (DoS) Attacks ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== Denial of Service (DoS) Attacks ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A Botnet can be used as a denial of service weapon. A Botnet attacks a network of computers for the purpose of disrupting service through the loss of connectivity or consumption of the victim network's bandwidth (by overloading the resources of the victim's computer system). &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Botnet attacks &lt;/del&gt;may also used to damage or shut down a competitor's website or system of computers.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A Botnet can be used as a denial of service weapon. A Botnet attacks a network of computers for the purpose of disrupting service through the loss of connectivity or consumption of the victim network's bandwidth (by overloading the resources of the victim's computer system). &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Botnets &lt;/ins&gt;may also used to damage or shut down a competitor's website or system of computers.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Keylogging and Mass &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ID &lt;/ins&gt;Theft ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Keylogging and Mass &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Identity &lt;/del&gt;Theft ==&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;See main articles: [[Keylogger|Keylogging]] and [[Identity Theft]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;See main articles: [[Keylogger|Keylogging]] and [[Identity Theft]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Unfortunately&lt;/del&gt;, some bots have adapted to this by installing a [[Keylogger]] program in the infected machines. With &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;a [[Keylogger]] &lt;/del&gt;program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;like &lt;/del&gt;PayPal &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;or G-Mail or &lt;/del&gt;Bank of America. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;However&lt;/ins&gt;, some bots have adapted to this by installing a [[Keylogger]] program in the infected machines. With &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;this &lt;/ins&gt;program, the bot owner can use a filtering program to gather &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;''&lt;/ins&gt;only&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;'' &lt;/ins&gt;the key sequence typed before or after interesting keywords&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, i.e. &amp;quot;&lt;/ins&gt;PayPal&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;quot;, &amp;quot;Gmail&amp;quot;, &amp;quot;&lt;/ins&gt;Bank of America&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;quot;..&lt;/ins&gt;. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information (PII)| personal information]] and passwords. &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;A link &lt;/del&gt;in &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;these &lt;/del&gt;[[Phishing]] &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;mails &lt;/del&gt;can also lead to fake &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;PayPal, eBay or other &lt;/del&gt;websites to trick the user into typing in the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;username and password&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information (PII)| personal information]] and passwords. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Links &lt;/ins&gt;in &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;a &lt;/ins&gt;[[Phishing]] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;email &lt;/ins&gt;can also lead to fake websites to trick the user into typing in the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;login credentials&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Nixiewot</name></author>
		
	</entry>
	<entry>
		<id>https://www.mywot.com/wiki/index.php?title=Botnets&amp;diff=831&amp;oldid=prev</id>
		<title>Bob Zenith: Fixed some broken links</title>
		<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Botnets&amp;diff=831&amp;oldid=prev"/>
		<updated>2010-05-08T21:15:33Z</updated>

		<summary type="html">&lt;p&gt;Fixed some broken links&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 21:15, 8 May 2010&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A Botnet (also called a robot network) is a group of computers running an application controlled and manipulated only by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, [[Malware]]) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it.[http://www.topbits.com/botnet.html]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A Botnet (also called a robot network) is a group of computers running an application controlled and manipulated only by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, [[Malware]]) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it. [http://www.topbits.com/botnet.html]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l15&quot; &gt;Line 15:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 15:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Keylogging and Mass Identity Theft ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Keylogging and Mass Identity Theft ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;see &lt;/del&gt;main articles: [[Keylogging]] and [[Identity Theft]]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;See &lt;/ins&gt;main articles: [[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Keylogger|&lt;/ins&gt;Keylogging]] and [[Identity Theft]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. Unfortunately, some bots have adapted to this by installing a [[Keylogger]] program in the infected machines. With a [[Keylogger]] program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords like PayPal or G-Mail or Bank of America. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. Unfortunately, some bots have adapted to this by installing a [[Keylogger]] program in the infected machines. With a [[Keylogger]] program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords like PayPal or G-Mail or Bank of America. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information | personal information]] and passwords. A link in these Phishing mails can also lead to fake PayPal, eBay or other websites to trick the user into typing in the username and password.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;(PII)&lt;/ins&gt;| personal information]] and passwords. A link in these &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[[&lt;/ins&gt;Phishing&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]] &lt;/ins&gt;mails can also lead to fake PayPal, eBay or other websites to trick the user into typing in the username and password.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Bob Zenith</name></author>
		
	</entry>
	<entry>
		<id>https://www.mywot.com/wiki/index.php?title=Botnets&amp;diff=830&amp;oldid=prev</id>
		<title>Bob Zenith: Created page with 'A Botnet (also called a robot network) is a group of computers running an application controlled and manipulated only by the owner or the software source. Usually, when people re…'</title>
		<link rel="alternate" type="text/html" href="https://www.mywot.com/wiki/index.php?title=Botnets&amp;diff=830&amp;oldid=prev"/>
		<updated>2010-05-08T21:14:00Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;#039;A Botnet (also called a robot network) is a group of computers running an application controlled and manipulated only by the owner or the software source. Usually, when people re…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;A Botnet (also called a robot network) is a group of computers running an application controlled and manipulated only by the owner or the software source. Usually, when people refer to Botnets, they are talking about a group of computers infected with the malicious kind of robot software, (the bots), which present a security threat to the owner of the computer. Once the robot software (basically, [[Malware]]) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. There are small and large Botnets, ranging from 10,000 computers to 1,000 computers controlled. The difficult thing about Botnets is that the owner usually doesn't know about it, therefore s/he is powerless to stop it.[http://www.topbits.com/botnet.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Uses of Botnets ==&lt;br /&gt;
&lt;br /&gt;
There are many uses of Botnets, some of them are:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denial of Service (DoS) Attacks ===&lt;br /&gt;
&lt;br /&gt;
A Botnet can be used as a denial of service weapon. A Botnet attacks a network of computers for the purpose of disrupting service through the loss of connectivity or consumption of the victim network's bandwidth (by overloading the resources of the victim's computer system). Botnet attacks may also used to damage or shut down a competitor's website or system of computers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keylogging and Mass Identity Theft ==&lt;br /&gt;
&lt;br /&gt;
see main articles: [[Keylogging]] and [[Identity Theft]]&lt;br /&gt;
An encryption software within the victims' unit(s) can deter most bots from harvesting any useful, private information. Unfortunately, some bots have adapted to this by installing a [[Keylogger]] program in the infected machines. With a [[Keylogger]] program, the bot owner can use a filtering program to gather only the key sequence typed before or after interesting keywords like PayPal or G-Mail or Bank of America. &lt;br /&gt;
&lt;br /&gt;
Bots can also be used as agents for mass [[Identity Theft]]. It does this through [[Phishing]] or pretending to be a legitimate company in order to convince the user to submit [[Personally Identifiable Information | personal information]] and passwords. A link in these Phishing mails can also lead to fake PayPal, eBay or other websites to trick the user into typing in the username and password.&lt;/div&gt;</summary>
		<author><name>Bob Zenith</name></author>
		
	</entry>
</feed>