Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: botnet representation



 Malware researchers actively exploit and alter the characteristics of 
large botnets so that you can never trust the numbers.  Who's to say I 
didn't install 100 copies in my virtual lab for personal research :-). 
Additionally, if you can take over the command station, you win.  The 
problem is that much of the protocols are encrypted.  The trick is to 
find a vuln and use it against the botnet to deactivate it, or at 
least, shrivel it a bit...hehe 



On 5/8/08, Eric Chadbourne <[hidden email]> wrote: 
> while i know little about botnets at the moment this is a fascinating 
> looking map.  saw the link on slashdot.  thought i would pass it along 
> as it is pretty darn cool. 
> http://www.csoonline.com/article/348317/What_a_Botnet_Looks_Like
> 
> - eric c. 
> 
> -- 
> This message has been scanned for viruses and 
> dangerous content by MailScanner, and is 
> believed to be clean. 
> 
> _______________________________________________ 
> Discuss mailing list 
> [hidden email] 
> http://lists.blu.org/mailman/listinfo/discuss
> 


BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org