Botnets, malware, phishing, pharming, trojans, zombies virus

what is Botnets
What is Botnet

BOTNETS are networks of computers that have been hijacked by malicious groups or individuals. Their owners usually unaware victims who are unaware their machines have been infected and turned into so-called “zombies” or “bots”. Zombie computers are typically used to distribute spam or phishing (see below) e-mail, or viruses and Trojans used to hijack other computers. Botnet operators often rent time or bandwidth to spam e-mail marketers and phishing scam artists on their networks.

MALWARE is a catch-all term for malicious software such as computer viruses and spyware, which compromises the security or function of personal computers.


PHISHING is a technique in which criminals try to disclose sensitive information such as online banking names and passwords to people, and are often operated through e-mail.

Farming is an attack in which malicious individuals try to redirect a false traffic from a website. This is sometimes done to collect a person’s login or password information.

TROJANS are programs that perform a useful function to hide malicious. Like the Trojan horse of the Greek myth that such programs are named, deception motivates people to give rogues access to computers.

ZOMBIES are computers that are hijacked by attackers to perform commands and tasks issued to them, often without the owners’ knowledge. They are usually infected with Trojans, a type of software that enables attackers to use them in botnets. An infected computer is sometimes referred to as a bot – short for robots.

Have any Question or Comment?

11 comments on “Botnets, malware, phishing, pharming, trojans, zombies virus

Great content! Super high-quality! Keep it up! 🙂


Really nice design and style and great subject material, absolutely nothing else we need : D.


I’ll immediately grab your rss feed as I can not find your email subscription link or newsletter service. Do you have any? Please let me know so that I could subscribe. Thanks.


Excellent post. I was checking constantly this blog
and I’m impressed! Extremely helpful info particularly
the last part 🙂 I care for such information much.

I was seeking this particular information for a very long time.
Thank you and good luck.


Like!! I blog quite often and I genuinely thank you for your information. The article has truly peaked my interest.


Like!! Thank you for publishing this awesome article.


I learn something new and challenging on blogs I stumbleupon everyday.


I would like to thnkx for the efforts you have put in writing this web site. I’m hoping the same high-grade website post from you in the upcoming as well. Actually your creative writing abilities has encouraged me to get my own blog now. Really the blogging is spreading its wings rapidly. Your write up is a great example of it.


I have been exploring for a little bit for any high quality


[…] National Portrait Gallery was targeted by 347,602 emails containing spam, phishing and malware attacks in the last quarter of 2019, Freedom of Information (FOI) requests have been […]

Leave a Reply

Your email address will not be published. Required fields are marked *

Contact me

If you need any kind of hacking tools and software, then contact me.


Jdsingh group