+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

BOTNETS: How Hackers Can Control Your Computer Remotely For Mayhem And Profit

Mar 20, 2013, 01:28 IST

How do Trojan viruses infect your computer? Where does spam come from? How do hackers gain control over your computer?

Advertisement

Often times, the answer is via botnet.

A botnet is nothing more than a small program that people install (usually without realizing it) that "phones home" to another computer and carries out whatever instructions it's given.

On it's own, a single infected computer isn't much to write home about. But when you're talking about 100 or 1,000 (and often times even more) computers, a hacker has a lot of computing power at his disposal.

One of the most popular means of gaining access to a computer is to hide a Trojan in an email attachment that joins the botnet upon installation. This happens without the user's knowledge or consent. From here, the botnet owner can deploy commands to his collection of compromised computers.

Advertisement

You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article