Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Malware researchers actively exploit and alter the characteristics of large botnets so that you can never trust the numbers. Who's to say I didn't install 100 copies in my virtual lab for personal research :-). Additionally, if you can take over the command station, you win. The problem is that much of the protocols are encrypted. The trick is to find a vuln and use it against the botnet to deactivate it, or at least, shrivel it a bit...hehe On 5/8/08, Eric Chadbourne <[hidden email]> wrote: > while i know little about botnets at the moment this is a fascinating > looking map. saw the link on slashdot. thought i would pass it along > as it is pretty darn cool. > http://www.csoonline.com/article/348317/What_a_Botnet_Looks_Like > > - eric c. > > -- > This message has been scanned for viruses and > dangerous content by MailScanner, and is > believed to be clean. > > _______________________________________________ > Discuss mailing list > [hidden email] > http://lists.blu.org/mailman/listinfo/discuss >
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |