Botnet

Results: 929



#Item
641Computer network security / Malware / Network address translation / Private network / IP address / Code Red / Botnet / Witty / Computer worms / System software / Network architecture / Computing

On the Impact of Dynamic Addressing on Malware Propagation Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-25 13:27:50
642Scareware / Computer network security / Social engineering / Spyware / Rogue security software / Antivirus software / Computer virus / Botnet / PersonalAntiSpy Free / Malware / Rogue software / System software

Monthly Cyber Security Tips – NEWSLETTER September 2010 Volume 5, Issue 9

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:19:04
643Cybercrime / The Spamhaus Project / Anti-spam techniques / Botnet / Email spam / Spam / DNSBL / Computer crime / Malware / Spamming / Computing / Internet

Spamhaus BGPf Case Study at Schibsted Media Group Using Spamhaus BGPf in a production environment The Spamhaus Project, Geneva, Switzerland

Add to Reading List

Source URL: www.spamhaus.org

Language: English - Date: 2013-06-09 11:27:24
644Computing / Botnet / Domain name / Fast flux / Root name server / Name server / Generic top-level domain / Top-level domain / Domain name system / Internet / Network architecture

An Internet-Wide View into DNS Lookup Patterns Shuang Hao, Nick Feamster, Ramakant Pandrangi∗ School of Computer Science, Georgia Tech ABSTRACT

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2011-10-28 14:45:02
645Spamming / Botnets / Malware / Internet Relay Chat bot / Bagle / Video game bot / Zeus / Storm Worm / Lethic botnet / Computing / Computer network security / Multi-agent systems

White Paper The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:16
646Multi-agent systems / Spamming / JavaScript / Botnet / ARP spoofing / Software engineering / Computer network security / Computing / Cross-platform software

Owning "bad" guys {and mafia} with Javascript botnets

Add to Reading List

Source URL: korben.info

Language: English - Date: 2014-05-30 10:22:42
647Computing / Botnets / Malware / Targeted threat / Storm botnet / Multi-agent systems / Computer network security / Spamming

WHITE PAPER Advanced Threat Protection Solution Understanding the technologies required to successfully combat Advanced Persistent Threats both inside and outside your network

Add to Reading List

Source URL: info.seculert.com

Language: English - Date: 2013-12-16 08:32:04
648Internet privacy / Multi-agent systems / Spamming / HTTP / Proxy server / JavaScript / Botnet / HTTP cookie / Google Chrome / Computing / Software / Computer network security

Owning Bad Guys {& Mafia} with JavaScript Botnets

Add to Reading List

Source URL: korben.info

Language: English - Date: 2014-05-30 10:22:42
649Cyberwarfare / Denial-of-service attack / Tor / Netflow / Extension mechanisms for DNS / Botnet / IP address spoofing / Computer network security / Computing / Internet

DNS_Attacks_WP_042506.qxd

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2011-01-19 15:32:31
650Multi-agent systems / Botnets / Malware / Email spam / Storm botnet / Rustock botnet / Spamming / Computer network security / Computing

Case 1:11-cv[removed]JCC -IDD Document 32 Filed[removed]Page 1 of 21 PageID# 1301 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

Add to Reading List

Source URL: blogs.technet.com

Language: English - Date: 2012-01-23 15:16:56
UPDATE