20. Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users.
对于僵尸网络而言使用通讯网络替代因特网能够有更大的优势,那就是隐匿攻击者的身份。
来自互联网
21. There has been a range of speculation about the nature of the threat posed by the botnet, from a wake-up call to a devastating attack.
关于僵尸网络构成的威胁有着广泛的投机,从唤醒命令直至破坏性的攻击。
来自互联网
22. Last week, investigators quickly located computers that were involved with the control of the botnet in Britain and several other countries.
上周,调查人员很快在英国和其他国家定位了控制僵尸网络的部分计算机。
来自互联网
23. Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.
24. In 2008 researchers from the University of California at Berkeley and San Diego posed as spammers, infiltrated a botnet and measured its success rate.
25. The important thing about the attacks coming from the U.S. is that a lot of American's computers are infected with malware, thus part of some botnet.
因此,攻击活动源于美国的重要原因是许多美国人的电脑感染了恶意病毒,并因此成为了僵尸网络的一部分。
来自互联网
26. It now has the power to lash together those infected computers into a vast supercomputer called a botnet that can be controlled clandestinely by its creators.
它现在有能力将受感染的计算机变成一个巨大的超级计算机,即所谓的僵尸网络,并可由病毒创作者秘密控制。
来自互联网
27. Having a botnet at your fingertips will cost you $225, and a tool that exploits a vulnerability on a banking site averages $740 and runs as high as $3, 000.
28. The Anon Ops website was taken down suddenly despite having upgraded to what PandaLabs describe as a ‘bullet-proof server’ designed to resist botnet attacks.
29. The Anon Ops website was taken down suddenly despite having upgraded to what PandaLabs describe as a ‘bullet-proof server’ designed to resist botnet attacks.