1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
11

Discuss any three Networked Applications targeted/attacked by Botnet

Computers and Technology
2 answers:
siniylev [52]3 years ago
7 0

Answer:

The three applications attacked by Botnet can be attacks drive-by downloads, e-mail or exploiting some vulnerability in browsers such as Google Chrome or Internet Explorer.

Explanation:

Botnet is the name by which any group of infected computers is called and which are controlled by a remote attacker. A hacker or a group of them makes a botnet using malware that infects a large number of computers. Computers that are part of the botnet are known as "bots."

Hackers use two methods to infect computers and make them part of their botnet: one is drive-by downloads and email attacks. In the first, the process needs the attacker to find a web page with a vulnerability. In this way, the hacker loads the malicious code on the page and exploits such vulnerability as Google Chrome or Internet Explorer. The malicious code redirects the user's browser to a site controlled by the hacker, from where the bot code is downloaded and installed on the computer. Another type of attack is the sending of a large amount of spam, where a Word or PDF file with a malicious code or a link to a page where the code is hosted is attached.

storchak [24]3 years ago
5 0

Answer:

 Botnet is define as the number of the internet connection where each devices in the botnet connection run one and more than one bot in the network. It is basically use to performed DDOS ( Distributed denial of service) attack in the system, steal data and also allow the hacker to access different devices.

 The three networked applications that are targeted by the botnet is that:

  • Many e-mail applications are basically spammed by the users for entering the login credential by using the fake websites.
  • DDOS ( Distributed denial of service) attack is also one of the main application that are attacked by the botnet in the system.
  • Many types of banking applications that theft the data or important information which include users login details and credit or debit cards details that are hacked by the attackers in the system.  

You might be interested in
Which of the following is true about advertisements?
katrin [286]

the answer is they often contain biases :)

3 0
2 years ago
B. List any four major drawbacks of the first generation computer​
d1i1m1o1n [39]

Answer:

Terribly low storage space, limited to mathematics/computing, required entire rooms to use, and low information yield for hours of processing.

Explanation:

3 0
3 years ago
Who plays warzone im a roze sweat and ill try to carry with loadout
alexira [117]

Answer:

I type play warzone- If u wanna add me my user is Chachee_Girl. Dont ask- and im on ps5

8 0
2 years ago
___________ is a task pane used to correct grammar errors; opens when you click the Spelling & Grammar button in the Proofin
BaLLatris [955]

Answer:

Spelling Task Pane

Explanation:

According to my research on Microsoft Office Studio, I can say that based on the information provided within the question the feature being mentioned in the question is called the Spelling Task Pane. By selecting this pane word will offer various grammar and spelling assistance, such as correcting words and offering one or more suggestions.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
Read 2 more answers
Write a Python function that will accept as input three string values from a user. The method will return to the user a concaten
Aleks04 [339]

Answer:

Following are the program in python language

def cat_rev(x,y,z): # function definition  

   x=x[::-1]# reverse the first string  

   y=y[::-1]# reverse the second string  

   z=z[::-1]# reverse the third string  

   z=x+y+z;  #concat the string

   return(z)#return the string

   #main method

s=input("Enter the first string:") #read the first string

r=input("Enter the second string:")#Read the second string  

t=input("Enter the third string:")#Read the third string by user

rev1= cat_rev(s,r ,t ) #function calling

print(rev1)# display reverse string

Output:

Enter the first string:san

Enter the second string:ran

Enter the third string:tan

nasnarnat

Explanation:

Following are the description of program

  • In the main function we read the three value by the user in the "s", "r" and "t" variable respectively.
  • After that call the function cat_rev() by pass the variable s,r and t variable in that function .
  • Control moves to the function definition of the cat_rev() function .In this function we reverse the string one by one and concat the string by using + operator .
  • Finally in the main function we print the reverse of the concat string   .

5 0
3 years ago
Other questions:
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    13·1 answer
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • Use of the internet to access programs and data on computers that’s are owned and managed by the other using large data centers.
    11·1 answer
  • Computer with a domain name is called a
    7·1 answer
  • Importance of taking correct body measurement....
    15·1 answer
  • It is used to select specific menu options, drag and drop options and to draw something on screen.
    6·1 answer
  • What will the following code display? int numbers[4] = { 99, 87 }; cout << numbers[3] << endl; a. 87 b.0 d. 34. What
    12·1 answer
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • Is the trust necessary to use an emerging technology platform? why?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!