1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
11

Discuss any three Networked Applications targeted/attacked by Botnet

Computers and Technology
2 answers:
siniylev [52]3 years ago
7 0

Answer:

The three applications attacked by Botnet can be attacks drive-by downloads, e-mail or exploiting some vulnerability in browsers such as Google Chrome or Internet Explorer.

Explanation:

Botnet is the name by which any group of infected computers is called and which are controlled by a remote attacker. A hacker or a group of them makes a botnet using malware that infects a large number of computers. Computers that are part of the botnet are known as "bots."

Hackers use two methods to infect computers and make them part of their botnet: one is drive-by downloads and email attacks. In the first, the process needs the attacker to find a web page with a vulnerability. In this way, the hacker loads the malicious code on the page and exploits such vulnerability as Google Chrome or Internet Explorer. The malicious code redirects the user's browser to a site controlled by the hacker, from where the bot code is downloaded and installed on the computer. Another type of attack is the sending of a large amount of spam, where a Word or PDF file with a malicious code or a link to a page where the code is hosted is attached.

storchak [24]3 years ago
5 0

Answer:

 Botnet is define as the number of the internet connection where each devices in the botnet connection run one and more than one bot in the network. It is basically use to performed DDOS ( Distributed denial of service) attack in the system, steal data and also allow the hacker to access different devices.

 The three networked applications that are targeted by the botnet is that:

  • Many e-mail applications are basically spammed by the users for entering the login credential by using the fake websites.
  • DDOS ( Distributed denial of service) attack is also one of the main application that are attacked by the botnet in the system.
  • Many types of banking applications that theft the data or important information which include users login details and credit or debit cards details that are hacked by the attackers in the system.  

You might be interested in
Write a Python function that join the two string and print it ​
liubo4ka [24]

Answer:

string1 = "this is string 1"

string2 = " this is string 2"

print(string1 + string2)

Explanation:

the string1 variable is assigned with a string value(aka. str)

string2 is also a variable assigned with a slightly different string value

the 3rd line then prints string 1 and 2 to the console.

5 0
2 years ago
Read 2 more answers
When selecting font size in a document, ____ points equals one-inch-tall text?
IgorC [24]
Hello <span>Jhigg4685 
</span><span>

Answer: When selecting font size in a document, 72 points equals one-inch-tall text?


I hope this helps
-Chris</span>
3 0
4 years ago
Who tryna play fortnite?
steposvetlana [31]
What time ? I play on Xbox
3 0
3 years ago
Read 2 more answers
Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
Stels [109]

Answer:

yes

Explanation:

yall share the same thing

5 0
2 years ago
Write a program that asks the user for the number of males and the number of females registered in a class. The program should d
Bond [772]

Answer:

import java.util.Scanner;

public class PercentagePopulation {

public static void main(String[] args) {

 // 1. Create an object of the Scanner class

 // This will allow for user's inputs

 Scanner input = new Scanner(System.in);

 // 2. Create a prompt asking the user to enter the number of males

 System.out.println("Please enter the number of males");

 // 3. Receive the number entered by the user and store in an int

 // variable called  number_of_males.

 int number_of_males = input.nextInt();

 // 4. Create a prompt asking the user to enter the number of

               // females

 System.out.println("Please enter the number of females");

 // 5. Receive the number entered by the user and store in an int

 // variable  called, number_of_females

 int number_of_females = input.nextInt();

 // 6. Find the sum of the number of males and females

 // Store the result in an int variable called total.

 int total = number_of_males + number_of_females;

 // 7. Find the percentage of males by using the appropriate

 // formula.  Do a type-casting to allow for division in floating point

               // representation by prepending the number_of_males by (double)

 double percentagemales = (double) number_of_males / total * 100.0;

 // 8. Find the percentage of females by using the appropriate

 // formula.  Do a type casting to allow for division in floating point

               // representation by prepending the number_of_males by (double)

 double percentagefemales = (double) number_of_females / total * 100.0;

 // 9. Print out the results

 System.out.println("Percentage males : " + percentagemales + "%");

 System.out.println("Percentage females : " + percentagefemales + "%");

}

}

Explanation:

Please go through the comments in the code to give an explanation of the program. The source code file has also been added to this response. Please download it and go through it.

Download java
4 0
3 years ago
Other questions:
  • The cord of a bow string drill was used for
    14·1 answer
  • Consider the following implementation of a class Square:
    12·1 answer
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • Webster defines risk as "the possibility of loss or injury". Therefore, driving a motor vehicle is a risk.
    12·1 answer
  • Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
    11·1 answer
  • 1. The programmer intends for this pseudocode to display three random numbers in the range of 1 through 7. According to the way
    12·1 answer
  • Whats a hybrid wired network
    9·1 answer
  • Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. How
    6·1 answer
  • Check all of the file types that a Slides presentation can be downloaded as.
    5·2 answers
  • When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!