1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
11

Discuss any three Networked Applications targeted/attacked by Botnet

Computers and Technology
2 answers:
siniylev [52]3 years ago
7 0

Answer:

The three applications attacked by Botnet can be attacks drive-by downloads, e-mail or exploiting some vulnerability in browsers such as Google Chrome or Internet Explorer.

Explanation:

Botnet is the name by which any group of infected computers is called and which are controlled by a remote attacker. A hacker or a group of them makes a botnet using malware that infects a large number of computers. Computers that are part of the botnet are known as "bots."

Hackers use two methods to infect computers and make them part of their botnet: one is drive-by downloads and email attacks. In the first, the process needs the attacker to find a web page with a vulnerability. In this way, the hacker loads the malicious code on the page and exploits such vulnerability as Google Chrome or Internet Explorer. The malicious code redirects the user's browser to a site controlled by the hacker, from where the bot code is downloaded and installed on the computer. Another type of attack is the sending of a large amount of spam, where a Word or PDF file with a malicious code or a link to a page where the code is hosted is attached.

storchak [24]3 years ago
5 0

Answer:

 Botnet is define as the number of the internet connection where each devices in the botnet connection run one and more than one bot in the network. It is basically use to performed DDOS ( Distributed denial of service) attack in the system, steal data and also allow the hacker to access different devices.

 The three networked applications that are targeted by the botnet is that:

  • Many e-mail applications are basically spammed by the users for entering the login credential by using the fake websites.
  • DDOS ( Distributed denial of service) attack is also one of the main application that are attacked by the botnet in the system.
  • Many types of banking applications that theft the data or important information which include users login details and credit or debit cards details that are hacked by the attackers in the system.  

You might be interested in
When it's time to change career paths, it's a good idea to first​
yarga [219]

Answer:

Go for an interview before quitting your job.

Explanation:

You don't want to lose your job, do you? :)

8 0
4 years ago
Read 2 more answers
Edison wants to purchase a new computer and go to the Caribbean for spring break. The computer is priced at $1,299, and the vaca
Otrada [13]

Answer:

This question is imcomplete, here is the complete question

Edison wants to purchase a new computer and go to the Caribbean for spring break. The computer is priced at $1,299, and the vacation is priced at $750. He has only $1,537 in his checking account, so he cannot afford to purchase both. After much thought, Edison buys the computer and writes a check for $1,299. Identify what role money plays in each of the following parts of the story. Hint: Select each role only once. Role of Money Medium of Exchange Unit of Account Store of Value Edison can easily determine that the price of the computer is more than the price of the vacation. Edison has $1,537 in his checking account. Edison writes a check for $1,299.

Identify what role money plays in each of the following parts of the story.

Explanation:

Brian can effortlessly determine and conclude that the cost of the computer is more than that of the price of the vacation.= Unit of Account

Brian has a total amount of $1,537 in his checking account.= Store of value

Brian then writes a check for $1,299.= Medium of Exchange

5 0
3 years ago
The most important assistance that a full-featured HTML editor provides is _____.
Talja [164]
I would say code completion. Dreamweaver does this for you. So say I wanted to make a paragraph of text, I would use <p>, and then Dreamweaver would create the closing </p> for you.
4 0
4 years ago
5.   Which of the following attributes of a website indicates a more reliable source for information?
Leona [35]
The answer would be B because ".edu" stands for education and it shows there was a source for the information
5 0
3 years ago
Give two examples of safe, professional usernames. (1-2 sentences)
erastovalidia [21]

Answer:

Safe username

Explanation:

OKNGR$#1133

PLMOKNG^&*89

5 0
2 years ago
Other questions:
  • Which icon will automatically adjust the amount of space between letters from very tight to very loose in style? Hyphenation, Te
    6·2 answers
  • Skinner designed a soundproof apparatus, often equipped with a lever or bar, with which he conducted his experiments in operant
    9·1 answer
  • An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
    7·1 answer
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? &amp;&amp;&amp; """ %%% ###
    5·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • For BitTorrent, which of the following is true:
    6·1 answer
  • Which of the following is a programming language that permits Web site designers to run applications on the user's computer?
    15·1 answer
  • Hellpppp please I need it!
    15·1 answer
  • During system testing, developers test the program in an environment that is very similar to how the program will eventually be
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!