1. The First Mobile Botnet?
首个移动僵尸网络?

来自互联网

2. The cloud could well be the biggest botnet.
云本身可以说就是最大的僵尸网络。

来自互联网

3. Determine whether your PC is part of a botnet.
确定你的电脑是否陷入了僵尸网络。

来自互联网

4. It's not impossible to catch a botnet in the act.
要发现有所动作的僵尸网络并非不可能的事。

来自互联网

5. And controlling a large botnet of infected computers.
与操控由大量受感染计算机组成的僵尸网络之间存在巨大的区别。

来自互联网

6. The large number of attacks stems from botnet automation.
大量的攻击活动来源于僵尸网络的自动化攻击。

来自互联网

7. Botnets continue to proliferate, despite recent botnet takedowns.
虽然近期在拆卸僵尸网络,但它仍旧继续激增。

来自互联网

8. It could also be used to completely hijack the computer, adding it to a botnet.
它也可以用来完全的劫持电脑,加入到一个僵尸网络。

来自互联网

9. These individuals demonstrate how even unskilled people can run and leverage a botnet.
这些个人显示了没技巧的人如果运行和控制一个僵尸网络。

来自互联网

10. Weidman's program is one of the first known to turn smart phones into nodes of a botnet.
韦德曼的程序就是其中一种最先知道的可用于加入僵尸网络节点的软件。

来自互联网

11. But what does it really mean to be part of a botnet, and is there anything that can you do about it?
但陷入僵尸网络到底意味着什么?有什么对策吗?

来自互联网

12. The low-orbit ion cannon is, essentially, a volunteer botnet that Anonymous uses to take down websites.
实际上,所谓的低轨道等离子大炮软件,就是一个用于将特定网站攻击下线的志愿者僵尸网络。

来自互联网

13. This reduction can be attributed to the shutdown of major spam networks like spamit.com and the Bredolab botnet.
主要原因在于大型垃圾信息网络spamit.com以及Bredolab僵尸网络的关闭。

来自互联网

14. These related emails were then reduced to hosts (static or dynamic IP address) to identify the botnet in question.
然后这些相关电子邮件会减少至主机(静态或动态IP地址)以识别有问题的僵尸网络。

来自互联网

15. The Rustock botnet, which sent up to 30 billion spam messages per day, might have been run by two or three people.
Rustock僵尸网络平均每天发送300亿封垃圾邮件,或许只由两三个人控制。

来自互联网

16. The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。

来自互联网

17. This led the Symantec researchers to wonder if this was, in fact, the first case of a mobile botnet being spotted in the wild.
这不禁让赛门铁克的研究人员想这是否就是手机僵尸网络在现实中的第一个实例呢。

来自互联网

18. The group also formed a committee to examine how switching to IPv6 could affect ISPs' ability to detect and thwart botnet attacks.
小组同时成立了另一个委员会,研究切换到IPv6对因特网服务提供商检测和削弱僵尸网络攻击的能力的影响。

来自互联网

19. If any anon fails to be inspired by the target, she can remove her own computer from the volunteer botnet, reducing its effect.
而如果有任何一位无名氏对攻击目标不感兴趣的话,他便可以将自己的计算机从志愿者僵尸网络中脱离出来,以减少这次攻击的效力。

来自互联网

20. Using the telecommunications network, rather than the Internet, for botnet control allows attackers to hide their actions from users.
对于僵尸网络而言使用通讯网络替代因特网能够有更大的优势,那就是隐匿攻击者的身份。

来自互联网

21. There has been a range of speculation about the nature of the threat posed by the botnet, from a wake-up call to a devastating attack.
关于僵尸网络构成的威胁有着广泛的投机,从唤醒命令直至破坏性的攻击。

来自互联网

22. Last week, investigators quickly located computers that were involved with the control of the botnet in Britain and several other countries.
上周,调查人员很快在英国和其他国家定位了控制僵尸网络的部分计算机。

来自互联网

23. Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.
克拉克和他的同事正在研究云服务是如何用于构建僵尸网络的。僵尸网络是由网络攻击者控制的受感染计算机网络。

来自互联网

24. In 2008 researchers from the University of California at Berkeley and San Diego posed as spammers, infiltrated a botnet and measured its success rate.
2008年加州大学伯克利分校和圣迭戈分校的研究者假装成垃圾邮件制造者,潜伏进一个僵尸网络病并测量了它成功的比例。

来自互联网

25. The important thing about the attacks coming from the U.S. is that a lot of American's computers are infected with malware, thus part of some botnet.
因此,攻击活动源于美国的重要原因是许多美国人的电脑感染了恶意病毒,并因此成为了僵尸网络的一部分。

来自互联网

26. It now has the power to lash together those infected computers into a vast supercomputer called a botnet that can be controlled clandestinely by its creators.
它现在有能力将受感染的计算机变成一个巨大的超级计算机,即所谓的僵尸网络,并可由病毒创作者秘密控制。

来自互联网

27. Having a botnet at your fingertips will cost you $225, and a tool that exploits a vulnerability on a banking site averages $740 and runs as high as $3, 000.
控制一个“僵尸网络”需要225美元,而利用银行网站漏洞进行攻击的工具平均需要740美元,最高可至3000美元。

来自互联网

28. The Anon Ops website was taken down suddenly despite having upgraded to what PandaLabs describe as a ‘bullet-proof server’ designed to resist botnet attacks.
尽管AnonOps网站已经升级了设计用来抵御僵尸攻击并被PandaLabs形容为“防弹服务器”的系统,但是仍然被迫宕机。

来自互联网

29. The Anon Ops website was taken down suddenly despite having upgraded to what PandaLabs describe as a ‘bullet-proof server’ designed to resist botnet attacks.
尽管AnonOps网站已经升级了设计用来抵御僵尸攻击并被PandaLabs形容为“防弹服务器”的系统,但是仍然被迫宕机。

来自互联网