Top 5 World’s Most Difficult Programming Languages

Image
1.Malbolge Malbolge is one of the toughest programming languages. As a matter of fact, after its arrival, it took 2 years for writing first Malbolge program, just imagine now how difficult it is? It is said to be that the author of Malbolge programming language has never written a single program. It is public domain esoteric programming language created by Ben Olmsted in 1998. Hello world program in Malbolge (=<`#9]~6ZY32Vx/4Rs+0No-&Jk)”Fh}|Bcy?`=*z]Kw%oG4UUS0/@-ejc(:’8dc 2.Cow programming language Cow programming language is released sometime in early 2013. It was designed with the bovine in the mind. Cows posses limited vocabulary skills, so the developers inherit the words known by them. The instructions language consists different variations of ‘moo’ that is, moO, MoO, mOo, mOO, Moo, and so on. It is a case-sensitive language and the other words & symbols in between the instructions of the language are ignored. Hello world program in Cow prog...

WHAT IS A BOTNET? How to Detect and Prevent it ?

A botnet is a network of computers that are compromised and are under the control of an attacker. Every individual device in a botnet is called as a bot. A bot is usually formed when a computer is infected with malware. This malware allows the crooks to control the computer remotely without the knowledge of the owner of the computer. The attackers who control these botnets are referred to as “bot masters” or “bot herders” .
Attackers generally use botnets for a lot of purposes, most of them being criminal. The most common applications for botnets include denial-of-service attacks, email spam campaigns, data theft and spreading adware/spyware. A botnet attack starts with a bot recruitment. Bot masters usually recruit these bots by spreading worms, botnet viruses, or other malware. It is also possible to use web browser hacking and infect computers which contain a bot malware. Once a computer is infected with a botnet virus, it will connect to the bot master’s command and control (C&C) server. From there the attacker is capable of communicating and controlling the bot. When the botnet reaches the desired size, the herder can exploit the botnet and carry out attacks (overloading servers, stealing information, sending spam, click fraud, etc).

Example: Zeus Botnets

Zeus is a Trojan horse for Windows that was created to steal bank information using botnets. First discovered in 2007, Zeus spread through email, downloads, and online messaging to users across the globe. Zeus botnets used millions of zombie computers to execute keystroke logging and form grabbing attacks that targeted bank data, account logins, and private user data. The information gathered by Zeus botnets has been used in thousands of cases of online identity theft, credit card theft, and more.
In October 2010, the FBI disclosed that it had detected an international cyber crime ring that had used Zeus botnets to steal over $70 million dollars from bank accounts in the United States. This spurred an FBI crackdown on the Zeus Trojan and Zeus botnets that led to the arrest of over 100 cyber-criminals.
In March 2012, Microsoft announced that they had taken over and shut down most of the control-and-command servers that were being used by Zeus botnets. According to Microsoft, all but three C&C domains had been taken down in the effort (formally referred to as Operation b71). While Microsoft wasn’t able to eliminate every C&C server, their efforts are expected to slow or stop many of the cyber-criminals that were using Zeus botnets.



How Botnets can impact you

Often, the cybercriminal will seek to infect and control thousands, tens of thousands, or even millions of computers – so that the cybercriminal can act as the master of a large ‘zombie network’ – or ‘bot-network’ – that is capable of delivering a Distributed Denial of Service (DDoS) attack, a large-scale spam campaign, or other types of cyberattack.
In some cases, cybercriminals will establish a large network of zombie machines and then sell access to the zombie network to other criminals – either on a rental basis or as an outright sale. Spammers may rent or buy a network in order to operate a large-scale spam campaign

Botnet Detection and Prevention

Botnet detection can be difficult, as bots are designed to operate without users’ knowledge. However, there are some common signs that a computer may be infected with a botnet virus (listed below). While these symptoms are often indicative of bot infections, some can also be symptoms of malware infections or network issues and should not be taken as a sure sign that a computer is infected with a bot.
  • IRC traffic (botnets and bot masters use IRC for communications)
  • Connection attempts with known C&C servers
  • Multiple machines on a network making identical DNS requests
  • High outgoing SMTP traffic (as a result of sending spam)
  • Unexpected popups (as a result of clickfraud activity)
  • Slow computing/high CPU usage
  • Spikes in traffic, especially Port 6667 (used for IRC), Port 25 (used in email spamming), and Port 1080 (used by proxy servers)
  • Outbound messages (email, social media, instant messages, etc) that weren’t sent by the user
  • Problems with Internet access
There are several measures that users can take to prevent botnet virus infection. Since bot infections usually spread via malware, many of these measures actually focus on preventing malware infections. Recommended practices for botnet prevention include:
  • Network baselining: Network performance and activity should be monitored so that irregular network behavior is apparent.
  • Software patches: All software should be kept up-to-date with security patches.
  • Vigilance: Users should be trained to refrain from activity that puts them at risk of bot infections or other malware. This includes opening emails or messages, downloading attachments, or clicking links from untrusted or unfamiliar sources.
  • Anti-Botnet tools: Anti-botnet tools provide botnet detection to augment preventative efforts by finding and blocking bot viruses before infection occurs. Most programs also offer features such as scanning for bot infections and botnet removal as well. Firewalls and antivirus software typically include basic tools for botnet detection, prevention, and removal. Tools like Network Intrusion Detection Systems (NIDS), rootkit detection packages, network sniffers, and specialized anti-bot programs can be used to provide more sophisticated botnet detection/prevention/removal

Botnet Removal

Botnet detection is useless without having botnet removal capabilities. Once a bot has been detected on a computer it should be removed as quickly as possible using security software with botnet removal functionality. Once the process of botnet removal is complete, it is important to remain proactive in botnet detection and prevention efforts.
Botnet removal can go beyond simply removing a bot virus from an infected machine. On a larger scale, botnet removal often requires shutting down the C&C server that is used to control the botnet. This is typically done when an organization is looking to shut down an entire botnet rather than treat bot infections. Microsoft’s campaign against the Zeus botnet is a good example of large-scale botnet removal.





Comments

Popular posts from this blog

How to Delete the Windows.old folder in Windows 7/8/10

6 Private Search Engines That Do Not Track You

Top 5 World’s Most Difficult Programming Languages