Results 1 to 6 of 6

Thread: What are zombies

  1. #1
    Join Date
    May 2009
    Posts
    760

    What are zombies

    How a computer hacked. I had heard about zombies that are like dead PC which spread viruses. Does this type of system lies always active on internet. I need some details about it. What are the terms that make a password more complex. That means it cannot be hacked. And what is most common password hack issue on internet.

  2. #2
    Join Date
    May 2008
    Posts
    2,945

    Re: What are zombies

    The complication of the password must be more complex than the data it protects are important. It is better to change your passwords regularly sensitive. This rule in effect ensure you maximum security. Sometimes find it one day (and he does not want to change it himself), he will have only temporary access to your data.

  3. #3
    Join Date
    Feb 2008
    Posts
    2,635

    Re: What are zombies

    You must be at ease by typing in your password if you hesitate, you put the time between each keystroke, or you need to recover several times due to input errors, malicious neighbors can do all the more easily try to guess. If you doubt the complication of a password, it is easy to test: there are tools online to nothing the complication of a password.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,424

    Re: What are zombies

    A zombie is a PC almost certainly poorly secluded and which has been infected by a virus or worm. This program allows a malevolent hacker to take remote control of the PC and use it to send mail, attack other machines, etc. An attacker can trigger a DOS attack if it has control of a large number of zombie machines.

  5. #5
    Join Date
    May 2008
    Posts
    3,516

    Re: What are zombies

    The raw force hacking is to go there in the most basic and most brutal manner on a form of identification. The principle is to locate a login, preferably with elevated privileges on the target system and try all possible passwords. So if your system is has less privileges then you are prone to attack.

  6. #6
    Join Date
    Apr 2008
    Posts
    3,339

    Re: What are zombies

    There are mainly two methods. The first is based on a dictionary of passwords more frequently while the second pass through all possible combination. This attack can come from one or more machines attacking. You can protect yourself, by counting the number of failed login attempts. Reached a predefined , the account is disabled. If the owner wants to reactivate it passes through a reactivation process with email confirmation.

Similar Threads

  1. Download Plants Vs Zombies 2
    By Tia Mowry in forum Video Games
    Replies: 4
    Last Post: 08-08-2013, 10:50 AM
  2. All Zombies Must Die on Steam
    By Sib Bachchan in forum Video Games
    Replies: 3
    Last Post: 25-03-2012, 06:50 PM
  3. No Zombies in A Valley Without Wind
    By Kuram in forum Video Games
    Replies: 5
    Last Post: 05-11-2011, 11:47 AM
  4. Replies: 8
    Last Post: 08-09-2011, 11:40 PM
  5. Plants vs. Zombies Game for PC and Mac
    By ball4ever in forum Video Games
    Replies: 2
    Last Post: 06-05-2009, 01:42 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,283,055.64934 seconds with 16 queries