Talk:Zombie (computer science)
|This is the talk page for discussing improvements to the Zombie (computer science) article.|
|This article is of interest to the following WikiProjects:|
|Sources for development of this article may be located at|
Anyone else skeptical of the "Killing Zombies Made Easy" link? At best it's a sales pitch; at worst, it might be a dangerous program...
This material was added to The Zombies article innapropriately. Use what you can:
- Distributed Denial of Service Attacks (DDoS)
- An attacker can load an attack progran onto dozens or even hunderds of computer system that DSL or cable modems. This attack program will lay dormant on these computer until they get an attack signal form a master computer. This master controller may be another unsuspecting user. The system taking direction from the master control computer are referred to as Zombies
- Thanks - Taxman 19:49, Sep 23, 2004 (UTC)
attackeroutside agent/agent outside your control can load an illicit progran onto dozens or even hunuhrdz of computer system that DSL or cable modems.
- "That illicit program will lay dormant/[TerminateStayResident|Terminate and Stay Resident (TSR)] on the proximate system until some future time, e.g. when they get an attack signal from an externally controlled master computer.
- An externally controlled device may be another unsuspecting user. The ultimate control is distal (i.e. not within your easy connection or within your knowledge), and not local (proximal).
- --BenTremblay (talk) 06:26, 10 February 2008 (UTC)
Merged text follows:
- "According to the FTC, spammers use secret software that allows them to hijack personal computers and office PCs, and route spam through them. By routing their e-mails through zombie computers, the spammers are able to hide their true origin from consumers and make it more difficult for law enforcement to arrest them. The zombies do not destroy PC hard drives, but they do tap into bandwidth." 
- The Web: Attack of the computer zombies - Gene J. Koprowski, UNITED PRESS INTERNATIONAL
- I don't necessarily disagree with your opinion of Gibson, but the Wiki NPOV policy seems to prohibit removing him just for that. The fact remains, that the attack on his site is an excellent illustration of this phenom. I say he stays, but will reread it and see if there's some kind bias indicated in the text. P.S. Suggestion: please sign your comments with ~~~~, okay? ;) --David Spalding Talk, Contribs 20:39, 18 November 2006 (UTC)
"For those of you who don't speak Technicalese..."
The user who wrote the "user-friendly" paragraphs added this, which ought to go on the talk page and not the article:
Also, I know that someone is going to edit this because it's not very technical, but please leave a some kind of simplified version so that normal people can understand it. My computer at work was just compromised in this way and I couldn't find much help on this subject at all. Please bear in mind that I am very computer-literate, and my husband is a network administrator. So if it's not simple enough for me, then millions of people are not going to understand what's written above what I've written. —Preceding unsigned comment added by 126.96.36.199 (talk) 08:33, 6 November 2007 (UTC)
In order to become infected, these computers need to be running the Microsoft Windows operating system. Other operating systems are not affected.
I think it should be removed (or substituted with a more NPOV one, althought also i think that's easier to zombify a windows system than others)...
I also see that a similar issue happened in this article...
If the problem is the verifiability i think that articles like this should prove that linux-zombie exists (to me it's obvious, since linux-rootkits exists)...
I myself won't modify the article since:
1-I've never modified an article nor readed carefully wikipedia's FAQ until now
2-I'd prefer create an account before that
3-English isn't my motherlanguage... actually dunno if it's so evident...
First example of a zombie computer?
In the episode 'Traitor' of Blakes Seven (which can be found here [ http://www.hermit.org/blakes7/Episodes/scripts/Traitor.html]) the section begining 'Communications HQ - The terminal screen comes to life. The Tracer is watching it'. Jackiespeel (talk) 15:41, 23 August 2012 (UTC)
Missing information about how zombies work
It should be mentioned somewhere in the History section that the main reason zombies avoid detection is that the zombie virus does not change what a computer it infects does and only affects the messages that computer sends out making the owner unaware of the zombie virus in their own computer, thus preventing them from reporting the virus. Blackbombchu (talk) 20:22, 10 November 2013 (UTC)