Talk:Zombie (computer science)

From Wikipedia, the free encyclopedia
Jump to: navigation, search
          This article is of interest to the following WikiProjects:
WikiProject Technology (Rated Start-class)
WikiProject icon This article is within the scope of WikiProject Technology, a collaborative effort to improve the coverage of technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 
WikiProject Computing (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
 
WikiProject Internet (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
 

Link addition[edit]

Anyone else skeptical of the "Killing Zombies Made Easy" link? At best it's a sales pitch; at worst, it might be a dangerous program...


This material was added to The Zombies article innapropriately. Use what you can:

Distributed Denial of Service Attacks (DDoS)
An attacker can load an attack progran onto dozens or even hunderds of computer system that DSL or cable modems. This attack program will lay dormant on these computer until they get an attack signal form a master computer. This master controller may be another unsuspecting user. The system taking direction from the master control computer are referred to as Zombies
Thanks - Taxman 19:49, Sep 23, 2004 (UTC)
An attacker outside agent/agent outside your control can load an illicit progran onto dozens or even hunuhrdz of computer system that DSL or cable modems.
"That illicit program will lay dormant/[TerminateStayResident|Terminate and Stay Resident (TSR)] on the proximate system until some future time, e.g. when they get an attack signal from an externally controlled master computer.
An externally controlled device may be another unsuspecting user. The ultimate control is distal (i.e. not within your easy connection or within your knowledge), and not local (proximal).
--BenTremblay (talk) 06:26, 10 February 2008 (UTC)

Merged text follows:


A computer zombie is a PC running a computer virus which sends out illicit advertising.

"According to the FTC, spammers use secret software that allows them to hijack personal computers and office PCs, and route spam through them. By routing their e-mails through zombie computers, the spammers are able to hide their true origin from consumers and make it more difficult for law enforcement to arrest them. The zombies do not destroy PC hard drives, but they do tap into bandwidth." [1]

Link[edit]


Steve Gibson[edit]

As a master of self-promotion, and probably inclined to invent things out of thin air, I ask you to remove his mention in this article. Thanks. —Preceding unsigned comment added by 189.13.93.97 (talkcontribs)
I don't necessarily disagree with your opinion of Gibson, but the Wiki NPOV policy seems to prohibit removing him just for that. The fact remains, that the attack on his site is an excellent illustration of this phenom. I say he stays, but will reread it and see if there's some kind bias indicated in the text. P.S. Suggestion: please sign your comments with ~~~~, okay? ;) --David Spalding TalkContribs 20:39, 18 November 2006 (UTC)

"For those of you who don't speak Technicalese..."[edit]

The user who wrote the "user-friendly" paragraphs added this, which ought to go on the talk page and not the article:

Also, I know that someone is going to edit this because it's not very technical, but please leave a some kind of simplified version so that normal people can understand it. My computer at work was just compromised in this way and I couldn't find much help on this subject at all. Please bear in mind that I am very computer-literate, and my husband is a network administrator. So if it's not simple enough for me, then millions of people are not going to understand what's written above what I've written. —Preceding unsigned comment added by 128.139.226.37 (talk) 08:33, 6 November 2007 (UTC)

zombie==windows???[edit]

This sentence:

In order to become infected, these computers need to be running the Microsoft Windows operating system. Other operating systems are not affected.

I think it should be removed (or substituted with a more NPOV one, althought also i think that's easier to zombify a windows system than others)...

I also see that a similar issue happened in this article...

If the problem is the verifiability i think that articles like this should prove that linux-zombie exists (to me it's obvious, since linux-rootkits exists)...

I myself won't modify the article since:

1-I've never modified an article nor readed carefully wikipedia's FAQ until now

2-I'd prefer create an account before that

3-English isn't my motherlanguage... actually dunno if it's so evident...

87.4.79.76 (talk) 17:55, 9 February 2008 (UTC)

First example of a zombie computer?[edit]

In the episode 'Traitor' of Blakes Seven (which can be found here [ http://www.hermit.org/blakes7/Episodes/scripts/Traitor.html]) the section begining 'Communications HQ - The terminal screen comes to life. The Tracer is watching it'. Jackiespeel (talk) 15:41, 23 August 2012 (UTC)

Missing information about how zombies work[edit]

It should be mentioned somewhere in the History section that the main reason zombies avoid detection is that the zombie virus does not change what a computer it infects does and only affects the messages that computer sends out making the owner unaware of the zombie virus in their own computer, thus preventing them from reporting the virus. Blackbombchu (talk) 20:22, 10 November 2013 (UTC)