Talk:Zombie (computing)
This is the talk page for discussing improvements to the Zombie (computing) article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
This level-5 vital article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||
|
Link addition
[edit]Anyone else skeptical of the "Killing Zombies Made Easy" link? At best it's a sales pitch; at worst, it might be a dangerous program...
This material was added to The Zombies article innapropriately. Use what you can:
- Distributed Denial of Service Attacks (DDoS)
- An attacker can load an attack progran onto dozens or even hunderds of computer system that DSL or cable modems. This attack program will lay dormant on these computer until they get an attack signal form a master computer. This master controller may be another unsuspecting user. The system taking direction from the master control computer are referred to as Zombies
- Thanks - Taxman 19:49, Sep 23, 2004 (UTC)
- An
attackeroutside agent/agent outside your control can load an illicit progran onto dozens or even hunuhrdz of computer system that DSL or cable modems. - "That illicit program will lay dormant/[TerminateStayResident|Terminate and Stay Resident (TSR)] on the proximate system until some future time, e.g. when they get an attack signal from an externally controlled master computer.
- An externally controlled device may be another unsuspecting user. The ultimate control is distal (i.e. not within your easy connection or within your knowledge), and not local (proximal).
- --BenTremblay (talk) 06:26, 10 February 2008 (UTC)
- An
Merged text follows:
A computer zombie is a PC running a computer virus which sends out illicit advertising.
- "According to the FTC, spammers use secret software that allows them to hijack personal computers and office PCs, and route spam through them. By routing their e-mails through zombie computers, the spammers are able to hide their true origin from consumers and make it more difficult for law enforcement to arrest them. The zombies do not destroy PC hard drives, but they do tap into bandwidth." [1]
Link
[edit]- The Web: Attack of the computer zombies - Gene J. Koprowski, UNITED PRESS INTERNATIONAL
Steve Gibson
[edit]- As a master of self-promotion, and probably inclined to invent things out of thin air, I ask you to remove his mention in this article. Thanks. —Preceding unsigned comment added by 189.13.93.97 (talk • contribs)
- I don't necessarily disagree with your opinion of Gibson, but the Wiki NPOV policy seems to prohibit removing him just for that. The fact remains, that the attack on his site is an excellent illustration of this phenom. I say he stays, but will reread it and see if there's some kind bias indicated in the text. P.S. Suggestion: please sign your comments with ~~~~, okay? ;) --David Spalding Talk, Contribs 20:39, 18 November 2006 (UTC)
"For those of you who don't speak Technicalese..."
[edit]The user who wrote the "user-friendly" paragraphs added this, which ought to go on the talk page and not the article:
Also, I know that someone is going to edit this because it's not very technical, but please leave a some kind of simplified version so that normal people can understand it. My computer at work was just compromised in this way and I couldn't find much help on this subject at all. Please bear in mind that I am very computer-literate, and my husband is a network administrator. So if it's not simple enough for me, then millions of people are not going to understand what's written above what I've written. —Preceding unsigned comment added by 128.139.226.37 (talk) 08:33, 6 November 2007 (UTC)
zombie==windows???
[edit]This sentence:
In order to become infected, these computers need to be running the Microsoft Windows operating system. Other operating systems are not affected.
I think it should be removed (or substituted with a more NPOV one, althought also i think that's easier to zombify a windows system than others)...
I also see that a similar issue happened in this article...
If the problem is the verifiability i think that articles like this should prove that linux-zombie exists (to me it's obvious, since linux-rootkits exists)...
I myself won't modify the article since:
1-I've never modified an article nor readed carefully wikipedia's FAQ until now
2-I'd prefer create an account before that
3-English isn't my motherlanguage... actually dunno if it's so evident...
87.4.79.76 (talk) 17:55, 9 February 2008 (UTC)
First example of a zombie computer?
[edit]In the episode 'Traitor' of Blakes Seven (which can be found here [ http://www.hermit.org/blakes7/Episodes/scripts/Traitor.html]) the section begining 'Communications HQ - The terminal screen comes to life. The Tracer is watching it'. Jackiespeel (talk) 15:41, 23 August 2012 (UTC)
Missing information about how zombies work
[edit]It should be mentioned somewhere in the History section that the main reason zombies avoid detection is that the zombie virus does not change what a computer it infects does and only affects the messages that computer sends out making the owner unaware of the zombie virus in their own computer, thus preventing them from reporting the virus. Blackbombchu (talk) 20:22, 10 November 2013 (UTC)
Disambiguation?
[edit]Another (and older) meaning in computer science is a process that has terminated but is still hanging around because it holds deadlocked resources, or owns resources held by another component (like a driver) that's deadlocked or otherwise hung.
In UNIX a zombie process can also be created if the init process has died, because init is responsible for the final cleanup of orphan processes. -- Resuna (talk) 13:36, 30 July 2015 (UTC)
zombie computers
[edit]let's talk seriously i am part of the hacking world i'm on a trojan horse type zombie botnet whatever you want to call it computer right now! there's not much more i can say about it except the fact that i've read all about these things i've seen pictures of them on youtube and google and what else would these things be don't worry i know all about them i know how they operate it's just too bad the police can't spot these things they're cleverly disguised! sometimes i wonder what it would be like to be the botmaster here! instead of always on this end in front of the machine typing and reading i'm so used to it i find it rather funny you know? it's like i've been especially designed to babysit these machines now because i can. oh well such is life eh? thank you for listening, don50.67.165.106 (talk) 20:14, 24 September 2015 (UTC).
External links modified
[edit]Hello fellow Wikipedians,
I have just modified 2 external links on Zombie (computer science). Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive http://web.archive.org/web/20061230152432/http://www.vnunet.com:80/vnunet/news/2144375/botnet-operation-ruled-million to http://www.vnunet.com/vnunet/news/2144375/botnet-operation-ruled-million
- Added archive http://web.archive.org/web/20091024033302/http://www.blackberrycool.com:80/2009/07/16/smobile-systems-release-solution-for-etisalat-blackberry-spyware/ to http://www.blackberrycool.com/2009/07/16/smobile-systems-release-solution-for-etisalat-blackberry-spyware/
When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}
).
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 23:47, 20 July 2016 (UTC)
Should have article on Compromised Systems
[edit]There should be an article on Compromised Systems, with Zombie being a specific sub-class of said. Don't have time at the moment to make even a stub, so putting the suggestion out in case somebody wants to run with it. 172.58.46.253 (talk) 07:39, 23 June 2019 (UTC)
- Start-Class level-5 vital articles
- Wikipedia level-5 vital articles in Technology
- Start-Class vital articles in Technology
- Start-Class Technology articles
- WikiProject Technology articles
- Start-Class Computing articles
- Mid-importance Computing articles
- Start-Class Computer Security articles
- Unknown-importance Computer Security articles
- Start-Class Computer Security articles of Unknown-importance
- All Computer Security articles
- All Computing articles
- Start-Class Internet articles
- Mid-importance Internet articles
- WikiProject Internet articles