If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Computing)   Cops smash 100,000-node botnet   (computing.co.uk) divider line 94
    More: Spiffy  
•       •       •

29219 clicks; posted to Main » on 10 Oct 2005 at 4:03 PM (8 years ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



94 Comments   (+0 »)
   

Archived thread

First | « | 1 | 2 | » | Last | Show all
 
2005-10-10 09:59:01 AM
Off with their heads!
 
DAR
2005-10-10 11:05:40 AM
labman: Off with their heads!

Nope, just their hands so they can't type anymore.
 
2005-10-10 12:26:04 PM


(Gotta love the graphic that comes with the article.)

----------------------

This is a battle that has long been lost, at least at the home user level.

Most people simply aren't going to bother with patching their software, setting up antivirus/firewall apps, or not clicking on the link to download that nifty screen saver.

It's damn creepy how organized crime has gotten in on this, but after thinking about it for a while it seems obvious.

The only effective way to fight the problem now is at the ISP/router level.

Setting up malware traffic filtering would be a massive and expensive PITA, so it isn't going to get done until the ISPs are forced to-- either by the government or as a result of getting swamped by malware traffic.

Speaking of that, I wonder what percentage of all the bits cruising the internet today is being generated by malware?

Will the problem explode in scale until a large majority of all internet traffic is generated by zombified machines, kind of like the email spam situation?

If so, it won't be the end of the internet, but it will be damn annoying.

Oh, well. Going with the biology analogy, we would all probably be much stronger and live longer if our bodies didn't have to devote so much effort to the immune system.
 
2005-10-10 03:55:18 PM
Riche: The only effective way to fight the problem now is at the ISP/router level.

I suppose making an OS that isn't susceptible to malware is out of the question? Forcing ISP's to decide what's good or bad as it flows through their router is a bad idea. Do you really want some geek 2000 miles away deciding what traffic should and should not get to your computer?

Micro$haft could solve the problem single-handed by:

1.) Limit default user rights and require users to enter in an admin password before installing any new software. Linux has done this for years and is much less susceptible.
2.) Eliminate buffer overflows from code. Microsoft is actually working on this and has made great strides.
3.) Include a real firewall with their product that allows for blocking incoming and outgoing packets.
4.) Sandboxes new applications so that they can be removed with minimal effort.

Making ISP's responsible for Malware blocking is like making phone companies responsible for foul language over their circuits.
 
2005-10-10 04:05:41 PM
I was just kidding before but holy crap, this really is Slashdot, isn't it?!
 
2005-10-10 04:05:57 PM
wow, after reading a news story with the headline "Cops smash 100,000-node botnet" it kinda makes me think, like, holy crap. It's the future already.
 
2005-10-10 04:06:06 PM
I only understand the words "cops smash".

Is "100,000 node botnet" a euphamism for "64 year old black man?"
 
2005-10-10 04:07:52 PM
I'm w/ cyberlost

you people and your wacky make believe languages.
 
2005-10-10 04:08:22 PM
cyberlost

I only understand the words "cops smash".

Is "100,000 node botnet" a euphamism for "64 year old black man?"


Er...yes. Yes it is. Go back to sleep.

Mr. Johnny Mnemonic, paging Mr. Johnny Mnemonic, please pick up the secured analog courtesy phone.
 
2005-10-10 04:09:41 PM
Ouch...I'm glad I'm not those phuckheads...
 
2005-10-10 04:10:21 PM
I was expecting to read about Japanese police smashing a net made of 100,000 robots. They probably have those things in Japan but haven't told the world yet.
 
2005-10-10 04:10:25 PM
A lot of Malware is easily installed thanks to ActiveX. Maybe the default settings on IE are more secure now, but on my XP machine the default ActiveX settings were wide open. Simply visiting a webpage could allow viruses and other malware to be installed directly onto my machine. Thanks ActiveX!
Tightening up those settings in IE stopped that stuff, at least. Using Firefox most of the time and blocking ALL popups in IE took care of most of the rest of the spyware crap.
 
2005-10-10 04:11:02 PM
I read the headline as "Cops Smash 100,000 Nude Buttnet"


hehehehe
 
2005-10-10 04:11:19 PM
Unsilent Majority: you people and your wacky make believe languages.

Its fun though..I get to utter the phrase ackle (ACL or access control list) all day long. It's a fun word!

/ackle ackle ackle
 
2005-10-10 04:11:19 PM
It's all Geek to me...
 
2005-10-10 04:11:35 PM
"When reached for comment, Node 317a replied in usual pithy tones, '1101110011101100011010110110101.'"
 
2005-10-10 04:12:09 PM
2.) Eliminate buffer overflows from code.

The buffer overflow is an problem resulting from the Intel architecture. Anything MS or the Linux community does to avaiod buffer overflows is really just a hack to fix a problem that has a legacy in the 8086 microprocessor.
 
2005-10-10 04:12:23 PM
The suspects will be charged with computer hacking, destructing automated networks, and installing adware and spyware.

Who knew that was illegal? I do it by accident all the time.


CURSE YOU, BONZAI BUDDY!!!
 
2005-10-10 04:13:17 PM
So what do you kids use to eliminate spyware these days?
 
2005-10-10 04:17:00 PM
Find Sarah Connor?
 
2005-10-10 04:17:16 PM
If anyone cares, that is the "graveyard zombie" that attacks and kills Barbara's brother Johnny in
Night of the Living Dead (the 1990 version)
 
2005-10-10 04:19:06 PM
cyberlost: So what do you kids use to eliminate spyware these days?

I like to use a blowtorch and a big ass hammer.

/Sorry, still stuck in Ad-adaware-land.
 
2005-10-10 04:19:50 PM
Or Ad-adad-aware-adad.
 
2005-10-10 04:19:58 PM
Thank you, braedan, that was actually bugging me.

/needs a life
//verra, verra badly
///slashy slashy
 
2005-10-10 04:20:17 PM
Muta: The buffer overflow is an problem resulting from the Intel architecture. Anything MS or the Linux community does to avaiod buffer overflows is really just a hack to fix a problem that has a legacy in the 8086 microprocessor.

Not true. You can have a buffer overflow on other processor architectures, such as the SPARC, PowerPC, Motorola 68000 series, and any other machine that has a stack. Consider the following code:
char s[20];
strcpy(s, "A long, rambling, boring rant of more than 20 characters will surely overflow the space I've allotted on the stack for this string.");

This will cause a buffer overflow on any processor. If the string happens to be allocated on the same stack that the function call returns from, the results could be bad -- the function won't know where to return. If the string is allocated in a different area of memory from the stack, then the function call return will be safe, but something else in memory will be corrupted.
 
2005-10-10 04:20:25 PM
cyberlost: So what do you kids use to eliminate spyware these days?


I really like spybot S&D. some prefer ad-aware. both are quality products. you can run both if you want to catch just about anything.
/AVG for the bestest free antivirus software.
 
2005-10-10 04:20:49 PM
>> cyberlost: So what do you kids use to eliminate spyware these days?

Mac OSX ;) Yeah yeah yeah; but I have not had a single virus or malware infection since switching. Once OSX becomes dominant that all may change...
 
2005-10-10 04:23:02 PM
Mmmmmmmm, butter overflow...

 
2005-10-10 04:24:16 PM
hoade:

You act as if OSX actually WILL become dominant, hah!

I'm just joking of course..I do hope people begin to consider alternatives to Windows such as OSX and *nix
 
2005-10-10 04:25:44 PM
queezyweezel: AVG for the bestest free antivirus software.

I recently had an experience that indicated otherwise...

I'm using Avast now (which is much less visually bloaty than I remember).
 
2005-10-10 04:26:29 PM
Peel their skin off and drip habanero juice all over them!
 
2005-10-10 04:27:24 PM
They could have just went for the source and shut AOL down...
 
2005-10-10 04:27:40 PM
hoade
Once OSX becomes dominant that all may change...

The desperate dreams of Mac users make every Halloween special to me.

/off in search of other depressingly futile things
//like getting a date
///Woe are us.
////Slasher flick
 
2005-10-10 04:28:07 PM
and a sports car during searches of the suspects' homes.

OK, what role did the sports car play in the hacking?
 
2005-10-10 04:28:43 PM
elkman true. Buffer overflows resulting in the ability to execute arbitraty code was resolved years ago on the VAX. The problem with the intel architecture is that if code is readable on the stack, it is executible. When there is an overflow, any malicious code can run. On the VAX, the stack includes an executible flag that way if there is a buffer overflow the program just craps out, it doesn't open the system to any arbitrary code that may want to run on that system.
 
2005-10-10 04:30:35 PM
scooby111
I suppose making an OS that isn't susceptible to malware is out of the question?

Fixed.
 
2005-10-10 04:33:00 PM
nemoxnine: I recently had an experience that indicated otherwise...

I'm using Avast now (which is much less visually bloaty than I remember).



Just curious, what happened?

/Avast is good stuff too.
 
2005-10-10 04:37:30 PM
ClamWin isn't bad for anti-virus, either.
 
2005-10-10 04:38:44 PM
nemoxnine: I'm using Avast now (which is much less visually bloaty than I remember).

Arrrrr, ya haven't seen bloaty until ye've seen a scurvy dog that's washed onta shore after he's been made ta walk the plank.
 
2005-10-10 04:39:20 PM
Quote from the article:

"It is also suspected that the group was involved in crafting internet worms with keystroke logging software to gather login names to commit credit card fraud and identity theft"

.....WTF?

I've a sneaking suspicion that the author of said article has no idea what they're talking about, and just wrote this to make it sound 'cool'
 
2005-10-10 04:40:53 PM
Nevermind, reread it...it makes sense, but needs to be rewritten as, for instance, "The group was involved in crafting internet worms that used keystroke logging software to gather [ not login names, but CC#s ] to commit....etc."

Author still is clueless.
 
2005-10-10 04:44:36 PM
Nightsweat: I was just kidding before but holy crap, this really is Slashdot, isn't it?!

Slashdot with boobies links, don't forget :)

/I read Fark for the pictures, /. got boring
///.?
 
2005-10-10 04:44:57 PM
I love it when Linux guys coimplain about Microsoft and then spend 20 mins trying to open that pesky Visio document in Open Office that still doesn't work 100%...

/waiting for user friendly version of KDE or Gnome before I go fulltime Linux...
 
2005-10-10 04:48:08 PM
muninsfire:

If you have the login name/password, to a persons banking site. You can get all sorts of information with which to commit credit card fraud.
 
2005-10-10 04:48:10 PM
muninsfire
Nevermind, reread it...it makes sense, but needs to be rewritten as, for instance, "The group was involved in crafting internet worms that used keystroke logging software to gather [ not login names, but CC#s ] to commit....etc."

Author still is clueless.


Not necessarily... If you gather the username and passwords to peoples online banking accounts, you could rob them of every penny without having to know their CC numbers.
(Presuming they weren't as skint as I am!)
If you have their login ID & Password you could probably get a new card issued, change their address, stitch them up like a kipper.
I know I wouldn't want to have my login details keylogged, thank you!
 
2005-10-10 04:50:59 PM
lordargent:

I think the car was seized as an asset obtained through criminal activity.
 
2005-10-10 04:51:43 PM
2.) Eliminate buffer overflows from code. Microsoft is actually working on this and has made great strides.

Great. We can give them a "Most Improved" award.
 
2005-10-10 04:52:24 PM
I really think that the penalty for this sort of crime should be death. Just like that Russian spammer...
 
2005-10-10 04:53:29 PM
2005-10-10 03:55:18 PM scooby111 [TotalFark]

Riche: The only effective way to fight the problem now is at the ISP/router level.

I suppose making an OS that isn't susceptible to malware is out of the question? Forcing ISP's to decide what's good or bad as it flows through their router is a bad idea. Do you really want some geek 2000 miles away deciding what traffic should and should not get to your computer?


Sbc/Yahoo! DSL already do this. A buddy of mine had a Windows box get infected and they shut down his DSL until he scrubbed his box. Or cleaned up his computer, whatever you prefer.
 
2005-10-10 04:57:03 PM
Was that hot European chick on the stop-sign.com commercials involved?
 
Displayed 50 of 94 comments

First | « | 1 | 2 | » | Last | Show all



This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »






Report