{"id":28,"date":"2006-10-30T11:51:01","date_gmt":"2006-10-30T15:51:01","guid":{"rendered":"http:\/\/cherrycoated.com\/wordpress\/?p=28"},"modified":"2009-06-26T12:57:34","modified_gmt":"2009-06-26T17:57:34","slug":"botnets","status":"publish","type":"post","link":"http:\/\/www.webliminal.com\/webliminalblog\/about-the-internet-and-the-web\/botnets","title":{"rendered":"Botnets"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" style=\"margin-left: 10px; margin-right: 10px;\" src=\"http:\/\/webliminal.com\/images\/sidepics\/cwdata\/sp43.jpg\" alt=\"\" hspace=\"10\" width=\"160\" height=\"106\" align=\"left\" \/> Ed Felten has yet another interesting post <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1079\">Why So Little Attention to Botnets?<\/a> in his blog <a href=\"http:\/\/www.freedom-to-tinker.com\/\">Freedom to Tinker<\/a>.<br \/>\nEd does a good job explaining what a botnet is:<\/p>\n<blockquote><p>&#8216;In this context, a \u00e2\u20ac\u0153bot\u00e2\u20ac\u009d is a malicious software agent that gets installed on an unsuspecting user\u00e2\u20ac\u2122s computer. Bots get onto computers by exploiting security flaws. Once there, they set up camp and wait unobtrusively for instructions. Bots work in groups, called \u00e2\u20ac\u0153botnets\u00e2\u20ac\u009d, in which many thousands of bots (hundreds of thousands, sometimes) all over the Net work together at the instruction of a remote badguy.&#8217;<\/p><\/blockquote>\n<p>The post includes a link to <a href=\"http:\/\/www.eweek.com\/article2\/0,1895,2029720,00.asp\">Is the Botnet Battle Already Lost?<\/a> by Ryan Naraine, that goes into more detail about what some people are doing to combat botnets.<\/p>\n<p>This past weekend the University of Mary Washington hosted the 22nd annual conference of the Consortium of Computing Sciences in Colleges. <a href=\"http:\/\/shari.pfleeger.com\/\">Shari Pfleeger<\/a> gave the keynote address,&#8221;Economics of Cyber Security.\u00e2\u20ac\u009d Her comments made me more sensitive to Felten&#8217;s statement<\/p>\n<blockquote><p>&#8220;Bots exploit the classic economic externality of network security. A well-designed bot on your computer tries to stay out of your way, only attacking other people. An infection on your computer causes harm to others but not to you, so you have little incentive to prevent the harm.&#8221;<\/p><\/blockquote>\n<p>&#8212;<br \/>\nToday&#8217;s special is<br \/>\n&#8221; It takes a mighty good man to be better than no man at all&#8221; &#8211; Dixie Carter<\/p>\n<p>2950<\/p>\n<p>Comment:<br \/>\nNice post on Felten.<\/p>\n<p>Did I already point you to the podcast that my co-worker did with him<br \/>\na couple months back?  (It&#8217;s a podcast I produce.):<\/p>\n<p><a href=\"http:\/\/www.cigital.com\/silverbullet\/show-005\/\">http:\/\/www.cigital.com\/silverbullet\/show-005\/<\/a><\/p>\n<p>&#8230; Ryan<br \/>\n&#8212;<br \/>\nRyan A. MacMichael (<a href=\"http:\/\/www.laze.net\">www.laze.net<\/a>)<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Ed Felten has yet another interesting post Why So Little Attention to Botnets? in his blog Freedom to Tinker. Ed does a good job explaining what a botnet is: &#8216;In this context, a \u00e2\u20ac\u0153bot\u00e2\u20ac\u009d is a malicious software agent that gets installed on an unsuspecting user\u00e2\u20ac\u2122s computer. Bots get onto computers by exploiting security flaws. [&hellip;]<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6,9],"tags":[],"class_list":["post-28","post","type-post","status-publish","format-standard","hentry","category-about-the-internet-and-the-web","category-commentary","category-interesting-web-sites"],"_links":{"self":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":1,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":1493,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/posts\/28\/revisions\/1493"}],"wp:attachment":[{"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/media?parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/categories?post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.webliminal.com\/webliminalblog\/wp-json\/wp\/v2\/tags?post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}