{"id":1773,"date":"2011-05-07T08:26:27","date_gmt":"2011-05-07T12:26:27","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=1773"},"modified":"2011-05-07T08:26:27","modified_gmt":"2011-05-07T12:26:27","slug":"what-is-a-botnet","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/what-is-a-botnet\/","title":{"rendered":"What is a botnet?"},"content":{"rendered":"<p><em>&#8220;The term bot is short for robot. Criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie). When this occurs, your computer can perform automated tasks over the Internet, without you knowing it.<\/em><\/p>\n<p><em>Criminals typically use bots to infect large numbers of computers. These computers form a network, or a botnet.<\/p>\n<p>Criminals use botnets to send out spam e-mail messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud. If your computer becomes a part of a botnet, your computer might slow down and you might be inadvertently helping criminals.&#8221;<\/em><\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/protect\/terms\/botnet.aspx\">Source: Microsoft&#8217;s &#8220;What is a botnet?&#8221;<\/a><\/p>\n<p>We couldn&#8217;t have explained it better. Botnets are just one of the many good reasons to keep your antivirus and antispyware up-to-date; and why you should never click on links in emails from people you don&#8217;t know. Don&#8217;t open attachments in emails unless you&#8217;re positive you know who those emails came from &#8212; and you were expecting an attachment. If you follow those suggestions, your computer will never be part of a botnet. If you don&#8217;t? Can you spell Z O M B I E?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The term bot is short for robot. Criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie). When this occurs, your computer can perform automated tasks over the Internet, without you knowing it. Criminals typically use bots to infect large numbers of computers. These computers form a\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/what-is-a-botnet\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[1129,138,14,90,1010],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1773"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=1773"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1773\/revisions"}],"predecessor-version":[{"id":1775,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1773\/revisions\/1775"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=1773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=1773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=1773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}