User:Kopaka649/Bot Armies of Destruction

Distributed Computig (better title)

edit

Criminals are hijacking consumers’ PCs by the thousands each day. You may already be paying the price.

Why Destroy it When you can Use It?

The computer population has spiked in recent years, now surpassing the number of human beings (citation?). More and more individuals are realizing the benefits of a personal PC. Without internet, the experience is not complete, so naturally, people connect to the ever growing world wide web. In fact, 45% of American computers are hooked up to a high speed network (citation!!! don't give information without sources). You get the picture. The world is bulging with computer resources, most of which is unused, gone to waste. There already exist voluntary resource sharing networks, which contribute a computer’s unused processing power to global projects such as medical research or a decoding of signals from SETI. Criminals see this as an opportunity to carry out their attacks at a much more rapid pace; tasks that are much more effectively executed as a team than as one. Password cracking, data mining, mass mailing, DDoSing are common dark burdens these There is also the incentive of masking the mastermind’s identity with numerous civilian IPs. All this doesn’t come easy. Following is an explanation on how criminals amass and make use of a giant bot army.

Gathering Members

In a dark musty room, balmy by the buzz of multiple high end computers, a fraudulent cybercriminal sits perched in front of 3 flat panel displays. It was a week from the big attack, time to gather members. His mischievous mind ponders the ammunition used to DDoS the