Question:
My computer has somehow become part of a spam "BotNet". How do I get rid of this problem?
PsiKnight9
2008-04-05 02:49:09 UTC
Every time I connect to the internet spam emails get sent from my computer at a fast and furious rate. Non of the latest antivirus software helps.
How do I break this link with the remote computer using mine to send this spam?
Four answers:
anonymous
2008-04-05 02:57:57 UTC
Run both of these on-line scans. Both are free and excellent at detecting and removing malware free of charge. There is no need to un-install any of your current protections before using these.



1. Scan for virus, worms, dialers, etc. and remove (free online scan, no installed program) with BitDefender's Online Scanner. Press scan online on the left.

http://www.bitdefender.com/



2. Scan for trojans, adware, cookies, and spyware and remove (free online scan, no installed program) with Ewido Online Scanner ( now known as AVG Anti-Spyware). This is NOT the same as AVG Anti-Virus. Press "Scan your computer now online and clean it for free!" on the left.

http://www.ewido.net/en/



These scans will take quite a bit of time. The time is necessary to clean-up an infected computer.



Good luck.
anonymous
2016-04-06 02:51:44 UTC
As you say, guns are not the problem, crazy people are. There are laws out there prohibiting the sale of guns to people with a criminal background. There is a waiting period for this to be checked out. The constitution of the United States gives people the right to bear arms. To outlaw anyone owning a weapon infringes on this right. People who want to buy a firearm aren't given a mental stability test, and maybe they should be. Do you think all firearms should be turned in to the government? This would eliminate all hunting. No more deer, quail, geese, wild hog, dove, rabbit, etc. The shooter in VA was a permanent resident of this country, with no criminal background, therefore he was entitled to buy a firearm like any other citizen. The banning of firearm sales would not keep weapons out of the hands of criminals and crazys, only out of the hands of law abiding citizens.
uploadocs
2008-04-05 02:54:44 UTC
block those sending spams. Use AVG Internet Security and NoAdware v5.0.
funmansk
2008-04-05 02:58:35 UTC
BotNet

Lifecycle: Preventing, detecting and removing bots



The most effective means of guarding against botnets are preventing attackers from planting bots on your network and removing them once they're detected. Enterprises need to harden systems against botnet infiltration and restore compromised machines to trusted states to prevent further compromises.



Prevention

Harden end hosts. Make sure your servers, desktops and mobile machines have up-to-date patches; harden your TCP/IP stack (e.g., using syncookies and maximizing TCP queue handling capacity); eliminate unnecessary services; partition required services as much as possible; and make use of back door networks for things like file services and DNS to limit externally exposed points of attack.



Overprovision hosts and networks. Make sure your servers have more than enough RAM and the fastest hard drives, drive interfaces and interface cards (possibly using multiple interfaces to segregate front-end network services from back-end file services, and DNS from internal hosts); and tune/monitor system performance on a regular basis.



Leverage IPSes/IDSes and firewalls. Restrict all externally exposed access to only those services that are absolutely necessary (e.g., only allow TCP ports 80 and 443 on Web servers, TCP/UDP ports 53 on DNS servers, etc.). Use your IDS/IPS to monitor access attempts on any open ports, and tune it to look for specific OS-version and patch-level vulnerabilities. Also, monitor what services are running--there's no need to check for Windows/x86-based IIS attacks aimed at a DNS server running BIND on Solaris/SPARC.



Detection

Monitor and respond to incidents. Security managers should dedicate human and automated resources to check their IDS/IPS and other network monitoring devices for anomalous activity, such as spikes in traffic, unusual protocols, unauthorized connection attempts and large volumes of e-mail. Security managers should monitor ports and protocols commonly used by bots, such as TCP port 6667.



Watch network traffic. Flow-level monitoring and logging, even for short periods -- a few days or weeks -- is critical for addressing multifaceted network attacks. Botnets are great at concealing the source of attacks, making host-based logging ineffective for diagnosis. In DDoS attacks, having a full picture of traffic to and from the victim host can often lead you closer to the attackers by noticing when they check to see if their attacks are succeeding.



Reaction/Remediation

Filter the flood. In many cases, filters can drop incoming traffic from some or all of the attacking hosts in a DDoS attack. Attackers can, and usually do, vary their attack methods, so change your filters frequently. Bots can be blocked with enough precise information about command and control traffic patterns, ports, protocols, peers and servers. (Note: It's risky to do this with routers, as you may disrupt legitimate traffic. It's even riskier to use firewalls, since a failure will open your entire network to attack.)



Remediate and recover. If you aren't already using integrity-checking software that fingerprints files and file system metadata, it can be extremely difficult to clean up bot-infested hosts. Effective cleanup requires detailed knowledge of the specific bots, how they're used and how their variants are altered or configured. Some antivirus/antispyware applications may be able to remove bots, but nastier variants require manual removal of both the software and registry keys. The most resilient bots and rootkits require wiping the hard drive and reinstalling the OS.



Preserve the evidence. This is tricky; doing the "right thing" by preserving evidence is costly, while "wipe-and-reinstall" is cheap. Victims may soon not have a choice, since downstream liability cases and law enforcement efforts are compelling enterprises to preserve any and all evidence. Victims should attempt to get a hard drive image of at least one bot-compromised system to assist investigations.



Luv



SK

Mail me :funmansk (at) yahoo.com

Join my group: http://groups.yahoo.com/group/funmansk

My blog : http://firstcitizen.wordpress.com

Fun blog : http://funmansk.blogspot.com

Get paid to view ad: http://www.advercash.net/index.php?ref=funmansk


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...