It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
so you just send the bot a command "nuke www.rodinus.com" and thats it off it goes,
originally posted by: RainofStars
Just snapped this ~15 minutes ago. Not too sure if the link/picture will work but here's a pic I snapped of Norse real quick. Thought it was mildly odd. Hopefully the link works, as I could not get my pictures to load via my account.
Just before this was taken, the whole Eastern Hemisphere (Russia, China, India etc.) did the same thing only more "linear" if that makes sense? The lines were not rounded like the picture I included.
tinypic.com...
originally posted by: Rodinus
Can a tech savvy USA member give us more info as to why Saint louis in the USA is getting so much attention from the chinese?
originally posted by: Rodinus
originally posted by: Maxatoria
Thanks for the explanation Max... Perfectly understood erm... I think?
Sorry I am a veterinary and have problems with circuits, electronics, radio waves, internet and all that kind of jazz?
So from what I can gather, the chinese have Loads a money to spend on Botnets to bugger around with the world?
If I understand correctly : A botnet is a bunch of worldwide connected programs working with similar programs on connected computers (even thought the user may not be aware) and spreading their different malicious crap around the world wide cheese cracker biscuit?
Looking at the map that I provided in the original post they must be pretty loaded with cash to send all of that across to the USA?
I am crap, so please be kind when it comes to this type of discussion... trying to learn although a little slow... when it comes to computer technology.
Kindest respects
Rodinus
A Botnet is a command-and-control system. Each "bot" is like a mass tick infection with feral cats. Each PC infected with a "bot" program visits a command-and-control server to download instructions on what to do - fire off a ssh login attack at a server, attempt to infect new PC's, go to sleep, act as a command-and-control center, make as many http/sip/ftp/telnet requests as possible, download new password files. It takes researchers weeks to find out all of them as well as the source of control. The size of the bot-net ranges from a few thousand to hundreds of thousands of PC's.