It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In malware, a botnet is a collection of infected computers or bots that have been taken over by hackers (also known as bot herders) and are used to perform malicious tasks or functions. A computer becomes a bot when it downloads a file (e.g., an email attachment) that has bot software embedded in it. A botnet is considered a botnet if it is taking action on the client itself via IRC channels without the hackers having to log in to the client's computer. A botnet consists of many threats contained in one. The typical botnet consists of a bot server (usually an IRC server) and one or more botclients.
Like many things on the Internet today, bots began as a useful tool without malicious overtones. Bots were originally developed as a virtual individual that could sit on an IRC channel and do things for its owner while the owner was busy elsewhere.[2] Soon after the release of the first IRC bot, a few worms had exploited vulnerabilities in IRC clients and used the bots to steal passwords, log keystrokes, and hide their identity. The main drivers for botnets are for recognition and financial gain. The larger the botnet, the more ‘kudos’ the herder can claim to have among the underground community. The bot herder will also ‘rent out’ the services of the botnet to third parties, usually for sending out spam messages, or for performing a denial of service attack against a remote target. Due to the large numbers of compromised machines within the botnet, huge volumes of traffic (either email or denial of service) can be generated. However, in recent times, the volume of spam originating from a single compromised host has dropped in order to thwart anti-spam detection algorithms – a larger number of compromised hosts send a smaller number of messages in order to evade detection by anti-spam techniques.
Botnets have become a significant part of the Internet, albeit increasingly hidden. Due to most conventional IRC networks taking measures and blocking access to previously-hosted botnets, controllers must now find their own servers. Often, a botnet will include a variety of connections and network types. Sometimes a controller will hide an IRC server installation on an educational or corporate site where high-speed connections can support a large number of other bots. Exploitation of this method of using a bot to host other bots has proliferated only recently.
Several botnets have been found and removed from the Internet. The Dutch police found a 1.5 million node botnet[3] and the Norwegian ISP Telenor disbanded a 10,000-node botnet.[4] In July 2010, the FBI arrested a 23-year old Slovenian held responsible for the malicious software that integrated an estimated 12 million computers into a botnet.[5] Large coordinated international efforts to shut down botnets have also been initiated.[6] It has been estimated that up to one quarter of all personal computers connected to the internet may be part of a botnet.[7] Conficker is one of the largest botnets out there that has infected an estimated 1 million to 10 million machines which attempts to sell fake antivirus to its victims.
TeraGrid is an open scientific discovery infrastructure combining leadership class resources at 11 partner sites to create an integrated, persistent computational resource.
Using high-performance network connections, TeraGrid integrates high-performance computers, data resources and tools, and high-end experimental facilities around the country. Currently, TeraGrid resources include more than 2.5 petaflops of computing capability and more than 50 petabytes of online and archival data storage, with rapid access and retrieval over high-performance networks. Researchers can also access more than 100 discipline-specific databases. With this combination of resources, the TeraGrid is the world's largest, most comprehensive distributed cyberinfrastructure for open scientific research.
TeraGrid is coordinated through the Grid Infrastructure Group (GIG) at the University of Chicago, working in partnership with the Resource Provider sites: Indiana University, the Louisiana Optical Network Initiative, National Center for Supercomputing Applications, the National Institute for Computational Sciences, Oak Ridge National Laboratory, Pittsburgh Supercomputing Center, Purdue University, San Diego Supercomputer Center, Texas Advanced Computing Center, and University of Chicago/Argonne National Laboratory, and the National Center for Atmospheric Research.
eXtreme Digital (XD): 2011-2016
The next generation of petascale resources, called XD, will be managed by one of two teams that are currently vying for the award, from April 1, 2011 through May 30, 2016.
Distributed Networking is a distributed computing network system, said to be "distributed" when the computer programming and the data to be worked on are spread out over more than one computer, usually over a network.
Prior to low-cost computer power on the desktop, computing was centralized. Although such centers still exist, distribution networking applications and data operate more efficiently over a mix of desktop workstations, local area network servers, regional servers, Web servers, and other servers.
A popular trend has been client/server computing which is simply the view that a client computer can provide certain capabilities for a user and request others from other computers that provide services for the clients. (The Web's Hypertext Transfer Protocol is an example of this idea.)
Enterprises that have grown in scale over the years and those that are continuing to grow are finding it extremely challenging to manage their distributed network in the traditional client/server computing model. The recent developments in the field of cloud computing has opened up new possibilities. Cloud-based networking vendors have started to sprout offering solutions for enterprise distributed networking needs. Whether it turns out to revolutionize the distributed networking space or turns out to be another fad remains to be seen.
Lmao thats what i was thinking its the laughing man great story
Originally posted by Imperium Americana
Originally posted by GogoVicMorrow
reply to post by MIDNIGHTSUN
This thread is just proof that people still don't quite grasp the concept of anonymous.
That is because the concept of anon is at best nebulous.
[atsimg]http://files.abovetopsecret.com/images/member/00c67aef19aa.png[/atsimg]
If you can understand what this image represents, where it came from, and the significance of it - then you might begin to grasp the concept of anon and what it means for the future.
Originally posted by MIDNIGHTSUN
It's Official, "Anonymous" Hackers are Now Controlled Opposition
www.activistpost.com
(visit the link for the full news article)
A hacking group claiming to be part of "Anonymous" has announced the successful takeover of Iran's servers, which seems like a huge amount of work put into an agenda that seems to stray dramatically far away from their declared war on the Global Banking Cartel. After their manifesto declaring war on the international banking cartel, this turn against one of the only holdouts to joining that cartel raises speculation of their true intent.
Related News Links:
www.activistpost.com
Related AboveTopSecret.com Discussion Threads:
www.activistpost.com...
Originally posted by AreaJerm
I can tell from reading these posts that none of you actually know what Anonymous is. Not only is it not a group, it can't be "controlled" by any one thing, including the CIA. However, I won't even bother you all with an explanation, as it appears you already have the answers, or at least you think you do.
I'll tell you what, conspiracy theories have turned some people into brainless drones who think anything and everything is CIA-funded and targeted directly at them. Remember when open mindedness was appreciated in this forum?edit on 6-6-2011 by AreaJerm because: (no reason given)edit on 6-6-2011 by AreaJerm because: (no reason given)
Originally posted by Gorman91
reply to post by WhiteDevil013
No. No one knows. Anonymous is just that. The equivalent to Emmanuel Goldstein. And if you've been on the net long enough, you'd know those who pushed for its creation wanted to create just such a thing. The ultimate weapon in moving a culture. An invisible bogyman. If you think a government can control it, you are fully mistaken. If you want an image of what Anonymous is, think of it as the opposite to Harry Potter's Mirror of Erisededit on 7-6-2011 by Gorman91 because: (no reason given)
Originally posted by grizzle2
On their site, 4chan, they are always making fun of conspiracy theorists.
Originally posted by RisenAngel77
wow, not sure if this is real or not, but Anonymous does not have this kind of power. Again as I stated in other threads, they are composed mostly by 14 year olds living in their mothers basement. It is obvious at this point that the powerfull organizations are behind this and is now carrying the "Anonymous" banner. It is all a set up to probably have a case against the net and limit freedom of speech.
Originally posted by ohhwataloser
Originally posted by grizzle2
On their site, 4chan, they are always making fun of conspiracy theorists.
4 chan is not their site... 4 chan has nothing to do with anom or anything it does. where the hell did you come up with this? yes 4 chan has hacked certain things, they parallel a lot of beliefs, but the groups have nothing to do with each other. anom is very political, robin hood of the internet I guess you could compare it to. 4 chan tries to send justin bieber to north korea.
Originally posted by RisenAngel77
wow, not sure if this is real or not, but Anonymous does not have this kind of power. Again as I stated in other threads, they are composed mostly by 14 year olds living in their mothers basement. It is obvious at this point that the powerfull organizations are behind this and is now carrying the "Anonymous" banner. It is all a set up to probably have a case against the net and limit freedom of speech.
You remind me of my family, spout of things you know nothing about. 14 year olds? Those "other threads" are a great source of information, governements around the world are looking for people who particapte in anom activity, but your other threads seem to know they are stupid 14 year olds. again look at their past of what they have done, 14 years im sure did any of that.....
im sure the some people who participate in anom activity are some of the top computer elite, their abilities seem to have no limits, they breach every target they set after. they have always been a powerful force, imo comprised of the best of the best in the world, but remain anonymous. and as stated above, its not one centralized group, but all attacks seem to have one goal in mind, better this world.
If you actually look at this very thread, you would see their attack on iran was because of a case against the net and limit freedom of speach. They are protecting it. allow me to post this again
www.astreetjournalist.com...edit on 8-6-2011 byedit on 8-6-2011 by ohhwataloser because: spelling
I used to Lurk a lot of /b/ back in the old days, I also lurked on project chanology and helped "recruit" people from /b/. Anonymous has no definition, but the fact remains that they were all born under 4 chan /b/. Yes they did leave to do other things, but again I dont believe Anon has the power to do the kind of damage as the OP stated.
I understand you are all inspired from V, but I am just a skeptic when it comes to anonymous. They never trully fight for the right cause, they can easily screw anyone over if they wanted and they have done so in the past. But I dont think Anonymous was involved in the Iran one.
To me this was a set up from the Gov to, like I said, have more control over the net.
If Anonymous really wanted to do the right thing, they would have done so long ago and everyone would have their eyes wide open staring at the politicians and actually rising up. So, why hasn't anonymous done something? Spread information, videos of gov officials being corrupted, Spread the word. But they wont do it, because they don't care, they simply do things for the "lulz".
So yes I know them pretty well, as I used to dwell amongst them once upon a time and seen the 14 year olds take over 4 chan.edit on 8-6-2011 by RisenAngel77 because: (no reason given)extra DIV