| 1. | Cybercriminals rent out use of their botnets on the black market 网络罪犯们在黑市上出租他们的僵尸网络的使用权。 |
| 2. | An event that is not that unusual is that somebody steals a botnet from someone else 一个很不普通的事是有人从别人那里偷取僵尸网络。 |
| 3. | Such botnets can be created , or simply rented from cyber - criminals “僵尸网络”可以被创建出来,或者可以直接从网络罪犯那里租借过来使用。 |
| 4. | A botnet is a network of compromised machines that can be remotely controlled by an attacker 僵尸网络是一个可以由攻击者远程控制的已被攻陷主机组成的网络。 |
| 5. | In this paper we take a closer look at botnets , common attack techniques , and the individuals involved 这里,我们对僵尸网络,普遍的攻击技术以及涉及到的个人做一个更贴近的观察。 |
| 6. | Initially the fbi said it wanted to track down infected computers in the botnets it had identified and warn their owners 最初, fbi表示,它希望在僵尸网络中追捕到它已确定并警告过其拥有人的那些受感染电脑。 |
| 7. | With the help of honeynets we can observe the people who run botnets - a task that is difficult using other techniques 在蜜网的帮助下,我们可以观察运行僵尸网络的那些人对于其他工具来说这是一个很艰难的任务。 |
| 8. | If you are interested in learning more about the different bot commands , we have a more detailed overview of command analysis in botnet commands 如果你对学习更多不同的僵尸工具命令有兴趣,我们有一个更加详细的关于僵尸网络命令概述。 |
| 9. | In addition , if you are interested in learning more about source code of bots , you can find more detail in the separate page on botnet source code 如果你对学习更多关于僵尸工具源代码有兴趣,你在僵尸网络单独的源代码页面能发现更多的细节。 |
| 10. | Many others come from “ botnets ” ? chains of computers that have been hijacked by viruses totake part in such raids without their owners knowing 而其他一些人则采取“僵尸网络”进行攻击,这种攻击能在电脑用户们毫不知情的情况下让一连串的电脑被病毒劫持并参与袭击活动。 |