Old style botnet with central command structure. Suggested by Brian Hall. |
Malicious code sneaks into the very first sector of the hard drive, the part which lights up before the operating system is turned on. TDL-4 uses strong encryption and circulates its evil messages in a loose peer-to-peer network instead of along a rigid pipeline that is easier to police.
No comments:
Post a Comment