1 00:00:00,320 --> 00:00:02,880 Speaker 1: Brought to you by the reinvented two thousand twelve camera. 2 00:00:03,240 --> 00:00:08,760 Speaker 1: It's ready, Are you get in touch with technology? With 3 00:00:08,920 --> 00:00:13,400 Speaker 1: tech stuff from how stuff Works dot com. Hey everyone, 4 00:00:13,440 --> 00:00:16,520 Speaker 1: and welcome to the podcast. My name is Jonathan Strickland. 5 00:00:16,520 --> 00:00:18,520 Speaker 1: I'm the staff writer here at how Stuff Works. And 6 00:00:18,560 --> 00:00:23,639 Speaker 1: with me is editor extraordinaire Chris Palette. And today we 7 00:00:23,720 --> 00:00:25,800 Speaker 1: thought we'd talked to you a little bit about a 8 00:00:26,480 --> 00:00:32,839 Speaker 1: scary thing on the web, the zombie computer. Yeah, so 9 00:00:32,880 --> 00:00:35,400 Speaker 1: if your screen starts displaying that over and over again, 10 00:00:35,440 --> 00:00:37,120 Speaker 1: you know you've got a problem. Well, first of all, 11 00:00:37,159 --> 00:00:39,239 Speaker 1: we should probably tell you zombie computers is kind of 12 00:00:39,280 --> 00:00:42,080 Speaker 1: a it's it's a term that the media sort of 13 00:00:42,120 --> 00:00:46,159 Speaker 1: invented to describe something that the tech world usually refers 14 00:00:46,159 --> 00:00:49,120 Speaker 1: to as a bot uh, And a collection of these 15 00:00:49,200 --> 00:00:51,960 Speaker 1: is called a button net. Now, in the media terms, 16 00:00:51,960 --> 00:00:54,680 Speaker 1: it's an army of zombie computers, which you can imagine 17 00:00:54,760 --> 00:00:58,000 Speaker 1: sounds a little more interesting than a bot net. But 18 00:00:58,080 --> 00:01:03,520 Speaker 1: saying yes, yes, it definitely definitely gets the the issues 19 00:01:03,600 --> 00:01:06,679 Speaker 1: off the news stand. But so what is a button 20 00:01:06,720 --> 00:01:10,200 Speaker 1: net or or a zombie computer? Uh, it's technically it's 21 00:01:10,280 --> 00:01:12,800 Speaker 1: it's it could be any computer at all. But it's 22 00:01:12,840 --> 00:01:16,320 Speaker 1: a computer that a hacker has gained access to remotely 23 00:01:16,959 --> 00:01:22,200 Speaker 1: and can control remotely. Now ideally for the hacker, uh, 24 00:01:22,200 --> 00:01:25,080 Speaker 1: he or she can do this without the computer's owner 25 00:01:25,200 --> 00:01:28,440 Speaker 1: being aware of what's going on at all. So your 26 00:01:28,520 --> 00:01:30,720 Speaker 1: computer could be a zombie computer, it could be a 27 00:01:30,720 --> 00:01:33,360 Speaker 1: butt and you might not even be aware of it. Yeah. 28 00:01:33,360 --> 00:01:37,000 Speaker 1: Actually that's ideal for the hacker because, uh, if you 29 00:01:37,160 --> 00:01:40,240 Speaker 1: have a machine that they are taking advantage of, if 30 00:01:40,240 --> 00:01:42,200 Speaker 1: you can detect the fact that it's being used as 31 00:01:42,240 --> 00:01:44,240 Speaker 1: a zombie computer, then you're going to do something to 32 00:01:44,280 --> 00:01:47,720 Speaker 1: get rid of that. So they wanted as undetectable and 33 00:01:47,760 --> 00:01:51,000 Speaker 1: as quiet as possible so that they can continue to 34 00:01:51,120 --> 00:01:56,080 Speaker 1: use your your machine now. Um. One of the more 35 00:01:56,120 --> 00:02:01,040 Speaker 1: recent and uh in my opinion, scarier UH tactics that 36 00:02:01,880 --> 00:02:04,800 Speaker 1: are actually that's a trojan horse program called the storm 37 00:02:04,840 --> 00:02:07,840 Speaker 1: worm UM and it's sort of made headlines, but it 38 00:02:07,920 --> 00:02:13,240 Speaker 1: sort of hasn't um because they're they're they're so under 39 00:02:13,280 --> 00:02:17,400 Speaker 1: the radar, uh with all their their work that they 40 00:02:17,480 --> 00:02:20,880 Speaker 1: really haven't Whoever is behind the stormworm has escaped a 41 00:02:20,919 --> 00:02:24,400 Speaker 1: lot of public notice. It's not like a lot of 42 00:02:24,400 --> 00:02:27,640 Speaker 1: the famous viruses of the past, right, and and just 43 00:02:27,680 --> 00:02:30,680 Speaker 1: so you know, that's really the way hackers usually get 44 00:02:30,840 --> 00:02:34,040 Speaker 1: get access to your computer. It's it's by tricking you 45 00:02:34,120 --> 00:02:38,519 Speaker 1: into downloading and executing a file that is a form 46 00:02:38,560 --> 00:02:43,079 Speaker 1: of computer virus UH, usually a trojan horse program UM. 47 00:02:43,160 --> 00:02:47,560 Speaker 1: So you download the program, you execute it, and it 48 00:02:47,720 --> 00:02:50,840 Speaker 1: executes some some code on your computer that allows the 49 00:02:50,880 --> 00:02:54,320 Speaker 1: hacker to get back door access to your your operating system. 50 00:02:54,440 --> 00:02:56,280 Speaker 1: The real problem with this, of course, is that if 51 00:02:56,280 --> 00:02:58,200 Speaker 1: they do it, well, you don't know, and if you're 52 00:02:58,240 --> 00:03:00,919 Speaker 1: not really if you're not really aware this sort of thing, 53 00:03:01,120 --> 00:03:03,040 Speaker 1: you might just think you've got a bad file. You know, 54 00:03:03,080 --> 00:03:05,440 Speaker 1: you tried to execute something someone said, oh, there's a 55 00:03:05,480 --> 00:03:08,920 Speaker 1: great slideshow of pictures on here, and you click on it, 56 00:03:09,000 --> 00:03:11,280 Speaker 1: nothing happens. You might just think, oh, you know, the 57 00:03:11,320 --> 00:03:15,600 Speaker 1: code gout got a compromise in some way, Well forget 58 00:03:15,600 --> 00:03:17,240 Speaker 1: it. It It probably wasn't worth looking at, and you go 59 00:03:17,240 --> 00:03:19,919 Speaker 1: on your married little way. Meanwhile, your computer is doing 60 00:03:19,960 --> 00:03:23,160 Speaker 1: all sorts of nasty things, and this can include everything 61 00:03:23,240 --> 00:03:26,600 Speaker 1: from sending out spam mail to two dozens of people 62 00:03:27,120 --> 00:03:31,320 Speaker 1: to UH to something that is called a distributed denial 63 00:03:31,400 --> 00:03:34,000 Speaker 1: of service attack. Now that that's something that goes across 64 00:03:34,040 --> 00:03:37,960 Speaker 1: an entire network of zombie computers or a bot net, 65 00:03:38,080 --> 00:03:42,000 Speaker 1: and it's it's an interesting tactic. It's it's a sabotage tactic. 66 00:03:42,600 --> 00:03:47,000 Speaker 1: It's when a hacker decides to try and take down 67 00:03:47,360 --> 00:03:51,480 Speaker 1: a website or a web server of a particular individual, corporation, 68 00:03:51,880 --> 00:03:56,200 Speaker 1: or organization UM by overloading it. So you tell your 69 00:03:56,360 --> 00:03:59,920 Speaker 1: army of computers that you've hacked into to all say 70 00:04:00,000 --> 00:04:04,600 Speaker 1: and messages to this one particular web server, and then 71 00:04:05,160 --> 00:04:07,320 Speaker 1: next thing you know, that web server gets overloaded with 72 00:04:07,440 --> 00:04:11,119 Speaker 1: requests and crashes. And there have been some really big, 73 00:04:11,280 --> 00:04:15,880 Speaker 1: big story uh stories of this, like CNN has been 74 00:04:15,920 --> 00:04:18,520 Speaker 1: hit by this, Microsoft has been hit by this. Yahoo. 75 00:04:19,120 --> 00:04:23,560 Speaker 1: Just because you are a big presence on the web, 76 00:04:23,600 --> 00:04:26,080 Speaker 1: and you might even have great Internet security, it doesn't 77 00:04:26,080 --> 00:04:28,440 Speaker 1: mean you're immune to this kind of attack. You know. 78 00:04:28,480 --> 00:04:31,360 Speaker 1: The funny thing is that in order to take advantage 79 00:04:31,400 --> 00:04:34,920 Speaker 1: of a computer system, a hacker has to exploit a 80 00:04:35,320 --> 00:04:39,680 Speaker 1: vulnerability UM And basically what that means is somewhere in 81 00:04:39,720 --> 00:04:42,799 Speaker 1: the code that operates your computer there is a hole 82 00:04:43,120 --> 00:04:45,599 Speaker 1: and they are taking advantage of it. But really the 83 00:04:45,600 --> 00:04:50,000 Speaker 1: biggest vulnerability with all of these zombie computer viruses that 84 00:04:50,120 --> 00:04:54,560 Speaker 1: the trojan horses. They require you to install that program, 85 00:04:54,960 --> 00:04:57,560 Speaker 1: so you are the biggest vulnerability. So as long as 86 00:04:57,560 --> 00:05:00,360 Speaker 1: you educate yourself and don't launch strange files, own open 87 00:05:00,360 --> 00:05:02,400 Speaker 1: emails from people you don't know, you have a much 88 00:05:02,400 --> 00:05:06,559 Speaker 1: better chance of keeping your computer from joining the ranks 89 00:05:06,560 --> 00:05:09,720 Speaker 1: of the zombies. Right. And should you actually get infected, 90 00:05:10,279 --> 00:05:13,040 Speaker 1: that's not so good. You may have to actually completely 91 00:05:13,080 --> 00:05:17,600 Speaker 1: reform at your entire computer, So announce of prevention guys. Anyway, 92 00:05:17,680 --> 00:05:19,840 Speaker 1: that's about all the time we have. If you want 93 00:05:19,880 --> 00:05:22,640 Speaker 1: to learn more, check out our article on how zombie 94 00:05:22,640 --> 00:05:27,200 Speaker 1: computers work at how stuff works dot com for more 95 00:05:27,200 --> 00:05:30,080 Speaker 1: on this and thousands of other topics. Does stop works 96 00:05:30,080 --> 00:05:33,280 Speaker 1: dot com? Let us know what you think. Send an 97 00:05:33,279 --> 00:05:40,200 Speaker 1: email to podcasts at how stuff works dot com. Brought 98 00:05:40,240 --> 00:05:43,400 Speaker 1: to you by the reinvented two thousand twelve camera. It's ready, 99 00:05:43,600 --> 00:05:44,039 Speaker 1: are you