Comment

Video: PayPal VP Speaks About Wikileaks

704
Kragar12/09/2010 8:37:27 am PST

re: #698 NJDhockeyfan

Botnet, nodes, etc…I built my computer but all this mumbo jumbo is a little over my head.

Basically, the hacker infects various computers, then uses those computers to launch an attack. This allows a hacker to attack from a larger area and with many more machines than he would be able to physically access.

The initial virus is normally downloaded via porn sites, illegal video and music download, torrents and other downloadable media.