Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!

Zombie (computer science)

Index Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. [1]

40 relations: BASHLITE, Black Hat Briefings, Blue Frog, Botnet, Charlie Miller (security researcher), Click fraud, Computer science, Computer security, Computer virus, Denial-of-service attack, EBay, Email spam, Etisalat, Internet Relay Chat, IPhone, List of zombie films, Low Orbit Ion Cannon, MafiaBoy, Malware, Michael Gregg, Money mule, Nokia, Pay-per-click, Phishing, Proof of concept, Sardis, Mississippi, Security hacker, Smartphone, SMS, Spam Prevention Early Warning System, Spamming, Spyware, Steve Gibson (computer programmer), Symbian, Text messaging, The New York Times, Trojan horse (computing), United Arab Emirates, Yahoo!, Zombie.


BASHLITE (also known as Gafgyt, Lizkebab, Qbot, Torlus and LizardStresser) is malware which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS).

New!!: Zombie (computer science) and BASHLITE · See more »

Black Hat Briefings

Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world.

New!!: Zombie (computer science) and Black Hat Briefings · See more »

Blue Frog

The Blue Frog tool, produced by Blue Security Inc., operated in 2006 as part of a community-based anti-spam system which tried to persuade spammers to remove community members' addresses from their mailing lists by automating the complaint process for each user as spam is received.

New!!: Zombie (computer science) and Blue Frog · See more »


A botnet is a number of Internet-connected devices, each of which is running one or more bots.

New!!: Zombie (computer science) and Botnet · See more »

Charlie Miller (security researcher)

Charles Alfred Miller is an American computer security researcher with Cruise Automation.

New!!: Zombie (computer science) and Charlie Miller (security researcher) · See more »

Click fraud

Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising.

New!!: Zombie (computer science) and Click fraud · See more »

Computer science

Computer science deals with the theoretical foundations of information and computation, together with practical techniques for the implementation and application of these foundations.

New!!: Zombie (computer science) and Computer science · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Zombie (computer science) and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Zombie (computer science) and Computer virus · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Zombie (computer science) and Denial-of-service attack · See more »


eBay Inc. is a multinational e-commerce corporation based in San Jose, California that facilitates consumer-to-consumer and business-to-consumer sales through its website.

New!!: Zombie (computer science) and EBay · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Zombie (computer science) and Email spam · See more »


Emirates Telecommunication Group Company PJSC, (مؤسسة الإمارات للاتصالات, Mu'asissat al-'Imārāt lil-'Ittiṣālāt, literally, "Emirates Institute for Communications"), branded trade name Etisalat (اتصالات, literally "communications"), is a multinational Emirati based telecommunications services provider, currently operating in 16 countries across Asia, the Middle East and Africa.

New!!: Zombie (computer science) and Etisalat · See more »

Internet Relay Chat

Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.

New!!: Zombie (computer science) and Internet Relay Chat · See more »


iPhone is a line of smartphones designed and marketed by Apple Inc. The iPhone line of products use Apple's iOS mobile operating system software.

New!!: Zombie (computer science) and IPhone · See more »

List of zombie films

The following is a list of zombie feature films.

New!!: Zombie (computer science) and List of zombie films · See more »

Low Orbit Ion Cannon

Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#.

New!!: Zombie (computer science) and Low Orbit Ion Cannon · See more »


Michael Calce (born 1986, also known as MafiaBoy) was a high school student from Île Bizard, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites, including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, eBay, and CNN.

New!!: Zombie (computer science) and MafiaBoy · See more »


Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Zombie (computer science) and Malware · See more »

Michael Gregg

Michael Gregg is an American computer security specialist, noted speaker at security related events, and an author/coauthor of multiple books such as Build Your Own Network Security Lab and Inside Network Security Assessment.

New!!: Zombie (computer science) and Michael Gregg · See more »

Money mule

A money mule, sometimes called a "smurfer," is a person who transfers money acquired illegally (e.g., stolen) in person, through a courier service, or electronically, on behalf of others.

New!!: Zombie (computer science) and Money mule · See more »


Nokia is a Finnish multinational telecommunications, information technology, and consumer electronics company, founded in 1865.

New!!: Zombie (computer science) and Nokia · See more »


Pay-per-click (PPC), also known as cost per click (CPC), is an internet advertising model used to direct traffic to websites, in which an advertiser pays a publisher (typically a website owner or a network of websites) when the ad is clicked.

New!!: Zombie (computer science) and Pay-per-click · See more »


Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Zombie (computer science) and Phishing · See more »

Proof of concept

Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential.

New!!: Zombie (computer science) and Proof of concept · See more »

Sardis, Mississippi

Sardis is a town in Panola County, Mississippi.

New!!: Zombie (computer science) and Sardis, Mississippi · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Zombie (computer science) and Security hacker · See more »


A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most, if not all, smartphones also support Wi-Fi.

New!!: Zombie (computer science) and Smartphone · See more »


SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.

New!!: Zombie (computer science) and SMS · See more »

Spam Prevention Early Warning System

The Spam Prevention Early Warning System (SPEWS) was an anonymous service which maintained a list of IP address ranges belonging to Internet service providers (ISPs) which host spammers and show little action to prevent their abuse of other networks' resources.

New!!: Zombie (computer science) and Spam Prevention Early Warning System · See more »


Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.

New!!: Zombie (computer science) and Spamming · See more »


Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Zombie (computer science) and Spyware · See more »

Steve Gibson (computer programmer)

Steven "Steve" Gibson (born 26 March 1955) is an American software engineer, security researcher, and IT security proponent.

New!!: Zombie (computer science) and Steve Gibson (computer programmer) · See more »


Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones.

New!!: Zombie (computer science) and Symbian · See more »

Text messaging

Text messaging, or texting, is the act of composing and sending electronic messages, typically consisting of alphabetic and numeric characters, between two or more users of mobile phones, tablets, desktops/laptops, or other devices.

New!!: Zombie (computer science) and Text messaging · See more »

The New York Times

The New York Times (sometimes abbreviated as The NYT or The Times) is an American newspaper based in New York City with worldwide influence and readership.

New!!: Zombie (computer science) and The New York Times · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Zombie (computer science) and Trojan horse (computing) · See more »

United Arab Emirates

The United Arab Emirates (UAE; دولة الإمارات العربية المتحدة), sometimes simply called the Emirates (الإمارات), is a federal absolute monarchy sovereign state in Western Asia at the southeast end of the Arabian Peninsula on the Persian Gulf, bordering Oman to the east and Saudi Arabia to the south, as well as sharing maritime borders with Qatar to the west and Iran to the north.

New!!: Zombie (computer science) and United Arab Emirates · See more »


Yahoo! is a web services provider headquartered in Sunnyvale, California and wholly owned by Verizon Communications through Oath Inc..

New!!: Zombie (computer science) and Yahoo! · See more »


A zombie (Haitian French: zombi, zonbi) is a fictional undead being created through the reanimation of a human corpse.

New!!: Zombie (computer science) and Zombie · See more »

Redirects here:

Computer zombie, Pulsing zombie, Zombie Computer, Zombie PC, Zombie computer, Zombie computers, Zombie proxy, Zombie virus.


[1] https://en.wikipedia.org/wiki/Zombie_(computer_science)

Hey! We are on Facebook now! »