How to remove a bot

How to remove a bot

Boats (robots of the search engine) are the small programs capable to perform practically any task and "taken for the rule" to be started and work on the computer as "automatic machine", without any help from the person. Initially creators intended them for the good purposes, but today, unfortunately, often use bots exactly the opposite. So, with their help collect the e-mail addresses and send spams, "hammer" an Internet channel with unnecessary information including advertizing, start virus and spy programs in computers, DoS-attack and do a lot of other harm.

Instruction

1. For any user "phenomenon" of the robot – extremely unpleasant news as dozens of superplanned megabytes of traffic and also "drift" of the damaged machine in the black list and, as a result, problems when sending mail can become result of this meeting. Use fresh programs of antivirus protection, many of them are quite capable to cope with an objective.

2. However often to find bots by means of an antivirus quite difficult if this defender is used free of charge, so, in the "cut-down" view. Specialists consider that it is possible to detect unwanted guests and without it as even at ideal a rootkit masking (having got to a system, the code immediately masks under the "honest" program) bots come across on spam sending. Carry out diagnostics of network by a sniffer to see what there is created and to try to find the infected object. At the same time what network analyzer you select, it is not important at all if only it could reconstruct TCP sessions and also accumulate statistics. By the way, a similar way it is possible to catch also the mail worms sending the copies.

3. However, and this program is not ideal – a sniffer excessively big for expeditious scanning of the computer and installation is necessary for it. But nothing prevents you to use the corresponding utility which is capable not only to find unplanned activity of network, but also to reveal its source.

4. Besides, it is possible to try to check with own hand whether unauthorized IRC – connection "was got" at you, having inspected the network connections. If their activity is available, then it is quite probable that your machine is infected.

5. Surely check also other ports using IRC. In case of detection of the key indicating existence of a bot it it is necessary to delete, reboot, and then to get rid of "invader".

Author: «MirrorInfo» Dream Team


Print