Killing Network Spam Zombies Made Easy

The Internet Patrol default featured image
Share the knowledge

SpamButcher has just published a series on how to kill network spam zombies. As readers know, the Federal Trade Commission recently issued an open plea to ISPs to get rid of the spam zombies on their networks. And even though a mock trial of IT professionals found that ISPs should not be held responsible for policing zombies, responsible networks know that this is something which needs to be done, and which can actually make an impact on the spam and zombie problem.

SpamButcher has decided to make this easier on networks by publishing a how-to guide for removing zombies from your network. Good for them! It contains such advice on how to determine if you have zombies on your network, how to isolate and locate them, and how to “actually kill the zombie”.

Here’s what SpamButcher has to say about it:

“At any point in time there are millions of hacked computers, sending massive amounts of junk email throughout the world without their owner’s knowledge or consent.

These computers are known as spam zombies. By using spam zombies, spammers can send ever increasing amounts of junk email while forcing others to bear the cost. Zombie systems may also be used for other nefarious activities such as denial of service attacks.

The Internet Patrol is completely free, and reader-supported. Your tips via CashApp, Venmo, or Paypal are appreciated! Receipts will come from ISIPP.

CashApp us Square Cash app link

Venmo us Venmo link

Paypal us Paypal link

The anti-spam software provider, SpamButcher (http://www.spambutcher.com) has released a document detailing a series of steps to help identify and neutralize spam zombie systems.

“Killing Spam Zombies Made Easy” is available for viewing free of charge at https://web.archive.org/web/20120509101525/http://www.spambutcher.com/spamzombies/

The guide breaks down the process of detecting and removing spam zombies into a few simple steps:

Detecting unexplained network activity Identifying suspect systems Capturing and evaluating network traffic Killing the zombie Decreasing the risk of future infections

The document is geared towards people responsible for small networks of up to about 50 computers. Small companies often lack the needed tools and expertise to readily identify zombies and other threats. By using freely available network utilities, the document can help locate hacked systems without needing to purchase additional software.

The article focuses on the simplest, easiest to understand approach to the problem as opposed to the most efficient. Users with a basic understanding of computers and networking should be able to complete the steps.
In addition to being responsible for a large portion of spam sent, zombies burden networks with excessive traffic and cause end-users’ computers to perform poorly. More than ever, it’s important for those in charge of networks of all sizes to identify and eliminate any zombie systems.”

So, those of you who want to identify and eliminate your zombies, read SpamButcher’s tutorial https://www.theinternetpatrol.com/free-mp3-downloads-at-amazon/.

Get New Internet Patrol Articles by Email!

The Internet Patrol is completely free, and reader-supported. Your tips via CashApp, Venmo, or Paypal are appreciated! Receipts will come from ISIPP.

CashApp us Square Cash app link

Venmo us Venmo link

Paypal us Paypal link

 


Share the knowledge

Leave a Reply

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.