The IT Law Wiki
Edit Page
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 7: Line 7:
 
{{Quote|[a] [[network]][] of [[Internet]]-connected [[end-user]] [[computing device]]s [[infect]]ed with [[bot]] [[malware]], which are [[remotely controlled]] by [[third parties]] for nefarious purposes. A botnet is under the control of a given "[[botherder]]" or "[[botmaster]]." A botnet might have just a handful of botted hosts, or millions.<ref>[[U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs)]], at 21.</ref>}}
 
{{Quote|[a] [[network]][] of [[Internet]]-connected [[end-user]] [[computing device]]s [[infect]]ed with [[bot]] [[malware]], which are [[remotely controlled]] by [[third parties]] for nefarious purposes. A botnet is under the control of a given "[[botherder]]" or "[[botmaster]]." A botnet might have just a handful of botted hosts, or millions.<ref>[[U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs)]], at 21.</ref>}}
   
{{Quote|[a] collection[] of [[computer]]s [[infect]]ed with [[malicious code]] that can be controlled remotely through a [[command and control]] [[infrastructure]].<ref>[[Botnets as a Vehicle for Online Crime]], at 2 n.1.</ref>}}
+
{{Quote|[a] collection[] of [[computer]]s [[infect]]ed with [[malicious code]] that can be controlled remotely through a [[command and control]] [[infrastructure]].<ref>[[Botnets as a Vehicle for Online Crime]], at 2.</ref>}}
   
 
{{Quote|[a] network[] of [[compromised]] [[computer]]s that are [[remotely controlled]] by [[malicious agent]]s. They are used to send massive quantities of [[spam]] [[e-mail message]]s, co-ordinate [[distributed denial-of-service attack]]s ([[DDOS]]) and facilitate financial and [[identity fraud]], among other economically and socially harmful activities. They therefore represent a major problem for [[security]] and [[trust]] in [[online]] environments.<ref>[[Proactive Policy Measures by Internet Service Providers against Botnets]], at 6.</ref>}}
 
{{Quote|[a] network[] of [[compromised]] [[computer]]s that are [[remotely controlled]] by [[malicious agent]]s. They are used to send massive quantities of [[spam]] [[e-mail message]]s, co-ordinate [[distributed denial-of-service attack]]s ([[DDOS]]) and facilitate financial and [[identity fraud]], among other economically and socially harmful activities. They therefore represent a major problem for [[security]] and [[trust]] in [[online]] environments.<ref>[[Proactive Policy Measures by Internet Service Providers against Botnets]], at 6.</ref>}}
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)