Learn something new every day More Info... by email
Recognizing a zombie computer can be incredibly difficult, because many of the signs can point to other problems, and most people do not know they are using a zombie until it is too late. A zombie computer often is compromised by virus files, so the computer often will slow down, and the computer may act weirdly. By checking firewall traffic, you can see if your computer is visiting places that you have not. Some virus scanners can find a zombie, but most hackers hide the zombie virus in a way that cannot be detected. Blacklist tools, if you do not partake in spamming activities, also can be used.
To make a zombie computer, a hacker infiltrates a computer and adds a virus file that puts the computer under his control. This file and the activity from the hacker often cause the computer to slow down, because the hacker is using many computer resources. The computer also may act oddly, with programs opening for no reason and users constantly being redirected to other websites. While these are signs of a zombie problem, they also can be signs of a less serious virus or the result of old hardware and software.
One of the best ways to see if you have a zombie computer is by checking your firewall — or other programs that report your activity — for outgoing traffic. This will list what websites and places you visit when using the Internet, and you should see websites that you frequent. If there is a large amount of outgoing traffic directed at sites you do not recognize, then you may be running a zombie. Small amounts of unusual outgoing traffic may not be indicative of a zombie but a result of common pop-ups and redirects that appear online.
Virus scanners can sometimes pick up on a zombie computer, but only if the hacker was not diligent. These programs will scan for common signs of viruses and zombie activity and, if they do pick up a zombie, they may be able to fix it. If the hacker placed the zombie virus file in a rootkit, then it usually is untraceable.
When you are running a zombie computer, it likely will be used for spamming and for sending large packets of information to other entities to shut them down. This will result in your computer being placed on blacklists for spammers. By entering your Internet protocol (IP) address in a blacklist tool, you may find you are blacklisted, which can indicate that you have a zombie computer. If you willingly engage in spamming activity, then this may not be effective.
I am a victim of an all black underground using satellite remote computers privately owned and provided to a group of persons who are not computer skilled or trained. They can remote into your computer from the unused administrator access through Windows on PCs easily and Macs, as well. I have my computer set on stealth and full maximum firewall settings with a router from AT&T Uverse that has a firewall. It doesn’t matter. They can hijack the photos and manipulate the programs when I am not connected to the internet via the ethernet.
I have password protected wired connections and these black ops are paid and financed by a Saudi sheik not the government! They abuse the equipment and can change the layout and take over the core folders.
On a Mac, they can move the core folders and security in a toggle over to their side of system and lock them down. Therefore, you get a white out screen and/or a flashing folder showing. If I scream out, “let my system go,” they can release the lockdown and I don’t need a repair, which I’m told averages over $250 for an iMac.
They can censor the pages you view, and corrupt the scroll bars making them the full length of the page so you cannot scroll down. They can deny you service by changing the isp gateway because they accessed the gateway address assigned by AT&T, even when you are using it stealth. They can intercept your emails and change the content of what you sent and hold your incoming emails in a secret cache and deny you your own communications. They can do this without a password. It is not a password issue.
All my folders were locked with a computer password. They were still able to access all the folders.. They stole $3,000 worth of my software programs, such as Word 9.0, Adobe Photoshop 12 and more and moved the folders and gaming to their side of the computer. I cannot use or access my word processor. They corrupted the binary folders and I cannot use anything unless the hacker allows it. They can upload phony html pages and add them on and attack people on facebook who are friends.
They are not friendly hackers and have attacked US government servers and .gov and .org sites and changed the contact information and redirect those looking for the FBI from the FBI website. They can redirect and change the phone numbers to government and police agencies on the official sites . This has been done for five years. They are foreign financed and deny me police and FBI assistance. They are a network of terrorists in the United States.
I am in Illinois in the USA. They are based here. I am a long term witness and victim of their hacking as individuals and training groups on me. I can’t get the authorities to stop them. US military capabilities are not as sophisticated as their programs. They hack captcha so things don’t post like on this site now. Right now, I’m being attacked.