How does a bot infection happen?
Bot infections follow the same path as the typical Internet worm or virus. You may open an attachment in an email, visit a malicious web site or download malicious software often associated with “free software”, such as games, screensavers, any of which may result in malware being installed on your computer. Once infected, the bot software sends a notice to the “controller.” The controller then downloads additional malicious software to the compromised host. The botnet controller then may have complete control of your computer. Examples of malicious software commonly associated with botnets and the subsequent activity impact on your computer are: • Keystroke logger programs that specialize in capturing all of your key strokes and are adept at capturing personal information including your user name and password, as well as credit card and other financial information. • Programs that are used to distribute spam. The next email you receive regarding a hot stock tip or prescription drugs c