similar tasks controlled by a master program -‐Supercomputers are legal botnets of servers -‐Hackers connect random consumers to make their own supercomputer*
computer, typically with context -‐Sends these logs to a central computer that processes them -‐Hackers can extract Bank info, login credentials, etc...
(DDOS) Attack is performed to take down access to a set of servers or website(s) -‐Key piece of cyber terrorism/ warfare, ex: China taking down United States’ power grid