Question

All engineers register to Twitter. Any twitter user can post as many messages as he/she likes...

All engineers register to Twitter. Any twitter user can post as many messages as he/she likes and any user can follow other user so the first one receives copies of the second user tweets. Any use can see the sample of random tweets. Is it possible a bad guy called botmaster to organize a botnet? Describe how that could happened along with the role of the botmaster.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Here, In this case users can register on twitter and any user can post as many messages. Every user can follow other users and can get a copy of their posts and respond to the same.

Botmaster and Botnet?

Bot (In this case)

Bots are software applications that are taught with certain tasks and steps. The bots will perform automated tasks that are already taught to them.

Bot network

Simply network of bots, ie; one or more bots as nodes connected together to form a network which is given internet access to perform the automated tasks.

Botmaster

Botmaster acts as a master of many slave bots or bot networks. The Botmaster controls all the other bots similar to a centralized system. The botmaster itself can be software or an individual human. Botmaster controls the task done by each bot, giving instruction and fixing errors etc.

Here in this figure, The center node is the botmaster which controls all the botnets and bots connected to the same.

Spamming With Bots
The botmaster and its bots could create their own accounts and post any post one after the other. This spams the twitter post wall where we see the latest posts.

To avoid issues, twitter has a lot of security measures. Twitter analyses the activity done by each account including the bot accounts and identifies which one is a legible user activity and which one is not. After analyzing the bot activities and accounts twitter may ban the account and the IP address group linked with the same.

Thus twitter automated bots will detect the unwanted spamming bots on their social network and removes and bans the same as soon as they confirm it is a bot.

Add a comment
Know the answer?
Add Answer to:
All engineers register to Twitter. Any twitter user can post as many messages as he/she likes...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • i really need help with the graphs Driving Can Be Dangerous to Your Health: An Interrupted...

    i really need help with the graphs Driving Can Be Dangerous to Your Health: An Interrupted Case Study in Physiology Phil Stephens Department of Biology Villanova University Part 1-The Grandparents Arrive Dave pulled the cell phone out of his pocket, cursing himself for not putting it on vibrate. The children, Jason and Laura, were both asleep, and he knew that the rest of the day would not be fun if they were awakened from their naps. "Hi, Dave. We're just...

  • Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of...

    Using the book, write another paragraph or two: write 170 words: Q: Compare the assumptions of physician-centered and collaborative communication. How is the caregiver’s role different in each model? How is the patient’s role different? Answer: Physical-centered communication involves the specialists taking control of the conversation. They decide on the topics of discussion and when to end the process. The patient responds to the issues raised by the caregiver and acts accordingly. On the other hand, Collaborative communication involves a...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT