In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse...
8 KB (922 words) - 17:17, 21 May 2025
Zombie virus may refer to: Zombie (computing), a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse...
232 bytes (63 words) - 01:09, 25 March 2020
apocalyptic novel series by Darren Shan Zombie (computing), a compromised computer used to perform malicious tasks Zombie object, in garbage-collected object-oriented...
6 KB (747 words) - 17:00, 6 June 2025
Timeline of computer viruses and worms Trojan horse (computing) ZeroAccess botnet Zombie (computing) Virgillito, Dan (19 September 2014). "'Tiny Banker'...
6 KB (718 words) - 13:05, 11 November 2024
Zombie Zombie is a ZX Spectrum computer game developed by Spaceman Ltd (Sandy White and Angela Sutherland), published in 1984 by Quicksilva. It is a development...
4 KB (407 words) - 11:37, 16 March 2025
Timeline of computer viruses and worms Tiny Banker Trojan Torpig Zombie (computing) Horowitz, Michael (2009-07-29). "Defending against the Clampi Trojan"...
8 KB (730 words) - 16:00, 5 June 2025
Alureon (category Distributed computing projects)
Storm botnet Trojan.Win32.DNSChanger ZeroAccess botnet Zeus (malware) Zombie (computing) "Win32_Alureon threat description – Microsoft Security Intelligence"...
13 KB (1,047 words) - 04:10, 19 January 2025
On Unix and Unix-like computer operating systems, a zombie process or defunct process is a process that has completed execution (via the exit system call)...
9 KB (1,344 words) - 12:33, 4 June 2025
In computing, a process is the instance of a computer program that is being executed by one or many threads. There are many different process models,...
16 KB (1,872 words) - 14:48, 8 November 2024
Apocephalus borealis (redirect from Zombie fly)
alters the behavior of bees and wasps. These flies are colloquially known as zombie flies and the bees they infect are colloquially known as zombees. Association...
10 KB (1,201 words) - 19:25, 3 July 2024
Botnet (redirect from Zombie network)
compared to zombies. A coordinated DDoS attack by multiple botnet machines also resembles a zombie horde attack. The process of stealing computing resources...
57 KB (5,396 words) - 00:38, 16 June 2025
Massachusetts Institute of Technology XML denial-of-service attack Xor DDoS Zombie (computing) Castelo1, Micah (17 June 2020). "Cyberattacks Increasingly Threaten...
17 KB (1,371 words) - 03:33, 24 October 2024
the "Zombie Cookie", aka Flash Cookie filings, forced Adobe Systems Inc. to stop processing flash cookies on 98% of all consumers' computing devices...
10 KB (1,216 words) - 05:33, 26 May 2025
In computing, a trojan horse (or simply trojan; often capitalized, but see below) is a kind of malware that misleads users as to its true intent by disguising...
19 KB (1,865 words) - 14:43, 18 April 2025
Smartphones and pedestrian safety (redirect from Phone zombie)
for smartphone-using pedestrians to use. The pejorative term smartphone zombie has been used to describe inattentive phone users; this phrase was sometimes...
11 KB (1,018 words) - 11:32, 27 May 2025
Counter-Strike (redirect from Counter-Strike Nexon: Zombies)
2013. In August 2014, Nexon announced Counter-Strike Nexon: Zombies, a free-to-play, zombie-themed spin-off, developed on the GoldSrc game engine. On September...
25 KB (1,999 words) - 23:25, 1 May 2025
Research Group of the Internet Research Task Force. The firm also tracks zombie computers, a primary source of spam. CipherTrust invented the TrustedSource...
2 KB (237 words) - 00:35, 28 February 2025
Computer worm (redirect from Worm (computing))
Timeline of computer viruses and worms Trojan horse (computing) Worm memory test XSS worm Zombie (computer science) Barwise, Mike. "What is an internet...
24 KB (2,746 words) - 17:13, 16 June 2025
HTTP cookie (redirect from Cookie (computing))
to the use of browser cache as a means of tracking users across sites. A zombie cookie is data and code that has been placed by a web server on a visitor's...
93 KB (10,943 words) - 12:06, 1 June 2025
Denial-of-service attack (redirect from "pulsing" zombies)
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable...
100 KB (11,468 words) - 13:05, 11 June 2025
Comparison of computer viruses (category Computing-related lists)
Security through obscurity Cyberwarfare Computer worm Spyware Virus hoax Zombie computer Vincentas (11 July 2013). "Computer Viruses in SpyWareLoop.com"...
17 KB (423 words) - 18:58, 11 January 2025
Zeliard 1990 Game Arts Sierra On-Line Zephyr 1994 New World Computing New World Computing Zeppelin: Giants of the Sky 1994 Ikarion Software Ikarion Software...
2 KB (52 words) - 07:46, 16 September 2024
Spamming (redirect from Spam (computing))
International Conference on Cognitive Computing and Information Processing(CCIP). International Conference on Cognitive Computing and Information Processing. IEEE...
64 KB (7,028 words) - 05:20, 12 June 2025
Z (disambiguation) (section Computing)
of Antz Ultraman Z, a 2020 tokusatsu series World War Z (film), a 2013 zombie horror film Attack Force Z, a 1982 film Z (EP) Z (My Morning Jacket album)...
7 KB (987 words) - 15:40, 22 February 2025
Realm of Impossibility (category Video games about zombies)
published by Electronic Arts in 1984. It was originally released in 1983 as Zombies by BRAM, a company formed by Edwards and a friend. BRAM previously developed...
9 KB (1,021 words) - 21:04, 23 July 2024
contemporary-home-computing.org. Retrieved 2016-12-19. "One Terabyte of Kilobyte Age | Digging through the Geocities Torrent". contemporary-home-computing.org. Retrieved...
19 KB (1,988 words) - 12:39, 17 June 2025