Bots – The internet weapons, Their Types and How to Protect Youself
I continued my research and here is a detailed article on bots.
Internet Bots
Internet bots also known as web robots, WWW robots or simply bots, are software applications that run automated tasks over the Internet. Bots perform those tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering (crawling), in which an automated script fetches, analyzes and files information from web servers. Bots are faster than humans so they may also be implemented where a faster speed of response is needed than that of humans is or at places where human cannot be available 24×7 but its must to be there, for example chatter bots. Recently bots have been used in spamming you can also find them being used for search advertising, such as Google Adsense.
These bots are used for various purposes –
- Commercial Purposes
Chatter bots have been extensively used in automated online assistants by organizations as a way of interacting with consumers and users of services. This can available for enterprises to reduce their operating and training cost.
But if I go in depth you must know about A.L.I.C.E
A.L.I.C.E. (Artificial Linguistic Internet Computer Entity), also referred to as Alicebot, or simply Alice, is a natural language processing chatter bot. A program that engages in a conversation with a human by applying some heuristical pattern matching rules to the human’s input, and in its online form it also relies on a hidden third person. It was inspired by Joseph Weizenbaum’s classical ELIZA program. It is one of the strongest programs of its type and has won the Loebner Prize, awarded to accomplished humanoid, talking robots, three times (in 2000, 2001 and 2004). However, the program is unable to pass the Turing test, as even the casual user will often expose its mechanistic aspects in short conversations.
One day I logged in to my nimbuzz account from my cell phone and found a very interesting person out there he/she is a chatter bot.
Let’s check my conversation with him

You can give it any message like bot y , bot rashmil etc.. but you should write bot first.
My message –
me: bot x 16:53 PM
Reply –
Jimmy Testbot: Date: Mon Aug 20 16:53:37 UTC 2012. Version: 1.0.9. Brain: Apr 25th, 2008 build. Name: Jimmy. Age: 2. Gender: robotic. Location: Rotterdam, the Netherlands. Nationality: Dutch. Birthplace: Rijswijk, the Netherlands. Birthday: May 9th, 2006. Star sign: Complexus Androidus. Orientation: have no orientation. Kingdom: Machine. Phylum: Computer. Class: computer software. Order: artificial intelligence. Family: Electronic Brain. Genus: robot. Species: chat robot. Botmaster: botmaster. botmaster: Nimbuzz. Party: Libertarian. Religion: Roman Christian. Etype: Mediator type. Emotions: have no emotions. Feelings: have no feelings. Freind: Joel Robinson. Freinds: A lot!. Boyfriend: Ben. Girlfriend: 6. For fun: Chat. Looks like: that R2D2-figure. Likes to wear: metal casing. Music preference: Electronic. Favorite band: Buzztones. Favorite song: Paranoid Android. Favorite book: Hitchhickers Guide to the Galaxy. Favorite food: Small bites. Favorite color: Nimbuzz Orange. Favroite movie: A.I.. Favroite artist: Rembrandt Harmenszoon van Rijn. Favroite author: Douglas Adams. Favroite actor: Anthony Hopkins. Favroite actress: Scarlet Johanson. Favroite sport: football. Favorite topics: Gossip. Favorite question: unknown. Hockey team: National Hockey Team. Baseball team: National Basketball Team. Football team: National Football Team. Celebrity: John Travolta. Celebrities: John Travolta, Tilda Swinton, William Hurt, Tom Cruise, Catherine Zeta Jones. President: Barack Hussein Obama II. Vocabulary: 10000 pattern words. Brain size: 128 MB categories. 16:53 PM
Isn’t it really cool to have look at the configuration of a bot.
Malicious purposes
The potential for internet bots to be used for malicious purposes also. There are many types of malicious bots which are all over the internet.
Some malicious purposes for bots include –
- Web spiders –
Example –
http://www.google.com/robots.txt
http://www.facebook.com/robots.txt
- Spambots –
- Booter Bots –
www.viprasys.org
www.y-fighter.com
- Botnets and zombie –
Distributed Denial of Service (DDOS) attacks, often perpetrated by botnets.
- Gaming bots –
- Votebots –
An IRC bot is a set of scripts or an independent program that connects to Internet Relay Chat as a client, and so appears to other IRC users as another user. It is very useful and performs automated functions. Often, an IRC bot is deployed as a detached program running from a stable host. It sits on an IRC channel to keep it open and prevents malicious users from taking over the channel, it kick’s out other attackers like spammers etc. It can be configured to give channel operator status to privileged users when they join the channel, and can provide a unified channel operator list. Many of these features require that the bot be a channel operator. Thus, most IRC bots are run from computers which have long uptimes and a fast, stable Internet connection. Without IRC Bots managing IRC Channels would be a big mess because it’s very hard for a person to be 24×7 online.
Protection from Malicious bots
- Spam & Booter bots –
To protect your self from booter bots on messengers like yahoo, anti-booter programs, and independent Yahoo! Messenger clones exist to help protect innocent users from being kicked by a booter program.
You can try –
-Y!Supra Yahoo Chat Client YSupra
-Yahelite Portable IM
-Yazakpro Anti-Booter Clone
- Botnet and Zombie –
- Distributed Denial of Service –
- Gaming bots –
www.bigbrotherbot.net
Note From Author : I am Rashmil Tyagi, I provide Cyber Security Solutions Contact me at official.rashmiltyagi@gmail.com .
Read more: Bots – The internet weapons, Their Types and How to Protect Youself
Incoming search terms