Different Types of Internet Bots and How They Are Used

Internet bots are software applications that are used on the Internet for both legitimate and malicious purposes. Because of the increasing number of applications becoming available online, there are many different types of Internet bots that assist with running applications such as instant messenger and online gaming applications as well as analysis and gathering of data files.

Search engines use bots to index Web pages for ranking in search results. Bots are also used for delivery of media and live streaming for different types of browsers. Hackers also use bots to perform malicious acts on the Internet and to breach the security of PCs through the installation of malicious files.

Types of Legitimate Bots

There are many different types of bots that perform legitimate tasks on the Internet that would otherwise take a person a long time to execute. These types of bots serve a purpose and act as a time saver for different applications.

  • Spider Bots: These are used by the search engines to explore Web pages for content, organization and linking. Spider bots have certain criteria for indexing and determine the ranking of Web pages within the search results.
  • Trading Bots: These are bots that spider the online auction sites to locate the best deals on a specific product or service. In this case, a trading bot is used for commercial gain.
  • Media Bots: Media bots are used to provide updates on weather conditions, news and sports, currency exchange, and are used as censors in applications that run chat rooms and instant messenger programs.

Types of Malicious Bots

Bots are also used in a variety of ways to perform malicious acts and network security breaches.

  • Spam Bots: This type of bot spiders the Internet for the purpose of collecting data from forms that have been filled out online, spreading advertisements and pop-ups throughout the Internet, and collecting email addresses for the purpose of spamming.
  • Hacker Bots: Hackers use this type of bot to crawl around the Internet and find vulnerabilities in websites and online applications so they can exploit them for malicious purposes.
  • Botnets: Botnets are networks that hackers set up online by using "zombie" computers to perform malicious acts such as denial of service attacks. Zombie computers are computers that have been taken over by the hacker without the knowledge of the PC owner.
  • Download Bots: These are bots that are used to forcibly download a Web page that the hacker wants the surfer to see instead of a Web page that the surfer requested.
(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.