{"id":1015,"date":"2009-07-23T03:00:00","date_gmt":"2009-07-23T01:00:00","guid":{"rendered":"https:\/\/infopolicy.net\/?p=1015"},"modified":"2013-08-04T00:00:56","modified_gmt":"2013-08-03T22:00:56","slug":"","status":"publish","type":"post","link":"https:\/\/infopolicy.net\/en\/10-krupnejshih-amerikanskih-botneta\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ru_post_content":"\u042d\u0442\u043e \u0441\u0435\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u0432\u0435\u0431\u0441\u0430\u0439\u0442\u044b \u0441\u0432\u043e\u0438\u043c\u0438 DDoS \u0430\u0442\u0430\u043a\u0430\u043c\u0438.\r\n\u0423\u0436\u0435 \u043f\u043e\u0434\u0432\u0438\u0434 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0431\u0438\u0437\u043d\u0441\u0430 ;-)\r\n\r\nAmerica's 10 most wanted botnets\r\nRanked by size and strength, these are the 10 most damaging botnets in the U.S.\r\n\r\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a:\r\nhttp:\/\/www.networkworld.com\/news\/2009\/072209-botnets.html","_ru_post_name":"10-krupnejshih-amerikanskih-botneta","_ru_post_excerpt":"","_ru_post_title":"10 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0445 \u0431\u043e\u0442\u043d\u0435\u0442\u0430","_en_post_content":"","_en_post_name":"","_en_post_excerpt":"","_en_post_title":"","edit_language":"en","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[21],"tags":[],"class_list":["post-1015","post","type-post","status-publish","format-standard","","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pffTZ2-gn","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1011,"url":"https:\/\/infopolicy.net\/en\/naibolee-vovlechennye-v-internet-miro\/","url_meta":{"origin":1015,"position":0},"title":"\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0432\u043e\u0432\u043b\u0435\u0447\u0435\u043d\u043d\u044b\u0435 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u043c\u0438\u0440\u043e\u0432\u044b\u0435 \u0431\u0440\u044d\u043d\u0434\u044b","author":"infopolicy","date":"20.07.2009","format":false,"excerpt":"\u041f\u043e\u0441\u0432\u044f\u0449\u0430\u0435\u0442\u0441\u044f \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044e http:\/\/twitter.com\/Alivaria\/ \u0412 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0438 \u0443\u0447\u0430\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u043e 100 \u0431\u0440\u044d\u043d\u0434\u043e\u0432. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u043b\u0438\u0441\u044c \u0442\u0430\u043a\u0438\u0435 \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430: \u0431\u043b\u043e\u0433\u0438, Facebook, Twitter, wiki, \u0444\u043e\u0440\u0443\u043c\u044b. \u0414\u0435\u0441\u044f\u0442\u043a\u0430 \u043b\u0438\u0434\u0435\u0440\u043e\u0432: 1. Starbucks (127) 2. Dell (123) 3. eBay (115) 4. Google (105) 5. Microsoft (103) 6. Thomson Reuters (101) 7. Nike (100) 8. Amazon (88) 9. SAP (86) 10. Tie \u2013\u2026","rel":"","context":"In &quot;\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430&quot;","block_context":{"text":"\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430","link":"https:\/\/infopolicy.net\/en\/category\/socialmedia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1356,"url":"https:\/\/infopolicy.net\/en\/top-10-samyh-dorogih-globalnyh-breendov\/","url_meta":{"origin":1015,"position":1},"title":"Top 10 \u0441\u0430\u043c\u044b\u0445 \u0434\u043e\u0440\u043e\u0433\u0438\u0445 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u044b\u0445 \u0431\u0440\u0435(\u044d)\u043d\u0434\u043e\u0432","author":"infopolicy","date":"23.12.2010","format":false,"excerpt":"MOST VALUABLE GLOBAL BRANDS (Millward Brown, Brandz) 1 Google \u00a373.4bn 2 IBM \u00a355.5bn 3 Apple \u00a353.4bn 4 Microsoft \u00a349bn 5 Coca-Cola \u00a343.5bn 6 McDonald's \u00a342.4bn 7 Marlboro \u00a336.6bn 8 China Mobile \u00a333.8bn 9 GE \u00a328.9bn 10 Vodafone \u00a328.5bn \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/www.mirror.co.uk\/news\/top-stories\/2010\/12\/23\/the-top-10-top-10s-of-2010-115875-22802177\/","rel":"","context":"In &quot;\u0420\u0435\u043a\u043b\u0430\u043c\u0430&quot;","block_context":{"text":"\u0420\u0435\u043a\u043b\u0430\u043c\u0430","link":"https:\/\/infopolicy.net\/en\/category\/advertising\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":21284,"url":"https:\/\/infopolicy.net\/en\/onlajn-gendernaya-dezinformatsiya-i-sek\/","url_meta":{"origin":1015,"position":2},"title":"\u041e\u043d\u043b\u0430\u0439\u043d \u0433\u0435\u043d\u0434\u0435\u0440\u043d\u0430\u044f \u0434\u0435\u0437\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0438 \u0441\u0435\u043a\u0441\u0438\u0441\u0442\u0441\u043a\u0430\u044f \u0440\u0435\u0447\u044c \u043d\u0435\u043d\u0430\u0432\u0438\u0441\u0442\u0438","author":"infopolicy","date":"19.05.2023","format":false,"excerpt":"\u0421\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0435 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0443\u0433\u0440\u043e\u0437\u0443 \u0433\u0435\u043d\u0434\u0435\u0440\u043d\u043e\u043c\u0443 \u0440\u0430\u0432\u0435\u043d\u0441\u0442\u0432\u0443, \u0434\u0435\u043c\u043e\u043a\u0440\u0430\u0442\u0438\u0438, \u043c\u0438\u0440\u0443 \u0438 \u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f\u043c - \u0432 \u043c\u0435\u0434\u0438\u0430 \u0438 \u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0430\u0445 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443 - \u0434\u043e\u0441\u0442\u0438\u0433\u043d\u0443\u0442\u044b\u043c \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 30 \u043b\u0435\u0442. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a \u043e\u043d\u043b\u0430\u0439\u043d \u0433\u0435\u043d\u0434\u0435\u0440\u043d\u0430\u044f \u0434\u0435\u0437\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0438 \u0441\u0435\u043a\u0441\u0438\u0441\u0442\u0441\u043a\u0430\u044f \u0440\u0435\u0447\u044c \u043d\u0435\u043d\u0430\u0432\u0438\u0441\u0442\u0438, \u0440\u0430\u0441\u0442\u0443\u0442 \u0441 \u0442\u0440\u0435\u0432\u043e\u0436\u043d\u043e\u0439 \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c\u044e, \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u043e\u0433\u0440\u043e\u043c\u043d\u044b. \u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 \u0433\u0435\u043d\u0434\u0435\u0440\u043d\u0430\u044f \u0434\u0435\u0437\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0438 \u0441\u0435\u043a\u0441\u0438\u0441\u0442\u0441\u043a\u0430\u044f \u0440\u0435\u0447\u044c\u2026","rel":"","context":"In &quot;Policy&quot;","block_context":{"text":"Policy","link":"https:\/\/infopolicy.net\/en\/category\/policy\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2023\/05\/gender_violence.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2023\/05\/gender_violence.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2023\/05\/gender_violence.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2023\/05\/gender_violence.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1309,"url":"https:\/\/infopolicy.net\/en\/15-naibolee-populyarnyh-sotsialnyh-sete\/","url_meta":{"origin":1015,"position":3},"title":"15 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2010","author":"infopolicy","date":"28.09.2010","format":false,"excerpt":"1 | facebook 2 - eBizMBA Rank | 550,000,000 - Estimated Unique Monthly Visitors | 3 - Compete Rank | 2 - Quantcast Rank | 2 - Alexa Rank. Most Popular Social Networking Websitess\u00a0|\u00a0Updated 9\/15\/2010\u00a0|\u00a0eBizMBA 2 | MySpace 19 - eBizMBA Rank | 90,500,000 - Estimated Unique Monthly Visitors |\u2026","rel":"","context":"In &quot;\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430&quot;","block_context":{"text":"\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430","link":"https:\/\/infopolicy.net\/en\/category\/socialmedia\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.ebizmba.com\/images\/logos\/facebook.gif?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":26853,"url":"https:\/\/infopolicy.net\/en\/gtig-ai-threat-tracker-analiz-eksperimentirovanie-i-prodolzhenie-integratsiya-ii-dlya-protivodejstviya-ugrozam\/","url_meta":{"origin":1015,"position":4},"title":"GTIG AI Threat Tracker: \u0430\u043d\u0430\u043b\u0438\u0437, \u044d\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 (\u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0435\u043d\u0438\u0435) \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u044f \u0418\u0418 \u0434\u043b\u044f \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0443\u0433\u0440\u043e\u0437\u0430\u043c","author":"infopolicy","date":"16.02.2026","format":false,"excerpt":"\u0412\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0412 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u043c \u043a\u0432\u0430\u0440\u0442\u0430\u043b\u0435 2025 \u0433\u043e\u0434\u0430 \u0433\u0440\u0443\u043f\u043f\u0430 Google Threat Intelligence Group (GTIG) \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0441\u0435 \u0447\u0430\u0449\u0435 \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u043a\u0443\u0441\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0438\u043d\u0442\u0435\u043b\u043b\u0435\u043a\u0442 (\u0418\u0418) \u0434\u043b\u044f \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u0438\u044f \u0436\u0438\u0437\u043d\u0435\u043d\u043d\u043e\u0433\u043e \u0446\u0438\u043a\u043b\u0430 \u0430\u0442\u0430\u043a\u0438, \u0434\u043e\u0431\u0438\u0432\u0430\u044f\u0441\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0432 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0435, \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0438\u0438 \u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e. \u042d\u0442\u043e\u0442 \u043e\u0442\u0447\u0435\u0442 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043d\u0430\u0448\u0438\u0445\u00a0\u0432\u044b\u0432\u043e\u0434\u043e\u0432 \u043e\u0442 \u043d\u043e\u044f\u0431\u0440\u044f 2025 \u0433\u043e\u0434\u0430\u00a0\u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u0440\u043e\u0433\u0440\u0435\u0441\u0441\u0430 \u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432\u2026","rel":"","context":"In &quot;Sztuczna Inteligencja (\u0418\u0418\/AI)&quot;","block_context":{"text":"Sztuczna Inteligencja (\u0418\u0418\/AI)","link":"https:\/\/infopolicy.net\/en\/category\/sztuczna-inteligencja-ii-ai\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2026\/02\/safety.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2026\/02\/safety.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2026\/02\/safety.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2026\/02\/safety.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2026\/02\/safety.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2026\/02\/safety.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":880,"url":"https:\/\/infopolicy.net\/en\/ddos-ataki-otgoloski-2007-goda\/","url_meta":{"origin":1015,"position":5},"title":"DDoS \u0430\u0442\u0430\u043a\u0438: \u043e\u0442\u0433\u043e\u043b\u043e\u0441\u043a\u0438 2007 \u0433\u043e\u0434\u0430","author":"infopolicy","date":"26.04.2009","format":false,"excerpt":"\u041d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u044b\u0435 \u0432\u0435\u0449\u0438 \u0432\u0441\u043f\u043b\u044b\u0432\u0430\u044e\u0442 \u043f\u043e \u043f\u0440\u043e\u0448\u0435\u0441\u0442\u0432\u0438\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043b\u0435\u0442. \u0414\u0435\u043f\u0443\u0442\u0430\u0442 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0434\u0443\u043c\u044b \u0438 \u0447\u043b\u0435\u043d \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0434\u0435\u043b\u0435\u0433\u0430\u0446\u0438\u0438 \u0432 \u041f\u0410\u0421\u0415 \u0421\u0435\u0440\u0433\u0435\u0439 \u041c\u0430\u0440\u043a\u043e\u0432 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0432\u0438\u0437\u0438\u0442\u0430 \u0432 \u0412\u0430\u0448\u0438\u043d\u0433\u0442\u043e\u043d \u0432 \u043c\u0430\u0440\u0442\u0435 2009 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b, \u0447\u0442\u043e \u0435\u0433\u043e \u043f\u043e\u043c\u043e\u0449\u043d\u0438\u043a \u0441\u0442\u043e\u044f\u043b \u0437\u0430 DDoS \u0430\u0442\u0430\u043a\u0430\u043c\u0438 \u043d\u0430 \u044d\u0441\u0442\u043e\u043d\u0441\u043a\u0438\u0435 \u0441\u0430\u0439\u0442\u044b \u0432 2007 \u0433\u043e\u0434\u0443. \u0426\u0438\u0442\u0430\u0442\u0430 \u0438\u0437 \u0441\u0442\u0430\u0442\u044c\u0438: \u0421\u0430\u043c\u044b\u0435 \u0433\u0440\u043e\u043c\u043a\u0438\u0435 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 17 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 1999\u2026","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/1015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/comments?post=1015"}],"version-history":[{"count":1,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/1015\/revisions"}],"predecessor-version":[{"id":4632,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/1015\/revisions\/4632"}],"wp:attachment":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media?parent=1015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/categories?post=1015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/tags?post=1015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}