This chapter covers the following topics:
Cloud Computing: Although not specifically designed to be hacking tools, sniffers can be used to find many types of clear-text network traffic.
Botnets: This general class of tools and techniques can be used for denial of service, fake pharmaceuticals, fake goods, illegal software, bootleg music, or even potentially extortion.
This chapter introduces you to cloud computing and botnets. Cloud computing is a new consumption and delivery model for IT services. The ...