The compromised systems now have illicit programs, called zombies, installed on them. Traditionally, zombies have been Unix/Linux systems (because it is easy to program network services on these ...
Results that may be inaccessible to you are currently showing.