Chris Pirillo: How Should Zombie Computers Be Stopped?

Learn more

About Chris:

Chris Pirillo is the founder of the tech blogging network, Lockergnome and previously served as host of TechTV’s Call for Help show. Chris’s insightful and entertaining how to videos will now be featured in the PC Pitstop newsletters and highlighted at and

You can follow Chris on Twitter and subscribe to his Youtube video channel here

 1,222 total views,  2 views today

(Visited 1 times, 1 visits today)

17 thoughts on “Chris Pirillo: How Should Zombie Computers Be Stopped?”

  1. Absolutely ISP’s should cut off computers that are infected.However I disagree with the screaming yoyo in the video. It should not be the ISP’s responsibility of the ISP to provide software and or any means to fix their computers.

    That should be directed to the maker of the operating system. Perhaps if enough people were cut off, and the company that made the extremely insecure operating system was forced to fix the computers they might actually take security more seriously.

    While certain companies making these operating systems have made great strides recently with the way those systems work there are still many, many known holes that are easily exploitable that simply don’t get plugged.

    If enough people got cut off from the internet by ISP’s and those people complained to said OS maker things might actually change, or people would smarten up and stop using inherently insecure systems. 😉

    I seriously believe that the number of people out there with infected machines is much higher than most suspect.

  2. Sebastian Vizciano

    So, Chris, peanut butter works on you? Maybe you should have taken a couple of spoonfulls before your fit! Less than a few yells would have gotten the point across!
    Otherwise a good article. Yes, bots should be quarentined.

  3. The average user has no idea what goes on inside their machine, in fact most only know how to turn it on and off. Can you imagine the implications of globally policing every computer connected to the web (which is already done) and issuing warnings and citations based on what your ISP deems appropriate is ignorant. If you download copyrighted material you will eventually be infected, that is fact, so don’t do it. What about the average person who searches a question and accidentally hits a malicious website and infects his computer. Shut the servers of the malicious websites down, it is that easy. To suggest policing personal computers based on what is considered appropriate content is unjustified unless you are purposefully doing it. In fact maybe my ISP will shut my service off because I use a Linux based operating system and consider it “rogue software”, beware, your computer is not yours it belongs to the cyber police. Remove that OS or you will be subject to fines and loss of service will popup on my screen. When will it all end?

  4. Glad I read through the comments before commenting myself. I may have made myself look like a mindless buffoon, as ***** did. Still, I really wish Chris P would think twice before doing something that offensive again. I’ve seen him get his point across humorously numerous times, so I know this bit was unnecessary. Still in all, thanks for the info. Good article.

  5. Owners of feral computers should be ticketed and subjected to yearly competency testing. Ditto for those with open networks which are used for nefarious purposes. Max Butler (and his pals) relied on anonymous access to perpetuate his multi million dollar credit card scam.

    Given the intelligence level of the average slob-on-the-street it can be assumed things will become more dire.

  6. Jeff, in explorertoolsfolder optionsview, check “show hidden files,” and uncheck “hide protected operation system files.” This may reveal what is there (windows 7). Reset to default later for safety.

    Let us know if it worked! Cheers.

  7. I agree, they should be allowed, but After informing the customer, not just cutting them off without any warning.

    Should be a common practice, or even a requirement.

    “Blaaahhhh-Blaaahhh-Blaaahhh.” Oh dear, I may be infected.

  8. I don’t think ISPs should be allowed to cut off zombie computers – they should be REQUIRED to!

    However, I also believe that they should not be allowed to charge the user they have disconnected until they have assisted them in disinfecting their machine and got the user back online.

    That would encourage ISPs to give far better support than many do at present (but would ultimately reduce their costs – how much of their bandwidth and mailserver capacity are consumed by zombies?)

  9. Jeff, it can be a system drive for backups and may look empty for normal user, but it could have data available when doing a system restore like HP, Dell..etc.

  10. WTFrack CP? Consider yourself warned. My respect 4 is ChrisP’s IQ, attitude & abilities is Exponentially decaying . NOTICE: A BOYCOTT & F/U COMPLAINT email to LeoLaporte is imminent IF I SEE CP DEMO THIS HORRID BEHAVIOUR ONCE MORE. Regretfully -AHW

  11. I had that happen too,Google hijacked your browser, and since Firefox/IE has them as their main search engine its no surprise…….Clear ALL your cookies and see if that works.

  12. Hello:
    I have a computer that is not infected by any virus, yet runs something that stops keyboard and mouse input. There is also a ghost drive on the main drive that takes half of the drive and reports that it is empty. Is this a new kind of zombie computer?

  13. …..I keep getting these annoying pop-up from what looks to be GOOGLE telling me of all the money that I can make by hooking up links..etc. etc..etc.. ” How can I stop this?”
    …..Thank You for any thing that will help..! E. L. Trent

Leave a Comment

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.