<s>
Bot	B-General_Concept
herders	I-General_Concept
are	O
hackers	O
who	O
use	O
automated	O
techniques	O
to	O
scan	O
specific	O
network	O
ranges	O
and	O
find	O
vulnerable	O
systems	O
,	O
such	O
as	O
machines	O
without	O
current	O
security	O
patches	O
,	O
on	O
which	O
to	O
install	O
their	O
bot	B-Protocol
program	O
.	O
</s>
<s>
The	O
infected	O
machine	O
then	O
has	O
become	O
one	O
of	O
many	O
zombies	O
in	O
a	O
botnet	B-Architecture
and	O
responds	O
to	O
commands	O
given	O
by	O
the	O
bot	B-General_Concept
herder	I-General_Concept
,	O
usually	O
via	O
an	O
Internet	B-Protocol
Relay	I-Protocol
Chat	I-Protocol
channel	O
.	O
</s>
<s>
One	O
of	O
the	O
new	O
bot	B-General_Concept
herders	I-General_Concept
includes	O
the	O
controller	O
of	O
Conficker	O
.	O
</s>
<s>
A	O
bot	B-General_Concept
herder	I-General_Concept
usually	O
uses	O
a	O
pseudonym	O
to	O
keep	O
themselves	O
anonymous	O
,	O
and	O
may	O
use	O
proxy	B-Application
servers	I-Application
,	O
shell	O
accounts	O
and	O
bouncers	O
to	O
conceal	O
their	O
IP	B-Protocol
address	I-Protocol
thus	O
maintaining	O
anonymity	O
.	O
</s>
