The document discusses botnets, which are collections of compromised machines controlled by a single entity. It describes the evolution and current state of botnets, how they are used for criminal activities like spam, fraud and denial of service attacks. It also outlines prevention, detection and response mechanisms to defend against botnets, and predicts that the arms race between botnet operators and defenders will continue as each side develops new techniques.