资源新版在线天堂-桌下含校园污肉高h-坠落女教师-椎名由奈在线播放-六月色婷婷-六月丁香婷婷天天在线

食品伙伴網服務號
 
 
當前位置: 首頁 » 專業英語 » 資源技巧 » 正文

Computer Viruses

放大字體  縮小字體 發布日期:2005-09-06

 

    The computer virus is an outcome of the computer overgrowth in  the 1980sThe  cause  of  the  term "computer  virus" is the likeness between the biological virus and the evil program infected with computersThe origin of this term came from an American science fiction The  Adolescence of P1“ written  by Thomas J. Ryanpublished in 1977Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer virusesare small programs. They replicate by attaching a copy of themselves to another program.

   Once attached to me host Programthe viruses then look for other programs to "infect"In this way he virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system At some pointdetermined by how the virus was programmed the virus attacksThe timing of the attack can be linked to a number of situationsincluding a certain time or date the presence of a particular filethe security privilege level of the userand the number of times a file is usedLikewisethe  mode  of  attack variesSocalled "benign"  viruses might simply display a messagelike the one that infected IBMs main computer system last Christmas with a season's greetingMalignant  viruses  are  designed to damage the systemThe attack is to wipe out data to delete flies or to format the hard disk.

What Kind of Viruses Are There

There are four main types of viruses: shell, intrusive, operating  system  and  source  ode

    Shell viruses wrap themselves around a host program and don't modify the original programShell programs are easy to writewhich is why about half of viruses are of this type

    Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host programIntrusive viruses are hard to write and very difficult to remove without damaging the host file.

    Shell and intrusive viruses most commonly attack executable program fliesthose with acorn orexe extension although data flies are also at some risk

    Operating system viruses work by replacing parts of the operating system with their own logicIt is very difficult to write operating system viruses and these viruses have the ability once booted up to take total control of your SystemFOF examplesome operating system viruses have hidden large amounts of attack logic in falsely marked bad disk sectors

    Source code viruses are intrusive programs and they are also inserted into a source program such as those written in Pascal prior to the program being compliedThere are the leastcommon viruses because they are not only hard to writebut also have a limited number of hosts compared to the other types

Be Wary of the Second Network Viruses

    Do you believe it Network viruses can steal moneySo far Internet has become the main channel through which the computer viruses spreadLookhere come the second network computer virusesEven without "snatching" information from  the network your computer can be infected by the second network computer viruses which are hidden in some machines on the network Your computer is so to speak in danger once being connected to the network to browse

    The virus that can steal your money belongs to a kind of the second network viruses.  It was designed and put in some machines on the network When your computer is linked to one of these machinesthe virus will invade your hard disk and search whether Intuit Quicken an accounting software is installed One of this accounting software's functions is to transfer accounts automatically. Once infected your money will be transferred to an additional account opened by the virus program without anybody knowing it

 

  

計算機病毒

    計算機病毒是八十年代計算機飛速發展帶來的結果,計算機病毒這一名詞起因于在計算機上傳染的有害程序與生物學中病毒的相似性,該名詞起源于1977年出版的、由 Thomas J Ryan寫的一本美國科幻小說《p-1的青春》。人體病毒入侵活的細胞后,就把它轉變成制造病毒的工廠。而計算機病毒是一些小程序,它們把自己的一個副本附加到另一個程序上面進行復制。

    病毒程序一旦附加到一個主程序上,就開始尋找其他可以進行“感染”的程序。這樣,病毒就很快地布滿整個硬盤,如果病毒感染了一個局域網或者一個多用戶系統,那么就在整個組織內進行擴散。只有在某個點上病毒程序才會發作(這是由病毒程序的設計所決定的)。攻擊的時間與多種情況有關,包括:某個時間或日期、特定用戶識別符的出現、用戶的安全保密等級和一個文件使用的次數。同樣,攻擊的方式也是各種各樣的。所謂的“良性”病毒可能只是簡單地顯示一個消息,如在去年圣誕節時,受感染的IBM公司的主要計算機系統顯示節日問候。惡性病毒被設計出來破壞系統。常見的攻擊方式是消除數據、刪除文件或者格式化硬盤。

病毒程序有哪幾種?

    有四種類型的病毒程序:外殼型、入侵型、操作系統型和源碼型。

    外殼型病毒將它們自己包裹在主程序的四周,對源程序不作修改。外殼型病毒容易編寫,這也正是約有一半病毒程序是這種類型的原因。

    入侵型病毒侵入已有的程序,實際上是把病毒程序的一部分插入到主程序中。入侵型病毒難以編寫,在去除它們時常常會破壞主文件。

    外殼型和入侵型病毒通常攻擊可執行文件,即帶有.COM或.EXE擴展名的文件。當然數據文件也有受攻擊的危險。

    操作系統型病毒發作時用自己的邏輯代替部分操作系統。這些病毒程序的編寫非常困難,它們一旦得手就有能力控制整個系統。例如,一些操作系統型病毒把自身的邏輯隱藏在那些標識“壞”的磁盤扇區中。

  源碼型病毒是入侵程序,它們在程序被編譯之前插入到諸如用PASCAL編寫的源程序中,它們是最少見的病毒程序,因為它們不僅編寫困難,而且與其他類型的病毒相比,受它們破壞的主程序數目也有限。

 

 

小心第二代網絡病毒

    相信嗎?網絡病毒會偷錢! 目前,因特網已成為電腦病毒傳播的主要渠道。瞧,第二代網絡病毒又來了。無需從網上“抓取”資料,你的機器就會感染上第二代網絡病毒,這種病毒匿藏于網絡上的一些機器中。一旦連接上網測覽,你的機器就可以說是處于危險之中了。

 

 

    會偷錢的病毒屬第二代網絡病毒。這種病毒被設計出來之后,就放置在網上的一些機器中。當你的計算機連接到這樣的機器上時,病毒就會入侵到其硬盤內,并搜尋其中是否裝有“Intuit Quicken”理財軟件。此理財軟件的功能之一就是自動轉帳。一旦感染第二代病毒,你的錢就會神不知鬼不覺地被病毒程序轉到它所建立的其他帳戶上了。

 

更多翻譯詳細信息請點擊:http://www.trans1.cn
 
[ 網刊訂閱 ]  [ 專業英語搜索 ]  [ ]  [ 告訴好友 ]  [ 打印本文 ]  [ 關閉窗口 ] [ 返回頂部 ]
分享:

 

 
推薦圖文
推薦專業英語
點擊排行
 
 
Processed in 0.396 second(s), 74 queries, Memory 1.26 M
主站蜘蛛池模板: 成人小视频在线观看免费| 97免费视频观看| 伊人久久大线蕉香港三级| 国产精品美女久久久久AV超清| 欧美顶级情欲片免费看| 真人做受120分钟免费看| 极品少妇伦理一区二区| 亚洲精品www久久久久久久软件| 国产成人a视频在线观看| 日本特黄的免费大片视频| 被老总按在办公桌吸奶头| 人曽交Z00Z0OA片| YELLOW视频直播在线观看| 欧美亚洲国产手机在线有码| a级毛片黄免费a级毛片| 欧美成人免费观看久久| wwwxxx日本护士| 三级叫床震大尺度视频| 国产a级午夜毛片| 无颜之月全集免费观看| 国产区在线不卡视频观看| 亚洲 欧洲 国产 日产 综合| 好紧好湿太硬了我太爽了小说| 亚洲午夜精品A片久久WWW软件| 久久精品国产欧美成人| 97超碰97资源在线观看视频| 全免费午夜一级毛片| 国产高清亚洲日韩字幕一区| 亚洲 欧美无码原创区| 久久91精品国产91久| 97精品视频| 色欲AV精品人妻一区二区三区| 国产亚洲精品久久精品69| 伊人久久精品AV一区二区| 女王黄金vk| 国产精品外围在线观看| 伊人色综合久久大香| 欧美亚洲日本日韩在线| 国产乱对白精彩在线播放| 一个人免费视频在线观看高清版| 辣文肉高h粗暴|