网络工程论文中英文对照外文翻译文献Word下载.docx

上传人:b****6 文档编号:16697512 上传时间:2022-11-25 格式:DOCX 页数:9 大小:25.44KB
下载 相关 举报
网络工程论文中英文对照外文翻译文献Word下载.docx_第1页
第1页 / 共9页
网络工程论文中英文对照外文翻译文献Word下载.docx_第2页
第2页 / 共9页
网络工程论文中英文对照外文翻译文献Word下载.docx_第3页
第3页 / 共9页
网络工程论文中英文对照外文翻译文献Word下载.docx_第4页
第4页 / 共9页
网络工程论文中英文对照外文翻译文献Word下载.docx_第5页
第5页 / 共9页
点击查看更多>>
下载资源
资源描述

网络工程论文中英文对照外文翻译文献Word下载.docx

《网络工程论文中英文对照外文翻译文献Word下载.docx》由会员分享,可在线阅读,更多相关《网络工程论文中英文对照外文翻译文献Word下载.docx(9页珍藏版)》请在冰豆网上搜索。

网络工程论文中英文对照外文翻译文献Word下载.docx

AccordingtoFredCohen’swell-knowndefinition,acomputervirusisacomputerprogramthatcaninfectothercomputerprogramsbymodifyingtheminsuchawayastoincludea(possiblyevolved)copyofitself.Notethataprogramdoesnothavetoperformoutrightdamage(suchasdeletingorcorruptingfiles)inordertobecalleda“virus”.However,Cohenusesthetermswithinhisdefinition(e.g.“program”and“modify”)abitdifferentlyfromthewaymostanti-virusresearchersusethem,andclassifiesasvirusessomethingswhichmostofuswouldnotconsiderviruses.

Computervirusesarebitsofcodethatdamageoreraseinformation,files,orsoftwareprogramsinyourcomputer,muchlikevirusesthatinfecthumans,computervirusescanspread,andyourcomputercancatchaviruswhenyoudownloadaninfectedfilefromtheInternetorcopyaninfectedfilefromadiskette.Oncethevirusesisembeddedintoyourcomputer’sfiles,itcanimmediatelystarttodamageordestroyinformation,oritcanwaitforaparticulardateoreventtotriggeritsactivity.

Whatarethemaintypesofviruses?

Generally,therearetwomainclassesofviruses.ThefirstclassconsistsofthefileInfectorswhichattachthemselvestoordinaryprogramfiles.Theseusuallyinfectarbitrary.COMand/or.EXEprograms,thoughsomecaninfectanyprogramforwhichexecutionisrequested,suchas.SYS,.OVL,.PRG,&

.MNUfiles.

Fileinfectorscanbeeitherdirectactionorresident.Adirect-actionvirusselectsoneormoreotherprogramstoinfecteachothertimetheprogramwhichcontainsitisexecuted,andthereafterinfectsotherprogramswhen“they”areexecuted(asinthecaseoftheJerusalem)orwhencertainotherconditionsarefulfilled.TheViennaisanexampleofadirect-actionvirus.Mostothervirusesareresident.

Thesecondclassissystemorboot-recordinfectors:

thoseviruses,whichinfectexecutablecode,foundincertainsystemareasonadiskthatarenotordinaryfiles.OnDOSsystems,thereareordinaryboot-sectorviruses,whichinfectonlytheDOSbootsectorondiskettes.ExamplesincludeBrain,Stoned,Empire,Azusa,andMichelangelo.Suchvirusesarealwaysresidentviruses.

Finally,afewvirusesareabletoinfectboth(theTequilavirusisoneexample).Thereareoftencalled“multipartite”viruses,thoughtherehasbeencriticismofthisname;

anothernameis“boot-and-file”virus.

Filesystemorclusterviruses(e.g.Dir-II)arethosethatmodifydirectorytableentriessothatthevirusisloadedandexecutedbeforethedesiredprogramis.Notethattheprogramitselfisnotphysicallyaltered;

onlythedirectoryentryis.Someconsidertheseinfectorstobeathirdcategoryofviruses,whileothersconsiderthemtobeasub-categoryofthefileinfectors.

Whataremacroviruses?

Manyapplicationsprovidethefunctionalitytocreatemacros.Amacroisaseriesofcommandstoperformsomeapplication-specifictask.Macrosaredesignedtomakelifeeasier,forexample,toperformsomeeverydaytasksliketext-formattingorspreadsheetcalculations.

Macroscanbesavedasaseriesofkeystrokes(theapplicationrecordwhatkeysyoupress);

ortheycanbewritteninspecialmacrolanguages(usuallybasedonrealprogramminglanguageslikeCandBASIC).Modernapplicationscombinebothapproaches;

andtheiradvancedmacrolanguagesareascomplexasgeneralpurposeprogramminglanguages.Whenthemacrolanguageallowsfilestobemodified,itbecomespossibletocreatemacrosthatcopythemselvesfromonefiletoanother.Suchself-replicatingmacrosarecalledmacroviruses.

MostmacrovirusesrununderWordforWindows.Sincethisisaverypopularwordprocessor,itprovidesaneffectivemeansforvirusestospread.MostmacrovirusesarewrittenusingthemacrolanguageWordBasic.WordBasicisbasedonthegoodoldBASICprogramminglanguage.However,ithasmany(hundredsof)extensions(forexample,todealwithdocuments:

edit,replacestring,obtainthenameofthecurrentdocument,opennewwindow,movecursor,etc.).

WhatisaTrojanhorseprogram?

Atypeofprogramthatisoftenconfusedwithvirusesisa‘Trojanhorse’program.Thisisnotavirus,butsimplyaprogram(oftenharmful)thatpretendstobesomethingelse.

Forexample,youmightdownloadwhatyouthinkisanewgame;

butwhenyourunit,itdeletesfilesonyourharddrive.Orthethirdtimeyoustartthegame,theprogramE-mailyoursavedpasswordstoanotherperson.

Note:

simplydownloadafiletoyourcomputerwon’tactivateavirusorTrojanhorse;

youhavetoexecutethecodeinthefiletotriggerit.Thiscouldmeanrunningaprogramfile,oropeningaWord/Exceldocumentinaprogram(suchasWordorExcel)thatcanexecuteanymacrosinthedocument.

Whatkindoffilescanspreadviruses?

Viruseshavethepotentialtoinfectanytypeofexecutablecode,notjustthefilesthatarecommonlycalled“programfiles”.Forexample,somevirusesinfectexecutablecodeinthebootsectoroffloppydiskorinsystemareasofharddrives.Anothertypeofvirus,knownasa“macro”virus,caninfectwordprocessingandspreadsheetdocumentsthatusemacros.Andit’spossibleforHTMLdocumentscontainingJavaScriptorothertypesofexecutablecodetospreadvirusesorothermaliciouscode.

Sincevirusescodemustbeexecutedtohaveanyeffect,filesthatthecomputertreatsaspuredataaresafe.Thisincludesgraphicsandsoundfilessuchas.gif,.jpg,.mp3,.wav,.etc.,aswellasplaintextin.txtfiles.Forexample,justviewingpicturefileswon’tinfectyourcomputerwithavirus.Theviruscodehastobeinaform,suchasan.exeprogramfileoraWord.docfilewhichthecomputerwillactuallytrytoexecute.

Howdovirusesspread?

ThemethodologyofvirusinfectionwasprettystraightforwardwhenfirstcomputervirusessuchasLehighandJerusalemstartedappearing.Avirusisasmallpieceofcomputercode,usuallyformseveralbytestoafewtensofbytes,thatcando,well,somethingunexpected.Suchvirusesattachthemselvestoexecutablefiles—programs,sothattheinfectedprogram,beforeproceedingwithwhatevertasksitissupposedtodo,callstheviruscode.Oneofthesimplestwaystoaccomplishthatistoappendtheviruscodetotheendofthefile,andinsertacommandtothebeginningoftheprogramfilethatwouldjumprighttothebeginningoftheviruscode.Afterthevirusisfinished,itjumpsbacktothepointoforiginationintheprogram.Suchviruseswereverypopularinthelateeighties.Theearlieronesonlyknewhowtoattachthemselvesto.Comfiles,sincestructureofa.COMfileismuchsimplerthanthatofan.EXEfile—yetanotherexecutablefileformatinventedforMS-DOSoperatingsystem.ThefirstvirustobecloselystudiedwastheLehighvirus.Itattacheditselftothefilethatwasloadedbythesystematboottime—COMMAND.COM.thevirusdidalotofdamagetoitshost,soafterthree-fourreplicationsitwasnolongerusable.Forthatreason,thevirusnevermanagedtoescapetheuniversitynetwork.

Whenyouexecuteprogramcodethat’sinfectedbyavirus,theviruscodewillalsorunandtrytoinfectotherprograms,eitheronthesamecomputeroronothercomputersconnectedtoitoveranetwork.Andthenewlyinfectedprogramswilltrytoinfectyetmoreprograms.

Whenyoushareacopyofaninfectedfilewithothercomputerusers,runningthefilemayalsoinfecttheircomputer;

andfilesfromthosecomputersmayspreadtheinfectiontoyetmorecomputers.

Ifyourcomputerifinfectedwithabootsectorvirus,thevirustriestowritecopiesofitselftothesystemareasoffloppydisksandharddisks.Thentheinfectedfloppydisksmayinfectothercomputersthatbootfromthem,andtheviruscopyontheharddiskwilltrytoinfectstillmorefloppies.

Someviruses,knownas‘multipartite’viruses,andspreadbothbyinfectingfilesandbyinfectingthebootareasoffloppydisks.

Whatdovirusesdotocomputers?

Virusesaresoftwareprograms,andtheycandothesamethingsasanyotherprogramrunningonacomputer.Theaccrualeffectofanyparticularvirusdependsonhowitwasprogrammedbythepersonwhowrotethevirus.

Somevirusesaredeliberatelydesignedtodamagefilesorotherwiseinterferewithyourcomputer’soperation,whileotherdon’tdoanythingbuttrytospreadthemselvesaround.Buteventheonesthatjustspreadthemselvesareharmful,sincetheydamagefilesandmaycauseotherproblemsintheprocessofspreading.

Notethatvirusescan’tdoanydamagetohardware:

theywon’tmeltdownyourCPU,burnoutyourharddrive,causeyourmonitortoexplode,etc.warningsaboutvirusesthatwillphysicallydestroyyourcomputerareusuallyhoaxes,notlegitimateviruswarnings.

ModernvirusescanexistonanysystemformMSDOSandWindow3.1toMacOS,UNIX,OS/2,WindowsNT.Someareharmless,thoughhardtocatch.TheycanplayajingleonChristmasorrebootyourcomputeroccasionally.Otheraremoredangerous.Theycandeleteorcorruptyourfiles,formatharddrives,ordosomethingofthatsort.Therearesomedeadlyonesthatcanspreadovernetworkswithorwithoutahost,transmitsensitiveinformationoverthenetworktoathirdparty,orevenmesswithfinancialdataon-line.

What’sthestoryonvirusesandE-mail?

Youcan’tgetavirusjustbyreadingaplain-textE-mailmessageorUsenetpost.Whatyouhavetowatchoutforareencodedmessagecontainingembeddedexecutablecode(i.e.,JavaScriptinHTMLmessage)ormessagethatincludeanexecutablefileattachment(i.e.,anencodedprogramfileoraWorddocumentcontainingmacros).

InordertoactivateavirusorTrojanhorseprogram,youcomputerhastoexecutesome

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 幼儿教育 > 家庭教育

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1