求一篇计算机类英文文献

来源:学生作业帮助网 编辑:作业帮 时间:2024/11/17 10:35:50
求一篇计算机类英文文献
xZˎ$GPmȲc3 m{FeFU+3#b XC;67cFj"#so_W~o7_}~o~+z}Wt'c1XUk;k_h~{U{ӚݙZSlyumz`[+݈FUkN~Z6ϜuU VI?۳8F9*wUbhY5bsn0K<3h;هsK;5H+7vkM;\!{7ڟUe_Cޞ ^ۊRYskf08YA৽t. -VݰFN*{nzeQBN`ZhgeMFwOyչ[1֟$5eF'%5 `yQ:JX@ JOx(Vʫ "Q^ !]tTaQ!BBMF'Rw0ڊ}$7=4hWq6bt"8 m>ga=S7YnHGلw lҪ̬șUj2ēmɉ\dUgTU}PĴM|Cv(|P0ZH $!e#@I.4i*Iuhkmr1C'bjjJ$a{iԧl<(s$tXʞy0X<x64἟lvk|k;V%NZWSYԻ,>z}APLsP%rADk'NG"Ac#Z<ݩ٨s&#ΣpԃчJջzx6Fؒ*,(ҙ~0Ս[T@N2;tfq׉1f->;$"L[P:fPU yD"J8K( NrD%yr/1$'!z3 rr6'?~l̰GoGr*"w >y=!΅bw '3"~[c@Ǣ&\%> G1'6{7@hGE}b gh9?|*^ 3tp5f>tcEr,ץYQ9u?vRD`8>Sm@\h j+~hK+xqBJQMkZ\wp dYYenMs (JZQ%YoB9 bF$`` R}vR3Cb΂$%Rbsߴ#R}r6֪_:y;W'c^jr?7 h%Z '-?TIVTz l'}Lk"HXAsH \&v-&)YKMčsH(({ޮ!TLN-5)GxL\N,SRnuJKi<1KKp<!MjB̵V3ǣ F)fITTjykδ\'bg.8: ?Y[)!ur {E`q2 EŷP˫A t}ƍS:C\ 0B+ FJCa?uAS4V[}Cx[խ[\܃VOu4,zH4Ӧԑ][Cppl"ՔZf3$fxr!Ggɓ=gvFY mSw#viKCckE)qnЈl1* {}#2'L-=N)w  $hɅ>(c*EޑfrIԃ"oUr|N>? &)7D*ՎXsq]d>DHN[e4[ <:!Pb a.64Ҍ7B,Q1Z5\[3HR*]3@45@#V#֯a/+>RS i Y4'^f>~We-Y=4j}-C2aM>s)xmb'qFs>oUهw>f1H&間o`,l`ij THYaYWzwtSQl񿩰/BDz%ϑp U/`e|G;v/as*ܪps (2h'm,uTsPx _1ڇz|5 ۫Z c$H-4j(pyy%Kإv+@D?89CBڱ,L|5Tf3n糸AI4d6hŽϟ /|&bDZHMB`/!vtayq_&IWu-*$vTOC9҅J.=-#IUU;=mOA{r j\MC-Mˡ25V "(oiЋ@<Ӝ^ 5ÊܚA+MiKɻT]+kn1i=f@)G[W'Oi~ 1V0FR h-~b^|?kqIb|&CI/Jmuj;p;x*nTlm8ERo,4j̦Fu|4-_(s}'*}cm[ڬ<:/Q-r ߊ cR|HƎ;5eEqζ) MP\1 x=9zx7~+jQ*\l0JtatZ8H8HmS/T & DP-w$T?&Kw%'|`k/qwW'ُqT;u/ yFp]'ڮ]X G'F<{04L4pQOl]-E$_\/~AT^;w e3\n q `R@0cȼ7NATqGwMSz) HP&?5ty,Ɔ&1^J8i˯ $*^^j

求一篇计算机类英文文献
求一篇计算机类英文文献

求一篇计算机类英文文献
Computer network virus and precautions
With the new network technology and application of the continuous rapid development of the computer network should
Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human
More inseparable from the lives of the community's reliance on them will keep growing. With
With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of
Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low
Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus
The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed
Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be
Will become increasingly important.
A computer virus
The definition of computer virus computer virus (Computer Virus) in the "people's republic of China
The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or
Computer program inserted in the damage or destruction of computer data functions, affecting computer use
Self-replication and can a group of computer instructions, or code. "
Second, network virus
With the development of network and the Internet, a wider spread, the greater New harm
The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional
The virus was not classified network virus this concept, because the development of networks, the traditional virus
The network also has a number of characteristics. Today's Internet virus is a broad notion of a
As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as:
"Love the back door", "Panda burning incense."
Third, network virus and the distinction between computer virus
The original common computer virus is nothing more than the devastating formatted hard drive, delete system
With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection
Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems
The pilot virus and infected executable file virus, in addition to a network virus
These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side
Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer
Source collapse of the network server worm.
Fourth, the network against virus
Network destructive virus, will directly affect the work of the network, ranging from lowering speed video
Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed
Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan,
But this figure is constantly rising year by year. The next few years, the size of the market will reach Security
60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong
Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ
Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows
Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine
For infection, it can spread through the entire network instant, or even within a very short period of time can be infected
Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers
There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda
Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company
All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high
Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease
The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network
More on the computer network the greater the harm caused by the virus.
V. network transmission of the virus Features
1. Infection fast: single machine environment, the virus can only be passed from one computer diskette
To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement
Set against a typical PC network use in normal circumstances, once a computer workstation sick
Drugs, and will be online within 10 minutes in the several hundreds of all infected computers.
2. Proliferation of a wide range: in the network due to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬
Inter spread to thousands of miles away.
3. Dissemination in the form of complex and varied: computer viruses in general through the network "
Station server workstation "channels of communication, but in the form of complex and diverse communication.
4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents
Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work
Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal
The work of a workstation is likely to be on-line by another workstation virus infection. Therefore,
Only workstations in addition to killing viruses, and can not solve the virus harm to the network is.
6, the type of network virus
As the network increasingly developed, the type of network virus has been increasing, generally summed up as
The following categories:
1. Worm
It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network
And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex
A worm virus. The virus used Microsoft's Windows operating system, computer flu
With this virus, will continue to automatically dial-up Internet access and use information in the document or the address
Sharing network spreads, and ultimately undermine the most important user data.
2. Macro Virus
Hong virus is a Storage in the document or template in the Acer computer virus. The prefix
Macro, once open such documents, which Acer will be implemented, then the virus would Acer
Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since
The document will be kept moving "infection" that the Hong virus, and if other users opened the flu
Documents with the virus, the Hong virus will be transferred to his computer.
3. Destructive procedures virus
The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself
Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users
Computer generated destruction. If C formatted disk (Harm.formatC.f), the killer orders (Harm.
Command.Killer).
4. System virus
The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses
The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file,
And through these documents for dissemination. If the CIH virus.
5. Backdoor virus
Backdoor virus prefix is Backdoor. The total of such virus through network -
Sowing, opened the back door to the system to the user and potential safety problems.
6. Bundling machine virus
Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use
Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on the surface
It is normal to see the paper, when users run these bundled virus, will run these applications on the surface
Procedures, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled
Tied QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys).
7. Script virus
The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually
Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information,
Computer user inconvenience caused.
8. Planting procedures virus virus
This virus is of the public will run from the in vivo release of one or several new
Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing
(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag).
9. Joke virus
The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation,
When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact
The virus did not destroy any computer user. Such as: ghost (Joke.Girlghost) virus.
10. Trojan hacking virus
Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special
Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world
User information, hackers virus there is a visual interface to the user's computer remotely
Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users
Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ
News tail Trojan Trojan.QQ3344, there are big Trojan.LMir.PSW.60. Virus Form
A PSW or anything like PWD general said that the virus has stolen password function,
If some hacker programs, such as network枭雄Hack.Nether.Client.
7, the mode of transmission and network anti-virus
Through the above, we can see that e-mail viruses spread Click homepage, users download,
Others implant, implant, and other loopholes through five computer transmission, so long as holding these five
A thoroughfare, we will be able to live better anti-virus network.