1、 附录 A 中英文翻译 With the computer in all areas of social life, the extensive use of computer virus attacks and prevention techniques are expanding. According to reports, the world suffer from computer virus infections and attacks of hundreds of millions of events, which seriously interferes with the nor
2、mal life of human society, to the computer networks and systems have brought tremendous potential threats and destruction. At the same time, the virus also in the field of war, widely used in the Gulf War, the recent Kosovo war, both sides have used computer viruses to attack enemy, destroy the oppo
3、nents computer networks and weapons control systems, to a certain political objectives and military objectives. Can be expected, with the computer, the growing popularity of Internet use, in-depth to prevent computer viruses will be more and more national attention. A computer virus is a group by co
4、pying itself to infect other software programs. When the program runs, the embedded virus also will be run and infect other programs. Some viruses do not attack with a malicious code, but more carriers of the virus carrying code, if it is pre-configured environment for excitation, to infection and d
5、estruction. Maurice compiled from 80 of the first worm virus program so far, the world has appeared in many different types of viruses. It has long been the main goal of computer design is the pursuit of improved information processing capabilities and lower production costs, and inadequate attentio
6、n to security problems are. The various components of a computer system, interface interface, conversion between various levels, there are many loopholes and weak links. Hardware design even consider the lack of overall security, software, there are also more risks and potential threats. Testing of
7、computer systems, the current lack of automated software testing tools and a complete inspection means, the vulnerability of computer systems for the generation and dissemination of computer viruses provides an opportunity; the global World Wide Web (www) so that the Earth Village and the implementa
8、tion of the computer virus to create a space; new computer technology / url in the continuous application of electronic systems for the realization of computer viruses, the objective conditions. Experts believe that the distributed data processing, re-programming embedded computers, network communic
9、ations, computer standardization, software standardization, the standard message format, a standard data link, have made it possible for computer viruses. Implementation of computer viruss core technology is an effective solution injected into the virus. Which targets a variety of other systems, and
10、 from the computer host to a variety of sensors, bridges, etc., so that their computers are at a critical time trick or collapse, can not play a role. Current research from the foreign point of view, the virus injection methods are the following: 1. Radio mode. Mainly through the radio transmitting
11、the signature to the other electronic systems. This approach is the best way into the computer virus, while technical difficulties are greatest. Possible ways are: the other electronic systems directly to the radio receiver or transmitter device, so the receiver to process it and spread the virus to
12、 the target. posing as legitimate wireless transmission of data. Obtained or used according to standard protocols and data formats of radio transmission, emission pattern, to enable lawful transmission signal mixed into the receiver, and then enter the information network. looking for other informat
13、ion systems to protect the worst place to put the virus injection. Unprotected by the other data link will transmit the virus to be protected or the target of the link. 2. Cure approach. That the virus prior to the hardware store (such as chips) and software, then the hardware and software, directly
14、 or indirectly delivered to each other, so that the virus directly transmitted to the other electronic system to activate when needed to achieve the attack purpose. This attack is very subtle, even if the chip or component is thoroughly checked, it is difficult to ensure there are no other special f
15、eatures. At present, many computer components dependent on imports, the storm of this, the chip is vulnerable to attack. 3. Backdoor attacks. Back door, a computer security system in a small hole, or maintenance by the software designers invented to allow people who know of its existence to bypass n
16、ormal security measures into the system. Attacks in the form of back door there are many kinds, such as electromagnetic pulse can control the virus into the target system. Computer intruders often carried out through the back door attacks, such as the current widespread use of WINDOWS98, there is su
17、ch a back door. 4. Data control chain invasive. With the wide application of Internet technology to make computer viruses through the chain of computer systems, data control invasive as possible. Modification technique using the remote, you can easily change the data in the normal path of the contro
18、l chain. In addition to these methods, but also through other ways into the virus. Because computer viruses are likely to cause great losses to users, people began to try every means to carry out preventive measures. Approximate methods are the following: 1. Establishment of an effective computer virus protection system. Effective computer virus protection system should include multiple protection layers. One is access control layer; second layer of virus detection; third virus containing layer; Fourth, virus removal layer;