欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    计算机病毒外文翻译

    • 资源ID:125519       资源大小:22.64KB        全文页数:6页
    • 资源格式: DOCX        下载积分:100金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要100金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    计算机病毒外文翻译

    1、 附录 A 中英文翻译 With the computer in all areas of social life, the extensive use of computer virus attacks and prevention techniques are expanding. According to reports, the world suffer from computer virus infections and attacks of hundreds of millions of events, which seriously interferes with the nor

    2、mal life of human society, to the computer networks and systems have brought tremendous potential threats and destruction. At the same time, the virus also in the field of war, widely used in the Gulf War, the recent Kosovo war, both sides have used computer viruses to attack enemy, destroy the oppo

    3、nents computer networks and weapons control systems, to a certain political objectives and military objectives. Can be expected, with the computer, the growing popularity of Internet use, in-depth to prevent computer viruses will be more and more national attention. A computer virus is a group by co

    4、pying itself to infect other software programs. When the program runs, the embedded virus also will be run and infect other programs. Some viruses do not attack with a malicious code, but more carriers of the virus carrying code, if it is pre-configured environment for excitation, to infection and d

    5、estruction. Maurice compiled from 80 of the first worm virus program so far, the world has appeared in many different types of viruses. It has long been the main goal of computer design is the pursuit of improved information processing capabilities and lower production costs, and inadequate attentio

    6、n to security problems are. The various components of a computer system, interface interface, conversion between various levels, there are many loopholes and weak links. Hardware design even consider the lack of overall security, software, there are also more risks and potential threats. Testing of

    7、computer systems, the current lack of automated software testing tools and a complete inspection means, the vulnerability of computer systems for the generation and dissemination of computer viruses provides an opportunity; the global World Wide Web (www) so that the Earth Village and the implementa

    8、tion of the computer virus to create a space; new computer technology / url in the continuous application of electronic systems for the realization of computer viruses, the objective conditions. Experts believe that the distributed data processing, re-programming embedded computers, network communic

    9、ations, computer standardization, software standardization, the standard message format, a standard data link, have made it possible for computer viruses. Implementation of computer viruss core technology is an effective solution injected into the virus. Which targets a variety of other systems, and

    10、 from the computer host to a variety of sensors, bridges, etc., so that their computers are at a critical time trick or collapse, can not play a role. Current research from the foreign point of view, the virus injection methods are the following: 1. Radio mode. Mainly through the radio transmitting

    11、the signature to the other electronic systems. This approach is the best way into the computer virus, while technical difficulties are greatest. Possible ways are: the other electronic systems directly to the radio receiver or transmitter device, so the receiver to process it and spread the virus to

    12、 the target. posing as legitimate wireless transmission of data. Obtained or used according to standard protocols and data formats of radio transmission, emission pattern, to enable lawful transmission signal mixed into the receiver, and then enter the information network. looking for other informat

    13、ion systems to protect the worst place to put the virus injection. Unprotected by the other data link will transmit the virus to be protected or the target of the link. 2. Cure approach. That the virus prior to the hardware store (such as chips) and software, then the hardware and software, directly

    14、 or indirectly delivered to each other, so that the virus directly transmitted to the other electronic system to activate when needed to achieve the attack purpose. This attack is very subtle, even if the chip or component is thoroughly checked, it is difficult to ensure there are no other special f

    15、eatures. At present, many computer components dependent on imports, the storm of this, the chip is vulnerable to attack. 3. Backdoor attacks. Back door, a computer security system in a small hole, or maintenance by the software designers invented to allow people who know of its existence to bypass n

    16、ormal security measures into the system. Attacks in the form of back door there are many kinds, such as electromagnetic pulse can control the virus into the target system. Computer intruders often carried out through the back door attacks, such as the current widespread use of WINDOWS98, there is su

    17、ch a back door. 4. Data control chain invasive. With the wide application of Internet technology to make computer viruses through the chain of computer systems, data control invasive as possible. Modification technique using the remote, you can easily change the data in the normal path of the contro

    18、l chain. In addition to these methods, but also through other ways into the virus. Because computer viruses are likely to cause great losses to users, people began to try every means to carry out preventive measures. Approximate methods are the following: 1. Establishment of an effective computer virus protection system. Effective computer virus protection system should include multiple protection layers. One is access control layer; second layer of virus detection; third virus containing layer; Fourth, virus removal layer;


    注意事项

    本文(计算机病毒外文翻译)为本站会员(泛舟)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583