外文翻譯--淺談?dòng)?jì)算機(jī)病毒及防護(hù)_第1頁(yè)
已閱讀1頁(yè),還剩12頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、<p><b>  畢業(yè)設(shè)計(jì)(論文)</b></p><p><b>  外文翻譯</b></p><p>  題 目 淺談?dòng)?jì)算機(jī)病毒及防護(hù) </p><p>  專 業(yè) 信息管理與信息系統(tǒng) </p><p>  班 級(jí) XXXXXX

2、XX </p><p>  學(xué) 生 X X X </p><p>  指導(dǎo)教師 X X X </p><p><b>  高科學(xué)院</b></p><p><b>  2013 年</b></p&

3、gt;<p><b>  英文原文:</b></p><p>  Computer network virus and precautions</p><p>  With the new network technology and application of the continuous rapid development of the compu

4、ter network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human .More inseparable from the lives of the community's reliance on them will keep gro

5、wing. With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly</p><p>  First, A

6、computer virus </p><p>  The definition of computer virus computer virus (Computer Virus) in the "people's republic of China .The computer information system security protection regulations "wh

7、ich has been clearly defined, the virus" refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of com

8、puter instructions, or code. " </p><p>  Second, network virus </p><p>  With the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the

9、 Internet virus. The virus is an emerging concept in the traditional .The virus was not classified network virus this concept, because the development of networks, the traditional virus The network also has a number of c

10、haracteristics. Today's Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network virus</p><p>  Third, network virus and the

11、distinction between computer virus </p><p>  The original common computer virus is nothing more than the devastating formatted hard drive, delete system .With the users documents, databases, etc. destruction

12、. The mode of transmission is through nothing but also by virus infection .Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems.The pilot virus and inf

13、ected executable file virus, in addition to a network virus . These are the common characteristics of the virus, but a</p><p>  Fourth, the network against virus </p><p>  Network destructive vi

14、rus, will directly affect the work of the network, ranging from lowering speed video. Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed. Dan.

15、 Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by year. The next few years, the size of the market will reach Security . 60 bil

16、lion yuan. One antivirus software expe</p><p>  Fifth, network transmission of the virus Features </p><p>  1. Infection fast: single machine environment, the virus can only be passed from one c

17、omputer diskette .To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement .Set against a typical PC network use in normal circumstances, once a compu

18、ter workstation sick Drugs, and will be online within 10 minutes in the several hundreds of all infected computers. </p><p>  2. Proliferation of a wide range: in the network due to the spread of the virus v

19、ery quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in Inter spread to thousands of miles away. </p><p>  3. Diss

20、emination in the form of complex and varied: computer viruses in general through the network " Station server workstation "channels of communication, but in the form of complex and diverse communication. </p

21、><p>  4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents .Or low-level formatted drives, and other measures to eliminate the virus completely, and the ne

22、twork once a computer work .Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is likely to be on-line by another workstation v

23、irus infection. Therefore, Only workstations in addition to killing viruses, </p><p>  Sixth, the type of network virus </p><p>  As the network increasingly developed, the type of network virus

24、 has been increasing, generally summed up as the following categories: </p><p><b>  1. Worm </b></p><p>  It is the use of the transmission mechanism of replication and dissemination

25、 network, the mode of transmission is through the network .And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex A worm virus. The virus used Microsoft's Wind

26、ows operating system, computer flu .With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most &l

27、t;/p><p>  2. Macro Virus </p><p>  Hong virus is a Storage in the document or template in the Acer computer virus. The prefix Macro, once open such documents, which Acer will be implemented, then

28、the virus would Acer .Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since the document will be kept moving "infection" that the Hong virus, and if other

29、 users opened the flu documents with the virus, the Hong virus will be transferred to his computer. </p><p>  3. Destructive procedures virus </p><p>  The prefix destructive virus program is: H

30、arm. The characteristics of this virus is a good in itself look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users computer generated destruction. If C formatted dis

31、k(Harm.formatC.f), the killer orders (Harm. Command.Killer). </p><p>  4. System virus </p><p>  The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses the charact

32、eristics of the general public can be infected with the windows operating system *. exe and *. dll file, And through these documents for dissemination. If the CIH virus. </p><p>  5. Backdoor virus </p>

33、;<p>  Backdoor virus prefix is Backdoor. The total of such virus through network - Sowing, opened the back door to the system to the user and potential safety problems. </p><p>  6. Bundling machine

34、virus </p><p>  Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on

35、 the surface .It is normal to see the paper, when users run these bundled virus, will run these applications on the surface .Procedures, and then tied to the operation of hidden virus, which caused harm to the user. Such

36、 as: baled Tied QQ (Binder.QQPass.QQ Bin), the system killer (Binder.killsys). </p><p>  7. Script virus </p><p>  The virus is usually JavaScript scripting code prepared by the malicious code,

37、prefix is usually .Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience caused. </p><p>  8. Planting procedures virus

38、 virus </p><p>  This virus is of the public will run from the in vivo release of one or several new under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing

39、(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag). </p><p>  9. Joke virus </p><p>  The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itsel

40、f a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact the virus did not destroy any computer user. Such as: ghost (Joke.Girl

41、ghost) virus. </p><p>  10. Trojan hacking virus </p><p>  Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special sex is through the network or system loopholes into

42、 the user's system and hidden, and then leaked to the outside world user information, hackers virus there is a visual interface to the user's computer remotely control. Trojans, hackers often paired virus emergin

43、g, Trojan horse virus responsible for the invasive power users brain, and hackers virus will be passed to the Trojan horse virus control. . General Troja</p><p>  Seventh, Anti-virus software and other prev

44、entive measures</p><p>  Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-viru

45、s software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's mem

46、ory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy</p><p>  Some anti-virus programs are able to scan opened files in addition to sent and received e-mails

47、 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update t

48、heir software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to prevent the latest threats.</p><p>  One may also minimize the damage done by viruses by ma

49、king regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file

50、systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent).</p><p>  If a backup session on optical media like CD and DVD is closed, it becom

51、es read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installe

52、d operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives. </p><p><b>  中文翻譯

53、:</b></p><p>  計(jì)算機(jī)網(wǎng)絡(luò)病毒與防范</p><p>  隨著各種新的網(wǎng)絡(luò)技術(shù)的不斷應(yīng)用和迅速發(fā)展, 計(jì)算機(jī)網(wǎng)絡(luò)的應(yīng)用范圍變得越來(lái)越廣泛,所起的作用越來(lái)越重要, 計(jì)算機(jī)網(wǎng)絡(luò)與人類的生活更加密不可分, 社會(huì)對(duì)其的依賴程度也會(huì)隨之不斷增長(zhǎng)。而隨著計(jì)算機(jī)技術(shù)的不斷發(fā)展, 病毒也變得越來(lái)越復(fù)雜和高級(jí), 新一代的計(jì)算機(jī)病毒充分利用某些常用操作系統(tǒng)與應(yīng)用軟件的低防護(hù)性的弱點(diǎn)

54、不斷肆虐, 最近幾年隨著因特網(wǎng)在全球的普及, 將含病毒文件附加在郵件中的情況不斷增多, 通過(guò)網(wǎng)絡(luò)傳播病毒,使得病毒的擴(kuò)散速度也急驟提高, 受感染的范圍越來(lái)越廣。因此, 計(jì)算機(jī)網(wǎng)絡(luò)的安全保護(hù)將會(huì)變得越來(lái)越重要。</p><p><b>  一、計(jì)算機(jī)病毒</b></p><p>  計(jì)算機(jī)病毒的定義計(jì)算機(jī)病毒(Computer Virus)在《中華人民共和國(guó)計(jì)算機(jī)信息系

55、統(tǒng)安全保護(hù)條例》中被明確定義, 病毒“指編制或者在計(jì)算機(jī)程序中插入的破壞計(jì)算機(jī)功能或者破壞數(shù)據(jù), 影響計(jì)算機(jī)使用并且能夠自我復(fù)制的一組計(jì)算機(jī)指令或者程序代碼”。</p><p><b>  二、網(wǎng)絡(luò)病毒</b></p><p>  隨著網(wǎng)絡(luò)和Internet 的發(fā)展,一個(gè)傳播范圍更廣,危害更大的新型病毒應(yīng)運(yùn)而生.這就是網(wǎng)絡(luò)病毒。網(wǎng)絡(luò)病毒是一個(gè)新興的概念, 在傳統(tǒng)的病毒

56、分類里沒(méi)有網(wǎng)絡(luò)病毒這個(gè)概念, 由于網(wǎng)絡(luò)的發(fā)展, 傳統(tǒng)的病毒也就具有了一些網(wǎng)絡(luò)的特性。如今的網(wǎng)絡(luò)病毒是一個(gè)廣義的概念, 一般只要是利用網(wǎng)絡(luò)來(lái)進(jìn)行傳播、破壞的都可以被稱為網(wǎng)絡(luò)病毒, 如:“愛(ài)情后門”、“熊貓燒香”等。</p><p>  三、網(wǎng)絡(luò)病毒與計(jì)算機(jī)病毒的區(qū)別</p><p>  原先常見(jiàn)的計(jì)算機(jī)病毒的破壞性無(wú)非就是格式化硬盤, 刪除系統(tǒng)與用戶文件、破壞數(shù)據(jù)庫(kù)等等。而傳播途徑也無(wú)非是通

57、過(guò)遭病毒感染的軟件的互相拷貝, 攜帶病毒的盜版光盤的使用等, 如感染磁盤系統(tǒng)區(qū)的引導(dǎo)型病毒和感染可執(zhí)行文件的文件型病毒, 而網(wǎng)絡(luò)病毒除了具有普通病毒的這些特性外, 還具有遠(yuǎn)端竊取用戶數(shù)據(jù)、遠(yuǎn)端控制對(duì)方計(jì)算機(jī)等破壞特性, 比如特洛伊木馬病毒和消耗網(wǎng)絡(luò)計(jì)算機(jī)的運(yùn)行資源, 拖垮網(wǎng)絡(luò)服務(wù)器的蠕蟲病毒。</p><p><b>  四、網(wǎng)絡(luò)病毒的危害</b></p><p> 

58、 網(wǎng)絡(luò)上病毒破壞性大, 將直接影響網(wǎng)絡(luò)的工作, 輕則降低速度, 影響工作效率, 重則使網(wǎng)絡(luò)崩潰, 破壞服務(wù)器信息, 使多年工作毀于一旦。每年由于病毒等網(wǎng)絡(luò)欺詐行為導(dǎo)致的經(jīng)濟(jì)損失高達(dá)160 億多元,而且這個(gè)數(shù)字逐年還在不斷地攀升。未來(lái)幾年, 安防市場(chǎng)規(guī)模將達(dá)到600 億元。一位殺毒軟件專家指出: “網(wǎng)絡(luò)病毒更甚于禽流感”。如: “熊貓燒香”除了通過(guò)網(wǎng)站帶毒感染用戶之外, 此病毒還會(huì)通過(guò)QQ 最新漏洞傳播自身, 通過(guò)網(wǎng)絡(luò)文件共享、默認(rèn)共享、

59、系統(tǒng)弱口令、U 盤及窗體頂端窗體底端移動(dòng)硬盤等多種途徑傳播。而局域網(wǎng)中只要有一臺(tái)機(jī)器感染, 就可以瞬間傳遍整個(gè)網(wǎng)絡(luò), 甚至在極短時(shí)間之內(nèi)就可以感染幾千臺(tái)計(jì)算機(jī), 嚴(yán)重時(shí)可以導(dǎo)致網(wǎng)絡(luò)癱瘓。中毒癥狀表現(xiàn)為電腦中所有可執(zhí)行的.exe 文件都變成了一種怪異的圖案, 該圖案顯示為“熊貓燒香”, 繼而系統(tǒng)藍(lán)屏、頻繁重啟、硬盤數(shù)據(jù)被破壞等, 嚴(yán)重的整個(gè)公司局域網(wǎng)內(nèi)所有電腦會(huì)全部中毒?!靶茇垷恪眱H半個(gè)多月, 變種數(shù)已高達(dá)50 多個(gè), 并且其感染用戶的

60、數(shù)量不斷擴(kuò)大。使得感染“熊貓燒香”病毒的個(gè)人用戶已經(jīng)高達(dá)幾百萬(wàn), 企業(yè)用戶感染數(shù)更是成倍上升。網(wǎng)絡(luò)上的計(jì)算機(jī)越多, 網(wǎng)絡(luò)病</p><p>  五、網(wǎng)絡(luò)病毒傳播特點(diǎn)</p><p>  1.感染速度快: 在單機(jī)環(huán)境下, 病毒只能通過(guò)軟盤從一臺(tái)計(jì)算機(jī)帶到另一臺(tái), 而在網(wǎng)絡(luò)中則可以通過(guò)網(wǎng)絡(luò)通訊機(jī)制迅速擴(kuò)散。根據(jù)測(cè)定, 針對(duì)一臺(tái)典型的PC 網(wǎng)絡(luò)在正常使用情況, 只要有一臺(tái)工作站有病毒, 就可在幾

61、十分鐘內(nèi)將網(wǎng)上的數(shù)百臺(tái)計(jì)算機(jī)全部感染。</p><p>  2.擴(kuò)散面廣: 由于病毒在網(wǎng)絡(luò)中擴(kuò)散非??? 擴(kuò)散范圍很大, 不但能迅速傳染局域網(wǎng)內(nèi)所有計(jì)算機(jī), 還能通過(guò)遠(yuǎn)程工作站將病毒在一瞬間傳播到千里之外。</p><p>  3.傳播的形式復(fù)雜多樣: 計(jì)算機(jī)病毒在網(wǎng)絡(luò)上一般是通過(guò)“工作站服務(wù)器工作站”的途徑進(jìn)行傳播的, 但傳播的形式復(fù)雜多樣。</p><p>  

62、4.難于徹底清除: 單機(jī)上的計(jì)算機(jī)病毒有時(shí)可通過(guò)刪除帶毒文件或低級(jí)格式化硬盤等措施將病毒徹底清除, 而網(wǎng)絡(luò)中只要有一臺(tái)工作站未能消毒干凈就可使整個(gè)網(wǎng)絡(luò)重新被病毒感染, 甚至剛剛完成清除工作的一臺(tái)工作站就有可能被網(wǎng)上另一臺(tái)帶毒工作站所感染。因此,僅對(duì)工作站進(jìn)行病毒殺除, 并不能解決病毒對(duì)網(wǎng)絡(luò)的危害。</p><p><b>  六、網(wǎng)絡(luò)病毒的類型</b></p><p>

63、;  由于網(wǎng)絡(luò)越來(lái)越發(fā)達(dá), 網(wǎng)絡(luò)病毒的種類也越來(lái)越多, 大體歸納為以下幾類:</p><p><b>  1.蠕蟲病毒</b></p><p>  它的傳染機(jī)理是利用網(wǎng)絡(luò)進(jìn)行復(fù)制和傳播, 傳染途徑是通過(guò)網(wǎng)絡(luò)和電子郵件,前綴是Worm。比如近年危害很大的“尼姆達(dá)”病毒就是蠕蟲病毒的一種。這一病毒利用了微軟視窗操作系統(tǒng)的漏洞, 計(jì)算機(jī)感染這一病毒后, 會(huì)不斷自動(dòng)撥號(hào)上網(wǎng),

64、 并利用文件中的地址信息或者網(wǎng)絡(luò)共享進(jìn)行傳播, 最終破壞用戶的大部分重要數(shù)據(jù)。</p><p><b>  2.宏病毒</b></p><p>  宏病毒是一種寄存在文檔或模板的宏中的計(jì)算機(jī)病毒。前綴是Macro, 一旦打開這樣的文檔, 其中的宏就會(huì)被執(zhí)行, 于是宏病毒就會(huì)被激活, 轉(zhuǎn)移到計(jì)算機(jī)上, 并駐留在Normal 模板上。從此以后, 所有自動(dòng)保存的文檔都會(huì)“感

65、染”上這種宏病毒, 而且如果其他用戶打開了感染病毒的文檔, 宏病毒又會(huì)轉(zhuǎn)移到他的計(jì)算機(jī)上。</p><p><b>  3.破壞性程序病毒</b></p><p>  破壞性程序病毒的前綴是: Harm。這類病毒的特性是本身具有好看的圖標(biāo)來(lái)誘惑用戶點(diǎn)擊, 當(dāng)用戶點(diǎn)擊病毒時(shí), 病毒便會(huì)直接對(duì)用戶計(jì)算機(jī)產(chǎn)生破壞。如格式化C 盤(Harm.formatC. f) 、殺手命令

66、(Harm.Command.Killer) 等。</p><p><b>  4.系統(tǒng)病毒</b></p><p>  系統(tǒng)病毒的前綴為:Win32、PE、Win95、W32、W95 等。這些病毒的一般公有的特性是可以感染windows 操作系統(tǒng)的*.exe 和*.dll 文件,并通過(guò)這些文件進(jìn)行傳播。如CIH 病毒。</p><p><

67、b>  5.后門病毒</b></p><p>  后門病毒的前綴是Backdoor。該類病毒的共有特性是通過(guò)網(wǎng)絡(luò)傳播, 給系統(tǒng)開后門, 給用戶帶來(lái)安全隱患。</p><p><b>  6.捆綁機(jī)病毒</b></p><p>  捆綁機(jī)病毒的前綴是: Binder。這類病毒的特性是病毒作者會(huì)使用特定的捆綁程序?qū)⒉《九c一些應(yīng)用程

68、序如QQ、IE 捆綁起來(lái), 表面上看是正常文件, 當(dāng)用戶運(yùn)行這些捆綁病毒時(shí), 會(huì)表面上運(yùn)行這些應(yīng)用程序, 然后隱藏運(yùn)行捆綁在一起的病毒, 從而給用戶造成危害。如: 捆綁QQ(Binder.QQPass.QQBin) 、系統(tǒng)殺手(Binder.killsys) 等。</p><p><b>  7.腳本病毒</b></p><p>  腳本病毒通常是JavaScript

69、 代碼編寫的惡意代碼, 前綴是通常為Spript, 一般帶有廣告性質(zhì), 會(huì)修改您的IE 首頁(yè)、修改注冊(cè)表等信息,造成用戶使用計(jì)算機(jī)不方便。</p><p>  8.病毒種植程序病毒</p><p>  這類病毒的公有特性是運(yùn)行時(shí)會(huì)從體內(nèi)釋放出一個(gè)或幾個(gè)新的病毒到系統(tǒng)目錄下, 由釋放出來(lái)的新病毒產(chǎn)生破壞。如冰河播種者(Dropper.BingHe2.2C) 、MSN 射(Dropper.Wo

70、rm. Smibag)等。</p><p><b>  9.玩笑病毒</b></p><p>  玩笑病毒的前綴是: Joke。也稱惡作劇病毒。這類病毒的特性是本身具有好看的圖標(biāo)來(lái)誘惑用戶點(diǎn)擊,當(dāng)用戶點(diǎn)擊這類病毒時(shí), 病毒會(huì)做出各種破壞操作來(lái)嚇唬用戶, 其實(shí)病毒并沒(méi)有對(duì)用戶電腦進(jìn)行任何破壞。如: 女鬼( Joke.Girlghost) 病毒。</p>&

71、lt;p><b>  10.木馬黑客病毒</b></p><p>  木馬病毒其前綴是: Trojan, 黑客病毒前綴名一般為Hack。公有特性是通過(guò)網(wǎng)絡(luò)或者系統(tǒng)漏洞進(jìn)入用戶的系統(tǒng)并隱藏, 然后向外界泄露用戶信息, 黑客病毒則有一個(gè)可視的界面, 能對(duì)用戶的電腦進(jìn)行遠(yuǎn)程控制。木馬、黑客病毒往往是成對(duì)出現(xiàn)的, 木馬病毒負(fù)責(zé)侵入用戶的電腦, 而黑客病毒則會(huì)通過(guò)該木馬病毒來(lái)進(jìn)行控制。。一般的木

72、馬如QQ消息尾巴木馬Trojan. QQ3344, 還有大Trojan.LMir.PSW.60。病毒名中有PSW或者什么PWD 之類的一般表示這個(gè)病毒有盜取密碼的功能,一些黑客程序如網(wǎng)絡(luò)梟雄Hack.Nether.Client 等。</p><p>  七、 防病毒軟件和其他預(yù)防措施</p><p>  許多用戶安裝 防病毒軟件 可以檢測(cè)和消除計(jì)算機(jī)后已知病毒 下載 或運(yùn)行可執(zhí)行文件。有兩

73、種常見(jiàn)的方法,一個(gè) 防病毒軟件 應(yīng)用程序用來(lái)檢測(cè)病毒。第一個(gè),也是迄今發(fā)現(xiàn)的病毒最常見(jiàn)的方法是使用的清單 病毒特征 定義。通過(guò)檢查計(jì)算機(jī)的內(nèi)存內(nèi)容,這工程(其 內(nèi)存和 啟動(dòng)扇區(qū))和固定或可移動(dòng)驅(qū)動(dòng)器(硬盤驅(qū)動(dòng)器,軟盤驅(qū)動(dòng)器)中存儲(chǔ)的文件,并比較這些文件對(duì)一 數(shù)據(jù)庫(kù) 已知病毒的“簽名”。該檢測(cè)方法的缺點(diǎn)是,用戶只能從病毒侵襲,學(xué)前教育日最后的病毒定義更新。第二種方法是使用 啟發(fā)式 算法找到共同的行為為基礎(chǔ)的病毒。這種方法有能力檢測(cè)病毒,反

74、病毒安全公司尚未創(chuàng)建一個(gè)簽名。</p><p>  一些反病毒程序能夠掃描類似的方式,除了發(fā)送和接收電子郵件在飛行'打開的文件。這種做法稱為“按訪問(wèn)掃描?!狈床《拒浖荒芨淖冎鳈C(jī)軟件的基本傳播病毒的能力。使用者必須更新他們的軟件定期向 補(bǔ)丁 安全漏洞。防病毒軟件也需要定期更新,以防止最新的威脅。</p><p>  人們也盡量減少使病毒進(jìn)行經(jīng)常性的破壞 備份 數(shù)據(jù)(和操作系統(tǒng))以不

75、同媒體,是不是三緘其口無(wú)關(guān)的系統(tǒng)(大部分時(shí)間),只讀或其他原因沒(méi)有獲得,例如使用不同的 文件系統(tǒng)。這樣,如果數(shù)據(jù)是通過(guò)病毒的損失,可以重新開始使用備份(這是最近最好)。</p><p>  如果備份會(huì)議 光學(xué)媒體 喜歡 光盤 和 影碟 關(guān)閉,就變成只讀,可以不再受病毒影響的(只要病毒或受感染的文件沒(méi)有復(fù)制到的CD / DVD)。同樣,在操作系統(tǒng) 開機(jī) 光盤可用于啟動(dòng)計(jì)算機(jī),如果安裝的操作系統(tǒng)無(wú)法使用。移動(dòng)媒體上備

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論