計(jì)算機(jī)病毒外文翻譯_第1頁
計(jì)算機(jī)病毒外文翻譯_第2頁
計(jì)算機(jī)病毒外文翻譯_第3頁
計(jì)算機(jī)病毒外文翻譯_第4頁
計(jì)算機(jī)病毒外文翻譯_第5頁
已閱讀5頁,還剩4頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、 廣西工學(xué)院鹿山學(xué)院外文翻譯 題 目: 計(jì)算機(jī)病毒 系 別: 計(jì)算機(jī)工程系 專業(yè)班級(jí): 計(jì)軟082班 姓 名: 周政 學(xué) 號(hào): 20081424 指導(dǎo)教師: 崔亞楠 職 稱: 二 一二 年 四 月 十一 日 computer viruscomputer viruses are a destructive program that can replicate itself and proliferation through the network, transmission. virus code is very small, usually attached to other document

2、s or procedures at the end, so they can easily hide in the system. ability to self-replicating virus on the network so that it can spread infection to other documents and procedures, once the virus spread to the network very difficult to track down.in 1987, computer viruses spread in the united stat

3、es, and the first computer virus small ball at the end of the year spread to our country. since then, has found a virus imported and domestic. so far, computer viruses has risen to more than 20,000 kinds; which can attack more than 90% of micro-computer.1. the characteristics of computer viruses(1)

4、the basic characteristics of(a) infection: a computer virus as a program that can replicate itself to other normal procedures or systems of certain components, such as the disk part of the guide. this is the basic characteristic of the virus program. with the increasingly extensive network developme

5、nt, computer viruses can be widely disseminated through the network in a short time.(b) latent: hidden in the infected system the virus does not immediately attack; the contrary, in its pre-attack, the need for a certain period of time or have certain conditions. within the incubation period, it doe

6、s not show any disruption of operations, making it difficult to find the virus and the virus can continue to spread. once a virus outbreak, it can cause serious damage.(c) can be triggered: once certain conditions, the virus began to attack. this feature can be triggered is called. take advantage of

7、 this characteristic, we can control its transmission range and frequency of attacks. conditions may trigger the virus is the default date, time, file type or frequency of the computer to start.(d) damage: the damage caused by computer viruses are a wide range of - it not only undermines the compute

8、r system, delete files, change data, but also occupied system resources, such as disruption of the machine running. its destruction of the designers attempt to show.(2) general characteristics(a) express impact: in 1984, dr. fred kordon allowed to use the unix operating system xax11 / 750 computer f

9、or virus experiments. in a number of experiments, computer paralyze the average time is 30 minutes, the shortest period of time for 5 minutes. typically, if the infected computer associated with the internet, then the virus can be transmitted in a matter of hours thousands of computers.(b) it is dif

10、ficult to eliminate: on the one hand, day after day a new virus or its variants; the other hand, some virus may be eliminated in the resurgence of, for example, re-use when an infected floppy disk.(c) vector characteristics: the spread of the virus can be used as the normal vector information, thus

11、avoiding the system we set up protective measures. in the normal operating system user, the virus stealthily control system. users may also consider him the system is running normal.(d) it is difficult to detect: the virus through a variety of ways beyond our control infection, in addition, with the

12、 illegal copying and the popularity of pirated software, virus detection more difficult.(e) to deceive the characteristics of: viruses often hide themselves to avoid being detected.2. the structure of computer virusescomputer viruses usually five components - infection fu, transmission modules, dama

13、ge module, trigger module and main control module.(1) infection atinfection fu, also known as virus signatures, a number of figures or characters from the ascii coding constitute. when the normal procedure of transmission of the virus when it left in the program as a virus infection at the signature

14、. virus infection in a program intended to, it first checks whether there is any infection site; if so, the procedure has been infected, the virus will not spread it further, and if not, on the transmission of it. the majority follow this one-time transmission of the virus. if the virus does not che

15、ck the site of infection, it may happen repeatedly transmitted, the length of the program would continue to increase, this situation is rare.(2) transmission modulethis is the transmission module boarding procedures. it completed three tasks: search executable file or document coverage, to check whe

16、ther the document has infected fu, transmitted it - if not found to be infected with fu, on the person boarding procedures writing virus code.(3) damage moduleit is responsible for the designers of the destruction in accordance with the virus code in an attempt to undermine the implementation of mis

17、sion, including delete files, delete data, formatted floppy disk and hard disk, reducing the efficiency and reduce the use of computer space.(4) trigger moduleits mission is to check whether the trigger conditions (for example, the date, time, resources, and transmission time, interrupt call, start

18、number, etc.). if the conditions are ripe, it return true value, and damage mediator module damage, otherwise it return false value.(5) the main control moduleits control of the four modules. in addition, it has procedures to ensure that the infected can continue to work correctly, the accident woul

19、d not crash happened.3. computer virus classification(1) by the parasitic categoryby parasitic, computer viruses can be divided into lead-virus, file virus and mixed virus. * boot virus: parasites in the disk guide means those parts of a computer virus. it is a common virus, the use of computer syst

20、ems do not usually check the guide part of the content is correct weaknesses, and retained in memory and monitor system operation, one has the opportunity to infection and destruction. according to the location of parasites in the disk, it can further be divided into the master boot record boot reco

21、rd viruses and paragraph virus. the former master boot hard drive transmission parts, such as marijuana virus, 2708 virus, porch virus; record paragraph of transmission of the virus commonly used hard drive record paragraphs, such as small ball virus, girl virus.(2) by the consequences of classifica

22、tionfrom the consequences of watch, computer viruses can be divided into benign viruses and vicious virus. benign virus would destroy data or programs, but it will not make computer systems paralyzed. initiator of the virus are most mischievous hackers - they created the virus is not in order to und

23、ermine the system, but in order to show off their technical capacity; some hackers use these viruses to disseminate their political thought and ideas, such as small ball virus and ambulance car virus. vicious virus would destroy data and systems, resulting in paralysis of the entire computer, such a

24、s the chi virus, porch virus. once the virus attack, the consequences will be irreparable.it should be noted that dangerous are a common feature of computer viruses. benign viruses are not dangerous, but the risk of the consequences of relatively light. virtuous is a relative concept. in fact, all c

25、omputer viruses are malignant.4. computer virus detection, elimination and prevention(1) computer virus detectionat present, caused by computer viruses in software and hardware failures cause increasingly serious damage. most failures happen with the virus. in the computer by the computer virus infe

26、ction or virus attack, there will be anomalies. through the observation of these anomalies, you can determine the computer whether the initial infection of computer viruses. the following anomalies may indicate that the computer virus has infected your computer:* procedures for loading longer than u

27、sual.* the size of executable files change.* visit to the hard drive longer.* print slowly.* screen some strange characters and unusual display.* some system failures, such as the system can not access the hard disk.* the actual memory size significantly smaller.* abnormal death.* program and data m

28、ysteriously disappeared.* abnormal sound from loudspeakers.(2) the elimination of computer viruses(a) the principle of the elimination of the virus* prior to the elimination of the virus, backup all important data to prevent loss.* use clean (no virus) the system disk to guide the computer, thereby

29、ensuring that the virus program to kill virus-free environment in the run, otherwise the virus will again have disinfection of infected documents.* to retain the guidance system of the order in the system will not boot recovery.* be careful when operating. repeatedly to check read and write data unt

30、il the beginning of the operation did not find any errors.(b) how to eliminate computer viruses?at present, in order to eliminate computer viruses, artificial methods or tools can be used; but most use the latter method.if it is found that part of the hard disk boot record has been destroyed, can be

31、 used to restore the correct boot record it. if any documents are found to be infected, use the normal document covering the same name it, or delete the file. all of these are artificial.(c) the prevention of computer virusesfirst, we must rely on the law and the fight against computer viruses. law

32、must be clear that the deliberate creation and dissemination of computer viruses is a crime. china has promulgated and implemented for the protection of information system security requirements. this reflects the work of computer security has embarked on the legal system. each person should attach i

33、mportance to computer security issues. secondly, we need to develop regulations and the implementation of management measures will be prevention as the fight against computer viruses transplantation major measures. specific measures include the following:* the use of an important sector of the compu

34、ter should be special plane, with external isolation;* do not use a source of unknown or unclear whether the infected floppy disks and cd-rom;* used with caution and common utility software;* contains important data in the floppy disk set write-protected. writing when the person, the temporary elimi

35、nation of protection, write protection, after re-setting.* regular inspection of computer systems and regular backup procedures;* use the hard disk boot. if you use a floppy disk, first of all virus-free floppy disk verification;* do not hesitate to lend to others floppy disk. if you have to lend, s

36、hould first make a backup disk, and also to re-format the disk;* when buying a new cd-rom or floppy disk, use the former should first check the virus; * upgrade to the computer equipped with the latest anti-virus software;* if possible, install on your computer anti-virus software;* strictly forbidd

37、en to play games on the computer, because the virus often parasitic in the game software;* internet-linked computer online or offline should have anti-virus system (firewall);* when you discover new viruses, timely reporting to the local computer security departments.anti-virus software tools can au

38、tomatically prevent, detect and eliminate computer viruses. use anti-virus tool is a speedy, efficient and accurate method. at present, there are many excellentanti-virus software tools, such as the kill 2000, kv300, av95, etc. and rising. use anti-virus software should upgrade to the latest version

39、, because new viruses are emerging. computer viruses and anti-struggle between a computer virus will continue. 計(jì)算機(jī)病毒計(jì)算機(jī)病毒是帶有破壞性的程序,它能夠自我復(fù)制并通過網(wǎng)絡(luò)擴(kuò)散、傳染。病毒代碼很小,通常附在其他文件或程序末尾,因此它們很容易隱藏在系統(tǒng)內(nèi)部。病毒的自我復(fù)制能力使其在網(wǎng)絡(luò)上傳播時(shí)能夠傳染給其他文件和程序,病毒一旦擴(kuò)散到網(wǎng)絡(luò)上就非常難以追蹤了。1987年,計(jì)算機(jī)病毒在美國四處蔓延,而且第一種計(jì)算機(jī)病毒“小球”在當(dāng)年年底傳播到我國。從那以后,已經(jīng)發(fā)現(xiàn)進(jìn)口和國內(nèi)的病毒。迄今為

40、止,計(jì)算機(jī)病毒已經(jīng)增加到20,000多種;其中90以上能攻擊微型計(jì)算機(jī)。1.計(jì)算機(jī)病毒的特征 (1)基本特征(a)傳染:計(jì)算機(jī)病毒作為一個(gè)程序,能自我復(fù)制到其他正常程序或者系統(tǒng)的某些部件上,例如磁盤的引導(dǎo)部分。這是病毒程序的基本特征。隨著網(wǎng)絡(luò)日益廣泛發(fā)展,計(jì)算機(jī)病毒能夠在短時(shí)間內(nèi)通過網(wǎng)絡(luò)廣泛傳播。(b)潛伏:隱藏在受感染系統(tǒng)內(nèi)的病毒并不立即發(fā)作;相反,在它發(fā)作前,需要一定時(shí)間或具備某些條件。在潛伏期內(nèi),它并不表現(xiàn)出任何擾亂行動(dòng),因此很難發(fā)現(xiàn)病毒并且病毒能夠繼續(xù)傳播。一旦病毒發(fā)作,它能造成嚴(yán)重破壞。(c)可觸發(fā)性:一旦具備某些條件,病毒便開始攻擊。這一特征稱作可觸發(fā)性。利用這一特征,我們能控制其

41、傳染范圍和攻擊頻率。觸發(fā)病毒的條件可能是預(yù)設(shè)的日期、時(shí)間、文件種類或計(jì)算機(jī)啟動(dòng)次數(shù)等。(d)破壞:計(jì)算機(jī)病毒造成的破壞是廣泛的它不僅破壞計(jì)算機(jī)系統(tǒng)、刪除文件、更改數(shù)據(jù)等,而且還能占用系統(tǒng)資源、擾亂機(jī)器運(yùn)行等。其破壞表現(xiàn)出設(shè)計(jì)者的企圖。(2)一般特征(a)快速影響:1984年,弗雷德科登博士獲準(zhǔn)在使用unix操作系統(tǒng)的xax11 / 750計(jì)算機(jī)上進(jìn)行病毒實(shí)驗(yàn)。在多次實(shí)驗(yàn)中,計(jì)算機(jī)癱瘓的平均時(shí)間為30分鐘,最短的時(shí)間為5分鐘。通常,如果受傳染的微機(jī)與因特網(wǎng)相聯(lián),則病毒在幾小時(shí)內(nèi)能傳染數(shù)千臺(tái)計(jì)算機(jī)。(b)難以消除:一方面,日復(fù)一日出現(xiàn)新病毒或其變種;另一方面,一些病毒在被消除后可能死灰復(fù)燃,例如在

42、重新使用受感染的軟盤時(shí)。(c)載體特征:病毒能夠作為載體傳播正常信息,因而避開我們?cè)谙到y(tǒng)中設(shè)置的保護(hù)措施。在用戶正常操作系統(tǒng)時(shí),病毒偷偷控制系統(tǒng)。用戶可能還認(rèn)為他的系統(tǒng)運(yùn)行正常。(d)難以探測:病毒通過各種超出我們控制的方式傳染,此外,隨著非法復(fù)制和盜版軟件大行其道,病毒探測變得更加困難。(e)欺騙特征:病毒往往隱藏自己,避免被探測到。2計(jì)算機(jī)病毒的結(jié)構(gòu)計(jì)算機(jī)病毒通常由五部分構(gòu)成感染符、傳染模塊、破壞模塊、觸發(fā)模塊和主要控制模塊。(1)感染符感染符也稱作病毒簽名,由若干數(shù)字或字符的ascii編碼構(gòu)成。當(dāng)病毒傳染正常程序時(shí),它在程序上留下病毒簽名作為感染符。在病毒打算傳染一個(gè)程序時(shí),它首先檢查是

43、否有感染符;如果有,程序就已經(jīng)被感染,病毒不會(huì)進(jìn)一步傳染它,如果沒有,就傳染它。多數(shù)病毒遵循這種一次性傳染。如果病毒不檢查感染符,則可能發(fā)生多次傳染,該程序的長度將不斷增加,這種情況很少見。(2)傳染模塊這是傳染寄宿程序的模塊。它完成三項(xiàng)任務(wù):查找可執(zhí)行的文件或被覆蓋的文件,檢查該文件上是否有感染符,傳染它如果沒有發(fā)現(xiàn)感染符,就在寄宿程序中寫人病毒編碼。(3)破壞模塊它負(fù)責(zé)按照病毒設(shè)計(jì)者在破壞編碼中的企圖執(zhí)行破壞任務(wù),包括刪除文件、刪除數(shù)據(jù)、格式化軟盤和硬盤、降低計(jì)算機(jī)效率和減少使用空間等。(4)觸發(fā)模塊其任務(wù)是檢查是否具備觸發(fā)條件(例如,日期、時(shí)間、資源、傳染時(shí)間、中斷調(diào)用、啟動(dòng)次數(shù)等)。如

44、果條件成熟,它返回“真”值,并且調(diào)人破壞模塊進(jìn)行破壞,否則它返回“假”值。(5)主要控制模塊它控制上述四個(gè)模塊。此外,它還確保受傳染的程序能繼續(xù)正常工作,在意外情況下不會(huì)發(fā)生死機(jī)。3計(jì)算機(jī)病毒分類(1)按寄生分類按寄生,計(jì)算機(jī)病毒可分成引導(dǎo)病毒、文件病毒和混合病毒。引導(dǎo)病毒:指寄生在磁盤引導(dǎo)部分的那些計(jì)算機(jī)病毒。它是一種常見病毒,利用計(jì)算機(jī)系統(tǒng)通常不檢查引導(dǎo)部分的內(nèi)容是否正確的弱點(diǎn),并且留存在內(nèi)存中,監(jiān)視系統(tǒng)運(yùn)行,一有機(jī)會(huì)就傳染和破壞。按寄生在磁盤的位置,它能進(jìn)一步分成主引導(dǎo)記錄病毒和段引導(dǎo)記錄病毒。前者傳染硬盤的主引導(dǎo)部分,例如“marijuana”病毒、“2708”病毒、“porch”病毒;段記錄病毒傳染硬盤上的常用段記錄,例如“小球”病毒、“女孩”病毒等。(2)按

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論