计算机病毒外文翻译

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

附录A中英文翻译

With the computer in all areas of social life, the extensive use of computer virus attacks and prevention techniques are expanding. According to reports, the world suffer from computer virus infections and attacks of hundreds of millions of events, which seriously interferes with the normal life of human society, to the computer networks and systems have brought tremendous potential threats and destruction. At the same time, the virus also in the field of war, widely used in the Gulf War, the recent Kosovo war, both sides have used computer viruses to attack enemy, destroy the opponent's computer networks and weapons control systems, to a certain political objectives and military objectives. Can be expected, with the computer, the growing popularity of Internet use, in-depth to prevent computer viruses will be more and more national attention.

A computer virus is a group by copying itself to infect other software programs. When the program runs, the embedded virus also will be run and infect other programs. Some viruses do not attack with a malicious code, but more carriers of the virus carrying code, if it is pre-configured environment for excitation, to infection and destruction. Maurice compiled from 80 of the first "worm" virus program so far, the world has appeared in many different types of viruses.

It has long been the main goal of computer design is the pursuit of improved information processing capabilities and lower production costs, and inadequate attention to security problems are. The various components of a computer system, interface interface, conversion between various levels, there are many loopholes and weak links. Hardware design even

consider the lack of overall security, software, there are also more risks and potential threats. Testing of computer systems, the current lack of automated software testing tools and a complete inspection means, the vulnerability of computer systems for the generation and dissemination of computer viruses provides an opportunity; the global World Wide Web (www) so that the "Earth Village "and the implementation of the computer virus to create a space; new computer technology [/ url] in the continuous application of electronic systems for the realization of computer viruses, the objective conditions. Experts believe that the distributed data processing, re-programming embedded computers, network communications, computer standardization, software standardization, the standard message format, a standard data link, have made it possible for computer viruses. Implementation of computer virus's core technology is an effective solution injected into the virus. Which targets a variety of other systems, and from the computer host to a variety of sensors, bridges, etc., so that their computers are at a critical time trick or collapse, can not play a role. Current research from the foreign point of view, the virus injection methods are the following:

1. Radio mode. Mainly through the radio transmitting the signature to the other electronic systems. This approach is the best way into the computer virus, while technical difficulties are greatest. Possible ways are: ① the other electronic systems directly to the radio receiver or transmitter device, so the receiver to process it and spread the virus to the target. ② posing as legitimate wireless transmission of data. Obtained or used according to standard protocols and data formats of radio transmission, emission pattern, to enable lawful transmission signal mixed into the receiver, and then enter the information network. ③looking for other information systems to protect the worst place to put the virus injection. Unprotected by the other data link will transmit the

相关文档
最新文档