freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

計(jì)算機(jī)安全外文翻譯---特洛伊木馬-其他專業(yè)-資料下載頁

2025-01-19 02:21本頁面

【導(dǎo)讀】在計(jì)算機(jī)領(lǐng)域中特洛伊木馬程序是一種未經(jīng)授權(quán)的程序,它包含在一段正常的程序當(dāng)中,這個未經(jīng)授權(quán)的程序提供了一些用戶不知道的功能,其目的是不需要管理員的準(zhǔn)許就可獲得系統(tǒng)使用權(quán)。它可以控制用戶計(jì)算機(jī)系統(tǒng),造成用戶資料的泄漏,甚至造成整個計(jì)算機(jī)系統(tǒng)崩潰等。特洛伊木馬和病毒的區(qū)別是它不能自行傳播,而要依靠宿主以其它假象出現(xiàn),冒充一個正常的程序,如Bo、Happy99、sub7、網(wǎng)絡(luò)神偷、冰河等就是典型的特洛伊木馬程序。本章詳細(xì)論述了木馬的分類、特征、功能、工作原理和攻擊手段等。它利用自身所具有的植入功能,依附其它具有傳播能力病毒,或者通過入侵后植入等多種途徑,進(jìn)駐目標(biāo)機(jī)器,搜集其中各種敏感信息,并通過網(wǎng)絡(luò)與外界通信,發(fā)回所搜集到的各種敏感信息,接受植入者指令,完成其它各種操作,如修改指定文件、格式化硬盤等。

  

【正文】 e control end is established between a Trojan channel to a elements.The control end IP and server IP, namely the control terminal and server network address, and Trojan data transmission destination. The control end port and the Trojan port, namely the control terminal and server data entrance, through the port, the data can be directly to the control end or Trojan program. basic characteristics of Trojan horseNow popular Trojan program, they all have the following basic characteristics:1. ConcealmentTrojan horse must have the ability to longterm potential in the target machine can not be found. A hidden Trojan tend to be easily exposed, and then be antivirus software ( or kill the horse ), and even the user manual inspection, this will allow this kind of Trojan horse bee worthless. So we can say that invisibility is a life.2. Automatic operationTrojan horse is a system that automatically start running, so it may be embedded in the startup configuration file ( such as , , ), start the group or the registry
點(diǎn)擊復(fù)制文檔內(nèi)容
環(huán)評公示相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1