freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

計算機英文文獻翻譯---計算機病毒-其他專業(yè)-wenkub.com

2025-01-15 02:15 本頁面
   

【正文】 這常常對清除病毒感染無效,并且弊大于利,除非你對處理的病毒非常了解。如果備份了被感染的文件,用防病毒軟件來恢復它。 處理病毒感染 首先,謹記“計算機病毒癥的尼克第一定律”: 14 “僅僅因為你的計算機表現(xiàn)奇怪或一個程序不能正常工作,這并不意味著你的計算機有了病毒。 6. 定期備份。 4. 防病毒程序不能很好地檢查特洛伊木馬程序,所以當打開來自不知道的或“不確定的”源的二進制文件和 Word/Excel 文檔是要特別小心。 2. 要定期掃描病毒,除此之外安裝“訪問時”掃描程序(大部分好的防病毒軟件包中都有),并把它們配置為每次開機時自動啟動。只因為一個電子郵件來自你信任的某人,并不意味著該文件就是安全的或假定的發(fā)送者與此有任何關系。 怎樣減少從電子郵件感染病毒的機會? 像對待任何其他新文件一樣小心對待可能包含可執(zhí)行代碼的任一文件附件:把附件保存到磁盤上,在運行該文件之前,先用更新過的病毒掃描檢查它。你必須警惕的是那些包含了可執(zhí)行代碼的編程消息(例如一個 HTML 消息中的JavaScript)或包含一個可執(zhí)行文件附件的消息(例如一個編碼程序文件或包含宏的 Word 文檔)。關于病毒將物理上破壞你的計算機的警告通常是惡作劇,不是合理的病毒警告。任何一個特別病毒的實際效果取決于編寫病毒的程序員是如何編寫的。 如果你的餓計算機已經(jīng)感染了引導區(qū)病毒,該病毒試圖把自身的拷貝寫到軟盤的系統(tǒng)區(qū)域。 當你執(zhí)行一個感染了病毒的程序代碼時,病毒程序也將進行并試圖感染本計算機過通過網(wǎng)絡相連的其他計算機上的其他程序。早期的病毒只知道附加到 .COM 文件上,因為他的結(jié)構(gòu)比 MSDOS 操作系統(tǒng)的另一種可執(zhí)行文件格式 —— .EXE 文件更簡單 。一 個病毒是一小段計算機代碼,通常是幾個到幾十個字節(jié),它們能做一些意想不到的事情。這包括 .gif、 .jpg、 .mp .wav 等圖形和聲音文件,也包括以 .txt 為擴展名的簡單文本文件。例如,某些計算機病毒感染軟盤引導區(qū)或硬盤系統(tǒng)區(qū)域的可執(zhí)行代碼。 注意:僅僅把一個文件下載到你計算機不會激活病毒或特洛伊木馬程序。 什么是特洛伊木馬程序 ? 通常與病毒想混淆的一種程序是特洛伊木馬程序 .。這種具有自復制功能的宏稱作宏病毒。宏是一個完成特定應用任務的命令序列。 文件系統(tǒng)型病毒或“簇”病毒(如 DirII 病毒)是那種修改文件目錄表項并且在文件裝入、執(zhí)行前就被裝入和執(zhí)行的病毒。 第二類病毒是系統(tǒng)病毒或引導區(qū)記錄感染型病毒,這些感染可執(zhí)行代碼的病毒出現(xiàn)在磁盤的某些系統(tǒng)區(qū)中,而不是普通文件中。第一類由文件感染型病毒組成,他們將自身依附在普通的程序文件上。正如感染人體的病毒一樣,計算機病毒能夠擴散。 an av program that hasn?t been updated for several months will not provide much protection against current viruses. 2. In addition to scanning for viruses on a regular basis, install an ?on access? scanner (included in most good av software packages) and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your puter accesses an executable file. 3. Virus scans any new programs or other files that may contain executable code before you run or open them, no matter where they e from. There have been cases of mercially distributed floppy disks and CDROMs spreading virus infections. 4. Antivirus programs aren?t very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or ?dubious? sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren?t wellknown or don?t have a good reputation, and executable files unexpectedly received as attachments to Email. 5. Be extremely careful about accepting programs or other flies during online chat sessions: this seems to be one of the more mon means that people 8 wind up with virus or Trojan horse problems. And if any other family members (especially younger ones) use the puter, make sure they know not to accept any files while using chat. 6. Do regular backups. Some viruses and Trojan horse programs will erase or corrupt files on your hard drive and a recent backup may be the only way to recover your data. Ideally, you should back up your entire system on a regular basis. If this isn?t practical, at least backup files you can?t afford to lose or that would be difficult to replace: documents, bookmark files, address books, important Email, etc. Dealing with Virus Infections First, keep in mind “Nick?s First Law of Computer Virus Complaints”: “Just because your puter is acting strangely or one of your programs doesn?t work right, this does not mean that your puter has a virus.” 1. If you haven?t used a good, uptodate antivirus program on your puter, do that first. Many problems blamed on viruses are actually caused by software configuration errors or other problems that have nothing to do with a virus. 2. If you do get infected by a virus, follow the direction in your antivirus program for cleaning it. If you have backup copies of the infected files, use those to restore the files. Check the files you restore to make sure your backups weren?t infected. 3. for assistance, check the web site and support service for your antivirus software. Note: in general, drastic measures such as formatting your hard drive or using FDISK s
點擊復制文檔內(nèi)容
環(huán)評公示相關推薦
文庫吧 www.dybbs8.com
備案圖片鄂ICP備17016276號-1