【正文】
or corrupt your files, format hard drives, or do something of that sort. There are some deadly ones that can spread over works with or without a host, transmit sensitive information over the work to a third party, or even mess with financial data online. What?s the story on viruses and Email? You can?t get a virus just by reading a plaintext Email message or Use post. What you have to watch out for are encoded message containing embedded executable code (., JavaScript in HTML message) or message that include an executable file attachment (., an encoded program file or a Word document containing macros). In order to activate a virus or Trojan horse program, you puter has to execute some type of code .This could be a program attached to an Email, a Word document you downloaded from the Inter, or something received on a floppy disk. There?s no special hazard in files attached to Use posts or Email messages: they?re no more dangerous than any other file. What can I do to reduce the chance of getting viruses from Email? Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an uptodate virus scanner before opening the file. If you Email or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly remend that you disable this feature. 7 My personal feeling is that if an executable file shows up unexpectedly attached to an Email, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you. The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive Email with attached files or documents. Just because an Email appears to e from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it. Some General Tips on Avoiding Virus Infections 1. Install antivirus software from a wellknown, reputable pany. UPDATE it regularly, and USE it regularly. New viruses e out every single day。 but when you run it, it deletes files on your hard drive. Or the third time you start the game, the program Email your saved passwords to another person. Note: simply download a file to your puter won?t activate a virus or Trojan horse。 or they can be written in special macro languages (usually based on real programming languages like C and BASIC). Modern applications bine both approaches。 another name is “bootand file” virus. File system or cluster viruses (. DirII) are those that modify directory table entries so that the virus is loaded and executed before the desired program is. Note that the program itself is not physically altered。 外文科技文獻(xiàn)翻譯 題 目: 計(jì)算機(jī)病毒 學(xué)生姓名: 學(xué)號(hào): 專(zhuān) 業(yè): 計(jì)算機(jī)科學(xué)與技術(shù) 院(系) : 信息工程學(xué)院 完成時(shí)間: 2021 年 5 月 25 日 2021 年 05 月 25 日 2 COMPUTER VIRUSES What are puter viruses? According to Fred Cohen?s wellknown definition, a puter virus is a puter program that can infect other puter programs by modifying them in such a way as to include a (possibly evolved) copy of itself. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a “virus”. However, Cohen uses the terms within his definition (. “program” and “modify”) a bit differently from the way most antivirus researchers use them, and classifies as viruses some things which most of us would not consider viruses. Computer viruses are bits of code that damage or erase information, files, or software programs in your puter, much like viruses that infect humans, puter viruses can spread, and your puter can c