freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

計算機英文文獻(xiàn)翻譯---計算機病毒-其他專業(yè)-展示頁

2025-01-31 02:15本頁面
  

【正文】 atch a virus when you download an infected file from the Inter or copy an infected file from a diskette. Once the viruses is embedded into your puter?s files, it can immediately start to damage or destroy information, or it can wait for a particular date or event to trigger its activity. What are the main types of viruses? Generally, there are two main classes of viruses. The first class consists of the file Infectors which attach themselves to ordinary program files. These usually infect arbitrary .COM and/or .EXE programs, though some can infect any program for which execution is requested, such as .SYS,.OVL,.PRG,amp。.MNU files. File infectors can be either direct action or resident. A directaction virus selects one or more other programs to infect each other time the program which contains it is executed ,and thereafter infects other programs when “they” are executed (as in the case of the Jerusalem) or when certain other conditions are fulfilled. The Vienna is an example of a directaction virus. Most other viruses are resident. The second class is system or bootrecord infectors: those viruses, which infect executable code, found in certain system areas on a disk that are not ordinary files. On DOS systems, there are ordinary bootsector viruses, which infect only the DOS boot 3 sector on diskettes. Examples include Brain, Stoned, Empire, Azusa, and Michelangelo. Such viruses are always resident viruses. Finally, a few viruses are able to infect both (the Tequila virus is one example). There are often called “multipartite” viruses, though there has been criticism of this name。 only the directory entry is. Some consider these infectors to be a third category of viruses, while others consider them to be a subcategory of the file infectors. What are macro viruses? Many applications provide the functionality to create macros. A macro is a series of mands to perform some applicationspecific task. Macros are designed to make life easier, for example, to perform some everyday tasks like textformatting or spreadsheet calculations. Macros can be saved as a series of keystrokes (the application record what keys you press)。 and their advanced macro languages are as plex as general purpose programming languages. When the macro language allows files to be modified, it bees possible to create macros that copy themselves from one file to another. Such selfreplicating macros are called macro viruses. Most macro viruses run under Word for Windows. Since this is a very popular word processor, it provides an effective means for viruses to spread. Most macro viruses are written using the macro language WordBasic. WordBasic is based on the good old BASIC programming language. However, it has many (hundreds of) extensions (for example, to deal with documents: edit, replace string, obtain the name of the current document, open new window, move cursor, etc.). What is a Trojan horse program? A type of program that is often confused with viruses is a ?Trojan horse? program. 4 This is not a virus, but simply a program (often harmful) that pretends to be something else. For example, you might download what you think is a new game。 you have to execute the code in the file to trigger it. This could mean running a program file, or opening a Word/Excel document in a program (such as Word or Excel) that can execute any macros in the document. What kind of files can spread viruses? Viruses have the potential to infect any type of executable code, not just the files that are monly called “program files”. For example, some viruses infect executable code in the boot sector of floppy disk or in system areas of hard drives. Another type of virus, known as a “macro” virus, can infect word processing and spreadsheet documents that use macros. And it?s possible for HTML documents containing JavaScript or other types of executable code to spread viruses or o
點擊復(fù)制文檔內(nèi)容
環(huán)評公示相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1