计算机英文文献翻译计算机病毒.doc

上传人:仙人指路1688 文档编号:2259067 上传时间:2023-02-07 格式:DOC 页数:14 大小:54KB
返回 下载 相关 举报
计算机英文文献翻译计算机病毒.doc_第1页
第1页 / 共14页
计算机英文文献翻译计算机病毒.doc_第2页
第2页 / 共14页
计算机英文文献翻译计算机病毒.doc_第3页
第3页 / 共14页
计算机英文文献翻译计算机病毒.doc_第4页
第4页 / 共14页
计算机英文文献翻译计算机病毒.doc_第5页
第5页 / 共14页
点击查看更多>>
资源描述

《计算机英文文献翻译计算机病毒.doc》由会员分享,可在线阅读,更多相关《计算机英文文献翻译计算机病毒.doc(14页珍藏版)》请在三一办公上搜索。

1、外文科技文献翻译题 目:计算机病毒 学生姓名: 学号: 专 业: 计算机科学与技术 院(系): 信息工程学院 完成时间: 2009年5月25日 2009年 05 月 25 日COMPUTER VIRUSESWhat are computer viruses?According to Fred Cohens well-known definition, a computer virus is a computer program that can infect other computer programs by modifying them in such a way as to includ

2、e a (possibly evolved) copy of itself. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a “virus”. However, Cohen uses the terms within his definition (e.g. “program” and “modify”) a bit differently from the way most anti-virus

3、 researchers use them, and classifies as viruses some things which most of us would not consider viruses. Computer viruses are bits of code that damage or erase information, files, or software programs in your computer, much like viruses that infect humans, computer viruses can spread, and your comp

4、uter can catch a virus when you download an infected file from the Internet or copy an infected file from a diskette. Once the viruses is embedded into your computers files, it can immediately start to damage or destroy information, or it can wait for a particular date or event to trigger its activi

5、ty.What are the main types of viruses?Generally, there are two main classes of viruses. The first class consists of the file Infectors which attach themselves to ordinary program files. These usually infect arbitrary .COM and/or .EXE programs, though some can infect any program for which execution i

6、s requested, such as .SYS,.OVL,.PRG,&.MNU files.File infectors can be either direct action or resident. A direct-action virus selects one or more other programs to infect each other time the program which contains it is executed ,and thereafter infects other programs when “they” are executed (as in

7、the case of the Jerusalem) or when certain other conditions are fulfilled. The Vienna is an example of a direct-action virus. Most other viruses are resident.The second class is system or boot-record infectors: those viruses, which infect executable code, found in certain system areas on a disk that

8、 are not ordinary files. On DOS systems, there are ordinary boot-sector viruses, which infect only the DOS boot sector on diskettes. Examples include Brain, Stoned, Empire, Azusa, and Michelangelo. Such viruses are always resident viruses. Finally, a few viruses are able to infect both (the Tequila

9、virus is one example). There are often called “multipartite” viruses, though there has been criticism of this name; another name is “boot-and -file” virus.File system or cluster viruses (e.g. Dir-II) are those that modify directory table entries so that the virus is loaded and executed before the de

10、sired program is. Note that the program itself is not physically altered; only the directory entry is. Some consider these infectors to be a third category of viruses, while others consider them to be a sub-category of the file infectors.What are macro viruses?Many applications provide the functiona

11、lity to create macros. A macro is a series of commands to perform some application-specific task. Macros are designed to make life easier, for example, to perform some everyday tasks like text-formatting or spreadsheet calculations.Macros can be saved as a series of keystrokes (the application recor

12、d what keys you press); or they can be written in special macro languages (usually based on real programming languages like C and BASIC). Modern applications combine both approaches; and their advanced macro languages are as complex as general purpose programming languages. When the macro language a

13、llows files to be modified, it becomes possible to create macros that copy themselves from one file to another. Such self-replicating macros are called macro viruses.Most macro viruses run under Word for Windows. Since this is a very popular word processor, it provides an effective means for viruses

14、 to spread. Most macro viruses are written using the macro language WordBasic. WordBasic is based on the good old BASIC programming language. However, it has many (hundreds of) extensions (for example, to deal with documents: edit, replace string, obtain the name of the current document, open new wi

15、ndow, move cursor, etc.).What is a Trojan horse program?A type of program that is often confused with viruses is a Trojan horse program. This is not a virus, but simply a program (often harmful) that pretends to be something else.For example, you might download what you think is a new game; but when

16、 you run it, it deletes files on your hard drive. Or the third time you start the game, the program E-mail your saved passwords to another person.Note: simply download a file to your computer wont activate a virus or Trojan horse; you have to execute the code in the file to trigger it. This could me

17、an running a program file, or opening a Word/Excel document in a program (such as Word or Excel) that can execute any macros in the document.What kind of files can spread viruses?Viruses have the potential to infect any type of executable code, not just the files that are commonly called “program fi

18、les”. For example, some viruses infect executable code in the boot sector of floppy disk or in system areas of hard drives. Another type of virus, known as a “macro” virus, can infect word processing and spreadsheet documents that use macros. And its possible for HTML documents containing JavaScript

19、 or other types of executable code to spread viruses or other malicious code.Since viruses code must be executed to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, .etc., as well as plain text in .txt files

20、. For example, just viewing picture files wont infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file which the computer will actually try to execute.How do viruses spread?The methodology of virus infection was pretty straightforward w

21、hen first computer viruses such as Lehigh and Jerusalem started appearing. A virus is a small piece of computer code, usually form several bytes to a few tens of bytes, that can do, well, something unexpected. Such viruses attach themselves to executable files programs, so that the infected program,

22、 before proceeding with whatever tasks it is supposed to do, calls the virus code. One of the simplest ways to accomplish that is to append the virus code to the end of the file, and insert a command to the beginning of the program file that would jump right to the beginning of the virus code. After

23、 the virus is finished, it jumps back to the point of origination in the program. Such viruses were very popular in the late eighties. The earlier ones only knew how to attach themselves to .Com files, since structure of a .COM file is much simpler than that of an .EXE fileyet another executable fil

24、e format invented for MS-DOS operating system. The first virus to be closely studied was the Lehigh virus. It attached itself to the file that was loaded by the system at boot timeCOMMAND.COM. the virus did a lot of damage to its host, so after three-four replications it was no longer usable. For th

25、at reason, the virus never managed to escape the university network.When you execute program code thats infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network. And the newly infected program

26、s will try to infect yet more programs.When you share a copy of an infected file with other computer users, running the file may also infect their computer; and files from those computers may spread the infection to yet more computers.If your computer if infected with a boot sector virus, the virus

27、tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk will try to infect still more floppies.Some viruses, known as multipartite viruses, and spread both b

28、y infecting files and by infecting the boot areas of floppy disks.What do viruses do to computers?Viruses are software programs, and they can do the same things as any other program running on a computer. The accrual effect of any particular virus depends on how it was programmed by the person who w

29、rote the virus.Some viruses are deliberately designed to damage files or otherwise interfere with your computers operation, while other dont do anything but try to spread themselves around. But even the ones that just spread themselves are harmful, since they damage files and may cause other problem

30、s in the process of spreading.Note that viruses cant do any damage to hardware: they wont melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.Modern virus

31、es can exist on any system form MS DOS and Window 3.1 to MacOS, UNIX, OS/2, Windows NT. Some are harmless, though hard to catch. They can play a jingle on Christmas or reboot your computer occasionally. Other are more dangerous. They can delete or corrupt your files, format hard drives, or do someth

32、ing of that sort. There are some deadly ones that can spread over networks with or without a host, transmit sensitive information over the network to a third party, or even mess with financial data on-line.Whats the story on viruses and E-mail?You cant get a virus just by reading a plain-text E-mail

33、 message or Usenet post. What you have to watch out for are encoded message containing embedded executable code (i.e., JavaScript in HTML message) or message that include an executable file attachment (i.e., an encoded program file or a Word document containing macros).In order to activate a virus o

34、r Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. Theres no special hazard in files attached to Usenet posts or E-mail messages: theyre no mor

35、e dangerous than any other file.What can I do to reduce the chance of getting viruses from E-mail? Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before openin

36、g the file.If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature.My personal feeling is that if an executable file shows up unexpectedly attac

37、hed to an E-mail, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you.The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just becau

38、se an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it.Some General Tips on Avoiding Virus Infections1. Install anti-virus software from a well-known, reputable company. UPDATE it regularly, and USE it regularly

39、.New viruses come out every single day; an a-v program that hasnt been updated for several months will not provide much protection against current viruses.2. In addition to scanning for viruses on a regular basis, install an on access scanner (included in most good a-v software packages) and configu

40、re it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file.3. Virus scans any new programs or other files that may contain executable code before you run or open them, no matter where they com

41、e from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections.4. Anti-virus programs arent very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or dubious sources. This i

42、ncludes posts in binary newsgroups, downloads from web/ftp sites that arent well-known or dont have a good reputation, and executable files unexpectedly received as attachments to E-mail.5. Be extremely careful about accepting programs or other flies during on-line chat sessions: this seems to be on

43、e of the more common means that people wind up with virus or Trojan horse problems. And if any other family members (especially younger ones) use the computer, make sure they know not to accept any files while using chat.6. Do regular backups. Some viruses and Trojan horse programs will erase or cor

44、rupt files on your hard drive and a recent backup may be the only way to recover your data.Ideally, you should back up your entire system on a regular basis. If this isnt practical, at least backup files you cant afford to lose or that would be difficult to replace: documents, bookmark files, addres

45、s books, important E-mail, etc.Dealing with Virus InfectionsFirst, keep in mind “Nicks First Law of Computer Virus Complaints”:“Just because your computer is acting strangely or one of your programs doesnt work right, this does not mean that your computer has a virus.”1. If you havent used a good, u

46、p-to-date anti-virus program on your computer, do that first. Many problems blamed on viruses are actually caused by software configuration errors or other problems that have nothing to do with a virus.2. If you do get infected by a virus, follow the direction in your anti-virus program for cleaning

47、 it. If you have backup copies of the infected files, use those to restore the files. Check the files you restore to make sure your backups werent infected.3. for assistance, check the web site and support service for your anti-virus software.Note: in general, drastic measures such as formatting you

48、r hard drive or using FDISK should be avoided. They are frequently useless at cleaning a virus infection, and may do more harm than good unless you re very knowledgeable about the effects of the particular virus youre dealing with.计算机病毒什么是计算机病毒?按照Fred Cohen的广为流传的定义,计算机病毒是一种侵入其他计算机程序中的计算机程序,他通过修改其他的程

49、序从而将(也可能是自身的变形)的复制品嵌入其中。注意一个程序之所以成为“病毒”,并非一定要起彻底的破坏作用(如删除或毁坏文件)。然而,Cohen在他的定义(即“程序”和“修改”)中使用的“病毒”这个术语与大多数反病毒研究人员使用的“病毒”术语有些差别,他把一些我们多数人认为不是病毒的东西也归类为病毒。计算机病毒是一些能破坏或删除计算机中的信息、文件或程序的代码。正如感染人体的病毒一样,计算机病毒能够扩散。当你的计算机从互联网上下载一个被感染的文件,或者从磁盘上复制一个被感染的文件时,你的计算机就会染上病毒。而一旦病毒进入到你的计算机文件中,它就能马上破坏或摧毁其中的信息,或者等到某个特殊的日期或事件来临时才触发

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号