1 / 7
文档名称:

外文翻译--计算机病毒攻击与防范技术.doc

格式:doc   页数:7
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

外文翻译--计算机病毒攻击与防范技术.doc

上传人:mkt365 2013/12/2 文件大小:0 KB

下载得到文件列表

外文翻译--计算机病毒攻击与防范技术.doc

文档介绍

文档介绍:外文原文
computer virus attacks and prevention techniques
With puter in all areas of social life, the extensive use puter virus attacks and prevention techniques are expanding. According to reports, the world suffer puter virus infections and attacks of hundreds of millions of events, which seriously interferes with the normal life of human society, to works and systems have brought tremendous potential threats and destruction. At the same time, the virus also in the field of war, widely used in the Gulf War, the recent Kosovo war, both sides have puter viruses to attack enemy, destroy the opponent'works and weapons control systems, to a certain political objectives and military objectives. Can be expected, with puter, the growing popularity of use, in-depth to puter viruses will be more and more national attention.
    puter virus is a group by copying itself to infect other software programs. When the program runs, the embedded virus also will be run and infect other programs. Some viruses do not attack with a malicious code, but more carriers of the virus carrying code, if it is pre-configured environment for excitation, to infection and destruction. piled from 80 of the first "worm" virus program so far, the world has appeared in many different types of viruses.
    It has long been the main goal puter design is the pursuit of improved information processing capabilities a