计算机英文文献和翻译.docx
- 文档编号:23282578
- 上传时间:2023-05-15
- 格式:DOCX
- 页数:13
- 大小:25.60KB
计算机英文文献和翻译.docx
《计算机英文文献和翻译.docx》由会员分享,可在线阅读,更多相关《计算机英文文献和翻译.docx(13页珍藏版)》请在冰豆网上搜索。
计算机英文文献和翻译
郑州大学毕业设计
——外文科技文献翻译
题目:
计算机病毒
指导教师:
李正民职称:
副教授
学生姓名:
张永星学号:
***********
专业:
计算机科学与技术
院(系):
信息工程学院
完成时间:
2009年5月25日
2009年05月25日
ComputerViruses
Whatarecomputerviruses?
AccordingtoFredCohen’swell-knowndefinition,acomputervirusisacomputerprogramthatcaninfectothercomputerprogramsbymodifyingtheminsuchawayastoincludea(possiblyevolved)copyofitself.Notethataprogramdoesnothavetoperformoutrightdamage(suchasdeletingorcorruptingfiles)inordertobecalleda“virus”.However,Cohenusesthetermswithinhisdefinition(e.g.“program”and“modify”)abitdifferentlyfromthewaymostanti-virusresearchersusethem,andclassifiesasvirusessomethingswhichmostofuswouldnotconsiderviruses.
Computervirusesarebitsofcodethatdamageoreraseinformation,files,orsoftwareprogramsinyourcomputer,muchlikevirusesthatinfecthumans,computervirusescanspread,andyourcomputercancatchaviruswhenyoudownloadaninfectedfilefromtheInternetorcopyaninfectedfilefromadiskette.Oncethevirusesisembeddedintoyourcomputer’sfiles,itcanimmediatelystarttodamageordestroyinformation,oritcanwaitforaparticulardateoreventtotriggeritsactivity.
Whatarethemaintypesofviruses?
Generally,therearetwomainclassesofviruses.ThefirstclassconsistsofthefileInfectorswhichattachthemselvestoordinaryprogramfiles.Theseusuallyinfectarbitrary.COMand/or.EXEprograms,thoughsomecaninfectanyprogramforwhichexecutionisrequested,suchas.SYS,.OVL,.PRG,&.MNUfiles.
Fileinfectorscanbeeitherdirectactionorresident.Adirect-actionvirusselectsoneormoreotherprogramstoinfecteachothertimetheprogramwhichcontainsitisexecuted,andthereafterinfectsotherprogramswhen“they”areexecuted(asinthecaseoftheJerusalem)orwhencertainotherconditionsarefulfilled.TheViennaisanexampleofadirect-actionvirus.Mostothervirusesareresident.
Thesecondclassissystemorboot-recordinfectors:
thoseviruses,whichinfectexecutablecode,foundincertainsystemareasonadiskthatarenotordinaryfiles.OnDOSsystems,thereareordinaryboot-sectorviruses,whichinfectonlytheDOSbootsectorondiskettes.ExamplesincludeBrain,Stoned,Empire,Azusa,andMichelangelo.Suchvirusesarealwaysresidentviruses.
Finally,afewvirusesareabletoinfectboth(theTequilavirusisoneexample).Thereareoftencalled“multipartite”viruses,thoughtherehasbeencriticismofthisname;anothernameis“boot-and-file”virus.
Filesystemorclusterviruses(e.g.Dir-II)arethosethatmodifydirectorytableentriessothatthevirusisloadedandexecutedbeforethedesiredprogramis.Notethattheprogramitselfisnotphysicallyaltered;onlythedirectoryentryis.Someconsidertheseinfectorstobeathirdcategoryofviruses,whileothersconsiderthemtobeasub-categoryofthefileinfectors.
Whataremacroviruses?
Manyapplicationsprovidethefunctionalitytocreatemacros.Amacroisaseriesofcommandstoperformsomeapplication-specifictask.Macrosaredesignedtomakelifeeasier,forexample,toperformsomeeverydaytasksliketext-formattingorspreadsheetcalculations.
Macroscanbesavedasaseriesofkeystrokes(theapplicationrecordwhatkeysyoupress);ortheycanbewritteninspecialmacrolanguages(usuallybasedonrealprogramminglanguageslikeCandBASIC).Modernapplicationscombinebothapproaches;andtheiradvancedmacrolanguagesareascomplexasgeneralpurposeprogramminglanguages.Whenthemacrolanguageallowsfilestobemodified,itbecomespossibletocreatemacrosthatcopythemselvesfromonefiletoanother.Suchself-replicatingmacrosarecalledmacroviruses.
MostmacrovirusesrununderWordforWindows.Sincethisisaverypopularwordprocessor,itprovidesaneffectivemeansforvirusestospread.MostmacrovirusesarewrittenusingthemacrolanguageWordBasic.WordBasicisbasedonthegoodoldBASICprogramminglanguage.However,ithasmany(hundredsof)extensions(forexample,todealwithdocuments:
edit,replacestring,obtainthenameofthecurrentdocument,opennewwindow,movecursor,etc.).
WhatisaTrojanhorseprogram?
Atypeofprogramthatisoftenconfusedwithvirusesisa‘Trojanhorse’program.Thisisnotavirus,butsimplyaprogram(oftenharmful)thatpretendstobesomethingelse.
Forexample,youmightdownloadwhatyouthinkisanewgame;butwhenyourunit,itdeletesfilesonyourharddrive.Orthethirdtimeyoustartthegame,theprogramE-mailyoursavedpasswordstoanotherperson.
Note:
simplydownloadafiletoyourcomputerwon’tactivateavirusorTrojanhorse;youhavetoexecutethecodeinthefiletotriggerit.Thiscouldmeanrunningaprogramfile,oropeningaWord/Exceldocumentinaprogram(suchasWordorExcel)thatcanexecuteanymacrosinthedocument.
Whatkindoffilescanspreadviruses?
Viruseshavethepotentialtoinfectanytypeofexecutablecode,notjustthefilesthatarecommonlycalled“programfiles”.Forexample,somevirusesinfectexecutablecodeinthebootsectoroffloppydiskorinsystemareasofharddrives.Anothertypeofvirus,knownasa“macro”virus,caninfectwordprocessingandspreadsheetdocumentsthatusemacros.Andit’spossibleforHTMLdocumentscontainingJavaScriptorothertypesofexecutablecodetospreadvirusesorothermaliciouscode.
Sincevirusescodemustbeexecutedtohaveanyeffect,filesthatthecomputertreatsaspuredataaresafe.Thisincludesgraphicsandsoundfilessuchas.gif,.jpg,.mp3,.wav,.etc.,aswellasplaintextin.txtfiles.Forexample,justviewingpicturefileswon’tinfectyourcomputerwithavirus.Theviruscodehastobeinaform,suchasan.exeprogramfileoraWord.docfilewhichthecomputerwillactuallytrytoexecute.
Howdovirusesspread?
ThemethodologyofvirusinfectionwasprettystraightforwardwhenfirstcomputervirusessuchasLehighandJerusalemstartedappearing.Avirusisasmallpieceofcomputercode,usuallyformseveralbytestoafewtensofbytes,thatcando,well,somethingunexpected.Suchvirusesattachthemselvestoexecutablefiles—programs,sothattheinfectedprogram,beforeproceedingwithwhatevertasksitissupposedtodo,callstheviruscode.Oneofthesimplestwaystoaccomplishthatistoappendtheviruscodetotheendofthefile,andinsertacommandtothebeginningoftheprogramfilethatwouldjumprighttothebeginningoftheviruscode.Afterthevirusisfinished,itjumpsbacktothepointoforiginationintheprogram.Suchviruseswereverypopularinthelateeighties.Theearlieronesonlyknewhowtoattachthemselvesto.Comfiles,sincestructureofa.COMfileismuchsimplerthanthatofan.EXEfile—yetanotherexecutablefileformatinventedforMS-DOSoperatingsystem.ThefirstvirustobecloselystudiedwastheLehighvirus.Itattacheditselftothefilethatwasloadedbythesystematboottime—COMMAND.COM.thevirusdidalotofdamagetoitshost,soafterthree-fourreplicationsitwasnolongerusable.Forthatreason,thevirusnevermanagedtoescapetheuniversitynetwork.
Whenyouexecuteprogramcodethat’sinfectedbyavirus,theviruscodewillalsorunandtrytoinfectotherprograms,eitheronthesamecomputeroronothercomputersconnectedtoitoveranetwork.Andthenewlyinfectedprogramswilltrytoinfectyetmoreprograms.
Whenyoushareacopyofaninfectedfilewithothercomputerusers,runningthefilemayalsoinfecttheircomputer;andfilesfromthosecomputersmayspreadtheinfectiontoyetmorecomputers.
Ifyourcomputerifinfectedwithabootsectorvirus,thevirustriestowritecopiesofitselftothesystemareasoffloppydisksandharddisks.Thentheinfectedfloppydisksmayinfectothercomputersthatbootfromthem,andtheviruscopyontheharddiskwilltrytoinfectstillmorefloppies.
Someviruses,knownas‘multipartite’viruses,andspreadbothbyinfectingfilesandbyinfectingthebootareasoffloppydisks.
Whatdovirusesdotocomputers?
Virusesaresoftwareprograms,andtheycandothesamethingsasanyotherprogramrunningonacomputer.Theaccrualeffectofanyparticularvirusdependsonhowitwasprogrammedbythepersonwhowrotethevirus.
Somevirusesaredeliberatelydesignedtodamagefilesorotherwiseinterferewithyourcomputer’soperation,whileotherdon’tdoanythingbuttrytospreadthemselvesaround.Buteventheonesthatjustspreadthemselvesareharmful,sincetheydamagefilesandmaycauseotherproblemsintheprocessofspreading.
Notethatvirusescan’tdoanydamagetohardware:
theywon’tmeltdownyourCPU,burnoutyourharddrive,causeyourmonitortoexplode,etc.warningsaboutvirusesthatwillphysicallydestroyyourcomputerareusuallyhoaxes,notlegitimateviruswarnings.
ModernvirusescanexistonanysystemformMSDOSandWindow3.1toMacOS,UNIX,OS/2,WindowsNT.Someareharmless,thoughhardtocatch.TheycanplayajingleonChristmasorrebootyourcomputeroccasionally.Otheraremoredangerous.Theycandeleteorcorruptyourfiles,formatharddrives,ordosomethingofthatsort.Therearesomedeadlyonesthatcanspreadovernetworkswithorwithoutahost,transmitsensitiveinformationoverthenetworktoathirdparty,orevenmesswithfinancialdataon-line.
What’sthestoryonvirusesandE-mail?
Youcan’tgetavirusjustbyreadingaplain-textE-mailmessageorUsenetpost.Whatyouhavetowatchoutforareencodedmessagecontainingembeddedexecutablecode(i.e.,JavaScriptinHTMLmessage)ormessagethatincludeanexecutablefileattachment(i.e.,anencodedprogram
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 英文 文献 翻译