木马病毒的英文说明我正在做个关于特洛伊木马的课件,需要全英文解释的木马病毒的英文解释,

来源:学生作业帮助网 编辑:六六作业网 时间:2024/11/15 14:53:11
木马病毒的英文说明我正在做个关于特洛伊木马的课件,需要全英文解释的木马病毒的英文解释,木马病毒的英文说明我正在做个关于特洛伊木马的课件,需要全英文解释的木马病毒的英文解释,木马病毒的英文说明我正在做个

木马病毒的英文说明我正在做个关于特洛伊木马的课件,需要全英文解释的木马病毒的英文解释,
木马病毒的英文说明
我正在做个关于特洛伊木马的课件,需要全英文解释的木马病毒的英文解释,

木马病毒的英文说明我正在做个关于特洛伊木马的课件,需要全英文解释的木马病毒的英文解释,
A Trojan horse, also known as a trojan, is malware that appears to perform a desirable function but in fact performs undisclosed malicious functions. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse.
Types of Trojan horse payloads
Trojan horse payloads are almost always designed to cause harm, but can also be harmless. They are classified based on how they breach and damage systems. The six main types of Trojan horse payloads are:
* Remote Access
* Data Destruction
* Downloader
* Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
* Security software disabler
* Denial-of-service attack (DoS)
Some examples of damage are:
* Erasing or overwriting data on a computer
* Re-installing itself after being disabled
* Encrypting files in a cryptoviral extortion attack
* Corrupting files in a subtle way
* Upload and download of files
* Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context
* Falsifying records of downloading software, movies, or games from websites never visited by the victim.
* Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)
* Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector')
* Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
* Spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)
* Making screenshots
* Logging keystrokes to steal information such as passwords and credit card numbers
* Phishing for bank or other account details, which can be used for criminal activities
* Installing a backdoor on a computer system
* Opening and closing CD-ROM tray
* Playing sounds, videos or displaying images
* Calling using the modem to expensive numbers, thus causing massive phone bills
* Harvesting e-mail addresses and using them for spam
* Restarting the computer whenever the infected program is started
* Deactivating or interfering with anti-virus and firewall programs
* Deactivating or interfering with other competing forms of malware
* Randomly shutting off the computer
* Installing a virus
* Slowing down your computer
* Displaying pornographic sites
Methods of deletion
Since Trojan horses have a variety of forms, there is no single method to delete them. The simplest responses involve clearing the temporary internet files file and deleting it manually. Normally, antivirus software is able to detect and remove the trojan automatically. If the antivirus cannot find it, booting the computer from alternate media(cd) may allow an antivirus program to find a trojan and delete it. Updated anti-spyware programs are also efficient against this threat.

网上搜三

Acce control list (ACL)
访问控制列表,其中存放了有关是谁,可以对什么目标进行访问,以及对谁实施的相关权限。
ActiveX
一个微软开发出来的技术,是OLE和COM的结合产物(OLE,对象链接和嵌入;COM,组件对象模型),允许网页开发人员来建立交互性的网页,并提供和Java小程序同样的功能。
Ad hoc wirele ne...

全部展开

Acce control list (ACL)
访问控制列表,其中存放了有关是谁,可以对什么目标进行访问,以及对谁实施的相关权限。
ActiveX
一个微软开发出来的技术,是OLE和COM的结合产物(OLE,对象链接和嵌入;COM,组件对象模型),允许网页开发人员来建立交互性的网页,并提供和Java小程序同样的功能。
Ad hoc wirele network
Ad hoc无线网络。一种802.11 wi-fi网络,以电脑到电脑的方式运作,而不是通过一个无线接入点(WAP)。
Admin A roval Mode
管理批准模式。Vista在以标准用户权限运行绝大多数程序时的默认设定,即便你是以系统管理员帐号登录的;在必要时会要求进行权限的提升以提高权限级别。
Aero
Windows Vista的全新用户界面,不用于入门版和家庭基本版,只用于旗舰版。
Aero Gla
Aero界面中争论最热烈的图形界面。它提供了三维动画,透明,以及其他可视效果,但是要求很高的系统资源,以及一块兼容directx 9的显卡。
Anti- yware
反间谍软件。使用预先定义的文件以及启发式逻辑来探测电脑中已知的或者潜在的间谍软件,并对用户提出警告,移除或隔离相关间谍软件。
Avalon
请看 "Windows Presentation Foundation" (WPF).
Bcdedit
在Windows Vista中的一个命令行工具,用于建立和重新配置bootloader,后者无须再使用boot.ini文件。
BitLocker
在Windows Vista企业版和高级版中提供的一个安全功能,可以使用一个TPM芯片或者一个U 钥匙盘对整个操作系统卷进行加密。
Custom Scan
自定义扫描。防护程序的一个选项,仅对你指定的位置进行扫描。
Defender
防护程序 (可以查看Windows Defender)
Desktop Search
桌面搜索。一个内置于Windows Vista中的功能,让你可以根据文件名(或部分文件名)、日期、作者、以及很多其他属性来对文件进行搜索,可以从“开始菜单”中直接进入。
Desktop Windows Manager (DWM)
桌面窗口管理器。一个Windows Vista中的窗口系统,支持Aero(除入门版和家庭基本版以外),用于处理如何勾画屏幕上的内容。

收起