首页 | 本学科首页   官方微博 | 高级检索  
     

木马入侵原理与防护
引用本文:吕宏强.木马入侵原理与防护[J].计算机安全,2012(6):23-27.
作者姓名:吕宏强
作者单位:陕西省宝鸡市委党校,陕西宝鸡,721001
摘    要:近年来,黑客攻击网民的事件越来越多,网络安全令人堪忧,最为活跃的病毒类型仍旧为木马病毒,占据所有病毒数量的60%,网民面临的首要威胁仍旧是木马。从木马的入侵原理着手,对木马伪装技术和防护方法进行了简单分析。

关 键 词:木马  黑客  网络安全

Trojan Intrusion Principle and Protection
LV Hong-qiang.Trojan Intrusion Principle and Protection[J].Network & Computer Security,2012(6):23-27.
Authors:LV Hong-qiang
Affiliation:LV Hong-qiang(Shaanxi provincial Party School of Baoji municipal Party committee,Baoji,Shaanxi 721001,China)
Abstract:In recent years,There are more and more attack events against internet,the situation of internet security is serious,the most active virus type is still trojan by volume 60% in all type of threats.netizen ’s primary threat is still trojan.This article start from the Trojan intrusion principle,followed closely by analysis of camouflage technology and protection methods. 更多还原
Keywords:Trojan horse  hacker  network security  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号