首页 | 本学科首页   官方微博 | 高级检索  
     

论计算机木马病毒的分析与防治
作者单位:泉州经贸职业技术学院
摘    要:在网络信息系统中,木马技术已成为黑客攻击或不法分子入侵或控制他人网络或计算机系统的重要工具。系统地分析木马病毒的起源和种类、工作原理、木马种植的技巧、木马自启动以及隐藏的方法,并对木马攻击提出了相应的解决方法和防范办法。

关 键 词:特洛伊木马  木马病毒  计算机病毒  木马防治

The Analysis and Prevention to the Trojan Horse Virus
XIE Yu-rong. The Analysis and Prevention to the Trojan Horse Virus[J]. Digital Community & Smart Home, 2008, 0(25)
Authors:XIE Yu-rong
Abstract:In the network information systems, the Trojan technique has been used as the important tool by hackers or lawless persons to invade or other network or computer. This thesis systematically studies and analyzes the principle and function of various trojan horses, the techniques and ideas of trojan loading,the startup methods and hidden methods of the trojan horses, and a corresponsive resolvent for those typical trojan horse attack.
Keywords:Trojan horse  Trojan horse virus  computer virus  Trojan detecting
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号