當前位置:首頁 » 英語四級 » 計算機病毒英語四級作文

計算機病毒英語四級作文

發布時間: 2021-02-16 04:33:44

『壹』 求計算機專業英語的考試作文~有關計算機病毒/電腦病毒的~

計算機病毒是編制者或者在計算機程序中插入的破壞計算機功能或者破壞數據,影響計算機使用並且能夠自我復制的一組計算機指令或者程序代碼被稱為計算機病毒(Computer Virus)。具有破壞性,復制性和傳染性。 常見的種類有:
系統病毒
系統病毒的前綴為:Win32、PE、Win95、W32、W95等。這些病毒的一般共有的特性是可以感染windows操作系統的 *.exe 和 *.dll 文件,並通過這些文件進行傳播。如CIH病毒。
蠕蟲病毒
蠕蟲病毒的前綴是:Worm。這種病毒的共有特性是通過網路或者系統漏洞進行傳播,很大部分的蠕蟲病毒都有向外發送帶毒郵件,阻塞網路的特性。比如沖擊波(阻塞網路),小郵差(發帶毒郵件) 等。
木馬病毒、黑客病毒

木馬病毒其前綴是:Trojan,黑客病毒前綴名一般為 Hack。木馬病毒的共有特性是通過網路或者系統漏洞進入用戶的系統並隱藏,然後向外界泄露用戶的信息。而黑客病毒則有一個可視的界面,能對用戶的電腦進行遠程式控制制。木馬、黑客病毒往往是成對出現的,即木馬病毒負責侵入用戶的電腦,而黑客病毒則會通過該木馬病毒來進行控制。現在這兩種類型都越來越趨向於整合了。一般的木馬如QQ消息尾巴木馬 Trojan.QQ3344 ,還有大家可能遇見比較多的針對網路游戲的木馬病毒如 Trojan.LMir.PSW.60。這里補充一點,病毒名中有PSW或者什麼PWD之類的一般都表示這個病毒有盜取密碼的功能(這些字母一般都為「密碼」的英文「password」的縮寫)一些黑客程序如:網路梟雄(Hack.Nether.Client)等。
腳本病毒

腳本病毒的前綴是:Script。腳本病毒的共有特性是使用腳本語言編寫,通過網頁進行的傳播的病毒,如紅色代碼(Script.Redlof)。腳本病毒還會有如下前綴:VBS、JS(表明是何種腳本編寫的),如歡樂時光(VBS.Happytime)、十四日(Js.Fortnight.c.s)等。
宏病毒

其實宏病毒是也是腳本病毒的一種,由於它的特殊性,因此在這里單獨算成一類。宏病毒的前綴是:Macro,第二前綴是:Word、Word97、Excel、Excel97(也許還有別的)其中之一。凡是只感染WORD97及以前版本WORD文檔的病毒採用Word97作為第二前綴,格式是:Macro.Word97;凡是只感染WORD97以後版本WORD文檔的病毒採用Word做為第二前綴,格式是:Macro.Word;凡是只感染EXCEL97及以前版本EXCEL文檔的病毒採用Excel97做為第二前綴,格式是:Macro.Excel97;凡是只感染EXCEL97以後版本EXCEL文檔的病毒採用Excel做為第二前綴,格式是:Macro.Excel,以此類推。該類病毒的共有特性是能感染OFFICE系列文檔,然後通過OFFICE通用模板進行傳播,如:著名的美麗莎(Macro.Melissa)。
後門病毒

後門病毒的前綴是:Backdoor。該類病毒的共有特性是通過網路傳播,給系統開後門,給用戶電腦帶來安全隱患。
病毒種植程序病毒

這類病毒的共有特性是運行時會從體內釋放出一個或幾個新的病毒到系統目錄下,由釋放出來的新病毒產生破壞。如:冰河播種者(Dropper.BingHe2.2C)、MSN射手(Dropper.Worm.Smibag)等。
破壞性程序病毒

破壞性程序病毒的前綴是:Harm。這類病毒的共有特性是本身具有好看的圖標來誘惑用戶點擊,當用戶點擊這類病毒時,病毒便會直接對用戶計算機產生破壞。如:格式化C盤(Harm.formatC.f)、殺手命令(Harm.Command.Killer)等。
玩笑病毒

玩笑病毒的前綴是:Joke。也稱惡作劇病毒。這類病毒的共有特性是本身具有好看的圖標來誘惑用戶點擊,當用戶點擊這類病毒時,病毒會做出各種破壞操作來嚇唬用戶,其實病毒並沒有對用戶電腦進行任何破壞。如:女鬼(Joke.Girl ghost)病毒。
捆綁機病毒

捆綁機病毒的前綴是:Binder。這類病毒的共有特性是病毒作者會使用特定的捆綁程序將病毒與一些應用程序如QQ、IE捆綁起來,表面上看是一個正常的文件,當用戶運行這些捆綁病毒時,會表面上運行這些應用程序,然後隱藏運行捆綁在一起的病毒,從而給用戶造成危害。如:捆綁QQ(Binder.QQPass.QQBin)、系統殺手(Binder.killsys)等。

樓主可以根據需要翻譯成英文。

『貳』 英語四級作文範文(兩篇)

Credit Cards
Personal credit cards are becoming more common in China. Banks and other financial institutions are encouraging their customers to change the way they buy things. Credit cards, otherwise known as 「plastic money」, are being offered on very good terms to encourage the change. Consumers will be able to 「buy now, pay later」, and many see this as an advantage.
But people need to be careful. There are dangers associated with credit cards. Some people find it very easy to exceed their budget. They are tempted to purchase goods that they do not really need, and can become quickly overburdened by debt. The credit cards often charge a high rate of interest, which exacerbates the problems for these people.
However, used wisely credit cards can improve the quality of people』s lives. They can give people access to money to meet sudden unplanned expenses. Properly handled, they can let people control their expenditure and the monthly statements provide a record of where their money has gone.

『叄』 關於校園安全的英語四級作文

關於讀書,學生的一些情況存在的不良現象可以寫一下

『肆』 關於網路科技的英語四級優秀作文

the era of information and technology, the Internet plays an important role in our
society. However, people』s opinions are still divided on this point. Those who are in favor of the Internet claim that it has a lot of advantages. Firstly, information searching is no longer a tough job with the help of all kinds of search engines. Secondly, we can contact friends or business partners via e-mails or software such as Internet Meeting and Yahoo Messenger.
Those who are opposed to the Internet hold that its disadvantages are numerous. In the first place, using the Internet costs considerable time, money and energy, especially for those with poor self-control. In the second place, increasing young people are inlged in online games and unhealthy information, which are extremely harmful to their development.

『伍』 求一篇關於電腦病毒的英語作文

灰鴿子 病毒
Gray is a well-known dove back door. Compared to the older ice, black, gray pigeon can be said to be the back door of the home are a combination of different opinions. The rich and powerful functionality and flexibility of operation, well hidden so that others are to be outshone by the back door. Client simple and convenient to operate so that the entry of just a beginner can act as hackers. When used in legal cases, the gray pigeon is a good remote control software. However, if some of it to do illegal things, gray pigeons have become very powerful hacking tool. This is like powder, on various occasions, brought different. Gray dove to the complete presentation may be only a gray pigeon author to make it clear that we are here only for a brief.
Gray Pigeon client and server are based on the preparation of Delphi. Hackers use of the client to configure a server program. Can be configured to include information on the type of line (for example, wait for the connection or take the initiative to connect), take the initiative to connect using the public network IP (domain name), a password to connect, the use of the port, the start of the name, the name of the service, the process of hidden ways, the use of the Shell, agents, icons and so on.
Server for the client to connect a variety of ways, making the environment in a variety of network users may be poisoning, including local area network users (Internet through a proxy), the public network and ADSL users to dial-up users.
As the gray dove to intercept the API call, in the normal mode file server and its services are registered to hide, that is to say, even if you set up a "show all hidden files" do not see them. In addition, the gray-end services doves of the file name can be customized, hand-All this has brought about the detection of certain difficulties. <br> However, through careful observation, we found that the detection of gray pigeons still have to follow the law. From the above analysis we can see that principle to run, regardless of the custom server-side file name is what will normally be installed in the operating system directory in order to generate a "_hook.dll" at the end of the document. Through this, we can more accurately detect the hand-gray-end services doves. <br> Due to the normal mode will hide their gray pigeons, so detection of gray pigeons must operate in a safe mode. Into the safe mode is: Start the computer in the Windows system into the start screen, press the F8 key (or in your computer holding down the Ctrl key), in the event of the start-up options menu, select "Safe Mode" Or "Safe Mode." <br> 1, dove gray as a result of the document itself has hidden attributes, so set Windows to show all files. Open "My Computer" menu, select "Tools" - "" Folder Options ", click" view "to remove" hide protected operating system files "before the Duigou, and the" hidden files and folders " Select the item "Show hidden files and folders," then click "OK." <br> 2, open the Windows "search files", enter the file name "_hook.dll", the search location to choose the Windows installation directory (for 98/xp default C: \ windows, 2k/NT for the C: \ Winnt). <br> 3, after a search, we have Windows directory (does not contain a subdirectory), the discovery of a document Game_Hook.dll. <br> 4, according to the analysis of the principle of gray pigeons, we know that if it is gray pigeons Game_Hook.DLL documents, the operating system is installed in the directory will be Game.exe and Game.dll document. Open the Windows directory, there are really two documents at the same time there is a record for keyboard operation GameKey.dll document. <br> After a few steps which we operate on the basic of these documents can be gray-end services doves of the.

熱點內容
39天電影在線播放免費觀看 發布:2024-08-19 09:18:18 瀏覽:939
可投屏電影網站 發布:2024-08-19 08:19:20 瀏覽:140
農村喜劇電影在線觀看 發布:2024-08-19 07:46:21 瀏覽:300
電影院默認區域 發布:2024-08-19 07:39:02 瀏覽:873
台灣金燕全部電 發布:2024-08-19 07:30:20 瀏覽:249
在哪可以看網站 發布:2024-08-19 07:29:06 瀏覽:467
電影tv版app 發布:2024-08-19 07:28:17 瀏覽:51
韓國倫理電影在什麼地方看的啊 發布:2024-08-19 07:18:34 瀏覽:835
韓國找女兒那個電影 發布:2024-08-19 07:18:34 瀏覽:667
驚變溫碧霞在線播放 發布:2024-08-19 07:10:13 瀏覽:404