论文部分内容阅读
在互联网盛行的今天,“木马”一词可以说是无人不知、无人不晓。但是且不说普通用户的个人电脑能否抵御木马入侵,就连美国国防部也少不了被黑客的木马频繁光顾。换个思路应对木马来袭木马的危害尽人皆知,但是其工作原理并不是每个人都知道。首先,黑客会找机会把木马安插在目标系统的角落里,那么如果不运行它的话,其永远都不会对你的电脑产生威胁。但是只要黑客通过网络远程遥控了木马程序,窃取资料甚至破坏系统就成了轻而易举的事情了。所以,查杀隐藏在你电脑角落里的木马是目
Popular in the Internet today, “Trojan ” can be said that no one knows the word, nobody knows. But not to mention that an ordinary user’s personal computer can withstand Trojan invasion, and even the United States Department of Defense are ultimately frequented by hackers Trojans. Another idea to deal with the dangers of Trojan strikes Trojan is well known, but its working principle is not everyone knows. First of all, hackers will find opportunities to put the Trojan in the corner of the target system, then if you do not run it, it will never be a threat to your computer. However, as long as hackers remotely control the Trojan through the Internet, stealing data and even destroying the system has become a breeze. So, killing the hidden Trojans in your computer corner is the goal