ActiveX ActiveX controls are software modules based on Microsoft`s Component Object Model (COM) architecture. They add functionality to software applications by seamlessly incorporating pre-made modules with the basic software package.Modules can be interchanged but still appear as parts of the original software.On the Internet, ActiveX controls can be linked to Web pages and downloaded by an ActiveX-compliant browser.ActiveX controls turn Web pages into software pages that perform like any other program launched from a server.ActiveX controls can have full system access.In most instances this access is legitimate, but one should be cautious of malicious ActiveX applications.
Anti-virus Software Anti-virus software scans a computer`s memory and disk drives for viruses. If it finds a virus, the application informs the user and may clean, delete or quarantine any files, directories or disks affected by the malicious code.Also:Anti-virus Scanner
Armored Virus An armored virus tries to prevent analysts from examining its code. The virus may use various methods to make tracing, disassembling and reverse engineering its code more difficult.
ASCII American Standard Code for Information Interchange. Usually refers to coding system that assigns numerical values to characters such as letter, numbers, punctuation, and other symbols.Basic ASCII allows only 7 bits per character (for a total of 128 characters).The first 32 characters are "unprintable" (line feed, form feed, etc.).Extended ASCII adds an additional 128 characters that vary between computers, programs and fonts.Computers use these extra characters for accented letters, graphical haracters or other special symbols.
Attack An attempt to subvert or bypass a system`s security.Attacks may be passive or active.Active attacks attempt to alter or destroy data.Passive attacks try to intercept or read data without changing it.See Also:Brute Force Attack, Denial of Service, Hijacking, Password Attacks, Password Sniffing
Back Door A feature programmers often build into programs to allow special privileges normally denied to users of the program.Often programmers build back doors so they can fix bugs.If hackers or others learn about a back door, the feature may pose a security risk.Also:Trapdoor.
Background Task A task executed by the system but generally remain invisible to the user. The system usually assigns background tasks a lower priority than foreground tasks.Some malicious software is executed by a system as a background task so the user does not realize unwanted actions are occurring.
BIOS Basic Input/Output System.The part of the operating system that identifies the set of programs used to boot the computer before locating the system disk.The BIOS is located in the ROM (Read Only Memory) area of system and is usually stored permanently.
Boot Sector An area located on the first track of floppy disks and logical disks that contain the boot record.Boot sector usually refers to this specific sector of a floppy disk, whereas the term Master Boot Sector usually refers to the same section of a hard disk.
Bug An unintentional fault in a program that causes actions neither the user nor the program author intended.Cavity Virus.A cavity virus overwrites a part of its host file without increasing the length of the file while also preserving the host`s functionality.
Cold Boot To start the computer by cycling the power. A cold boot using a rescue disk (a clean floppy disk with boot instructions and virus scanning capabilities) is often necessary to clean or remove boot sector infectors.See Also:Boot, Warm Boot
COM File A type of executable file limited to 64 kb. These simple files are often used for utility programs and small routines.Because COM files are executable, viruses can infect them.This file type has the extension COM.
Cookie Cookies are blocks of text placed in a file on your computer`s hard disk.Web sites use cookies to identify users who revisit the site.Cookies might contain login or registration information, "shopping cart" information or user preferences.When a server receives a browser request that includes a cookie, the server can use the information stored in the cookie to customize the Web site for the user.Cookies can be used to gather more information about a user than would be possible without them.
Direct Action Virus A direct action virus works immediately to load itself into memory, infect other files, and then to unload itself.
DOC File A Microsoft Word Document File. In the past, these files contained only document data, but with many newer versions of Microsoft Word, DOC files also include small programs called macros.Many virus authors use the macro programming language to associate macros with DOC files.This file type has the extension DOC.
DOS Disk Operating System. Generally any computer operating system, though often used as shorthand for MS-DOS——the operating system used by Microsoft before Windows was developed. FAT File Allocation Table. The under MS-DOS, Windows 3.x, 9x, and NT (in some cases), the FAT is located in the boot sector of the disk and stores the addresses of all the files contained on a disk.Viruses and other malicious programs, as well and normal use and extended wear and tear, can damage the FAT.If the FAT is damaged or corrupt, the operating system may be unable to locate files on the disk.
Firewall A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel.The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules.Good Times.See:Virus Hoaxes
Macro A macro is a series of instructions designed to simplify repetitive tasks within a program such as Microsoft Word, Excel or Access.Macros execute when a user opens the associated file.Microsoft`s latest macro programming language is simple to use, powerful, and not limited to Word documents.Macros are in mini-programs and can be infected by viruses.See Also:Macro Virus
Macro Virus A macro virus is a malicious macro. Macro viruses are written a macro programming language and attach to a document file (such as Word or Excel). When a document or template containing the macro virus is opened in the target application, the virus runs, does its damage and copies itself into other documents.Continual use of the program results in the spread of the virus.
Memory-resident Virus A memory-resident virus stays in memory after it executes and infects other files when certain conditions are met.In contrast, non-memory-resident viruses are active only while an infected application runs.
MP3 File Moving Picture Experts Group Audio Layer 3 File. MP3 files are highly compressed audio tracks, and are very popular on the Internet.MP3 files are not programs, and viruses cannot infect them.This file type has the extension MP3.
MS-DOS The Microsoft Disk Operating System. The operating system Microsoft developed for the IBM platform before Windows.Windows 3.x, 95 and 98 rely heavily on MS-DOS and can execute most MS-DOS commands.
On-demand Scanner A virus scanner the user starts manually. Most on-demand scanners allow the user to set various configurations and to scan specific files, folders or disks.
Operating System The operating system is usually the underlying software that enables you to interact with the computer.The operating system controls the computer storage, communications and task management functions.Examples of common operating stems include:MS-DOS, MacOS, Linux, Windows 98.Also:OS, DOS
Overwriting Virus An overwriting virus copies its code over its host file`s data, thus destroying the original program.Disinfection is possible, although files cannot be recovered.It is usually necessary to delete the original file and replace it with a clean copy.
Password Sniffing The use of a sniffer to capture passwords as they cross a network. The network could be a local area network, or the Internet itself.The sniffer can be hardware or software.Most sniffers are passive and only log passwords.The attacker must then analyze the logs later.See Also:Sniffer
Shared Drive A disk drive available to other computers on the network. Shared drives use the Universal Naming Convention to differentiate themselves from other drives.See Also:Mapped Drives, UNC
SMTP Simple Mail Transport Protocol. The Internet e-mail delivery format for transmitting e-mail messages between servers.
Sniffer A software program that monitors network traffic.Hackers use sniffers to capture data transmitted via a network.
VBS Visual Basic Script.Visual Basic Script is a programming language that can invoke any system function——including starting, using and shutting down other applications without——user knowledge.VBS programs can be embedded in HTML files and provide active content via the Internet.Since not all content is benign, users should be careful about changing security settings without understanding the implications.This file type has the extension VBS.
Virus A computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission.Some viruses attach to files so when the infected file executes, the virus also executes.Other viruses sit in a computer`s memory and infect files as the computer opens, modifies or creates the files.Some viruses display symptoms, and some viruses damage files and computer systems, but neither symptoms nor damage is essential in the definition of a virus;a non-damaging virus is still a virus.There are computer viruses written for several operating systems including DOS, Windows, Amiga, Macintosh, Atari, and UNIX, and others.McAfee.com presently detects more than 57,000 viruses, Trojans, and other malicious software.(Note:The preferred plural is the English form:viruses)See Also:Boot Sector Infector, File Viruses, Macro virus, Companion Virus, Worm,
Warm Boot Restarting a computer without first turning off the power. Using CTL+ALT+DEL or the reset button on many computers can warm boot a machine.See Also:Cold Boot, Reset
Worm Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files.Worms can create copies on the same computer, or can send the copies to other computers via a network.Worms often spread via IRC (Internet Relay Chat).
翻譯:
ActiveX ActiveX控制是根據(jù)微軟公司(com)組成部分目的的典型的建筑學(xué)的軟件模數(shù)他們接著說:對(duì)軟件無縫的使預(yù)制的模數(shù)用基本軟件package.Modules拉入內(nèi)部的應(yīng)用的功能性能被交換,但是象最初的software.On的部分那樣還出現(xiàn)因特網(wǎng)ActiveX控制能和網(wǎng)頁被連上,ActiveX做依據(jù)的browser.ActiveX控制轉(zhuǎn)動(dòng)網(wǎng)頁卸載了成為象任何別的從server.ActiveX控制被開始的程序都能有完整的系統(tǒng)access.In的大部分的例子似地實(shí)行的軟件頁這接近合法,但是一個(gè)應(yīng)該是惡意的ActiveX應(yīng)用小心。
抗反病毒軟件抗反病毒軟件對(duì)計(jì)算機(jī)記憶和磁盤驅(qū)動(dòng)要求調(diào)查病毒如果它發(fā)現(xiàn)病毒,應(yīng)用把任何文件,文件夾或受惡意的修改。就像抗病毒掃描儀的影響的磁盤通知用戶,可以干凈,刪除,或者隔離
武裝病毒武裝的病毒努力去妨礙分析者核查其代碼病毒可以用各種的方法來做追蹤,分解,逆向工程師其更難的代碼。
ASCII用于信息交換的美國標(biāo)準(zhǔn)代碼通常成把把數(shù)值給特性分配象信,數(shù)字押寶,標(biāo)點(diǎn)符號(hào)和其他的symbols.Basic ASCII 7位/特性(128特性的合計(jì))僅僅認(rèn)為.The的第一個(gè)32特性是這樣的系統(tǒng)電碼化提到“不適合印刷”(換行,換頁,等等).擴(kuò)展ASCII加在計(jì)算機(jī)之間變化的補(bǔ)充性的128特性編,并且,為強(qiáng)調(diào)的信,用圖表示的haracters或其他的特殊的象征使用這些額外的特性。
攻擊破壞,或者繞過系統(tǒng)安全設(shè)置的嘗試也許是改變,或者破壞攻擊為了不改變它。正如:禽獸力量攻擊——有用的否認(rèn)——而攔截,或者讀數(shù)據(jù)試著劫持,口令攻擊。被動(dòng)的攻擊。主動(dòng)攻擊嘗試在嗅氣味口令
后門木馬程序編制員編寫軟件的特點(diǎn)成為了他們能固定漏洞。如果電腦黑客所以認(rèn)為不被給程序。通常程序編制員的用戶的通常的特權(quán)把門考慮進(jìn)行編寫或別的后門監(jiān)聽,特點(diǎn)可以把安全設(shè)定。正如 :地板門擺正位置。
后臺(tái)作業(yè)作業(yè)系統(tǒng)實(shí)行了,但是一般地保持給用戶看不見系統(tǒng)把背景作業(yè)通常分配給與前景作業(yè)。有時(shí)的惡意的軟件系統(tǒng)象背景作業(yè)那樣實(shí)行相比,用戶不理解發(fā)生不必要的行動(dòng)所以更低的優(yōu)先的程度。
BIOS那個(gè)識(shí)別一套的操作系統(tǒng)的部分編的系統(tǒng)。那些用來在確定系統(tǒng)位置。BIOS的地點(diǎn)之前踢計(jì)算機(jī)的基本的輸入/輸出坐落于只讀存儲(chǔ)器(只讀存儲(chǔ)器)系統(tǒng)的地區(qū),并且通常永久地儲(chǔ)備。
引導(dǎo)區(qū)被置于通常包括清空操作記錄。啟動(dòng)部分的軟盤和邏輯性的磁盤的第一個(gè)軌道的地區(qū)提到這軟盤的特定的部門,但是,引導(dǎo)區(qū)通常提到硬盤的相同的一部分。
漏洞當(dāng)另外, 保存主功能性的時(shí)候,是在不引起用戶和程序故障的同時(shí),作者故意留下的。Cavity Virus.A病毒的程序里的非故意的缺點(diǎn)不增加文件的長度而寫在其主文件的部分上面。
冷起動(dòng)開始使力循環(huán)的計(jì)算機(jī)在使用營救磁盤(清潔在搜尋能力的用引導(dǎo)命令和病毒軟盤)的冷起動(dòng)經(jīng)常為了使引導(dǎo)區(qū)清潔.正如:引導(dǎo)——熱啟動(dòng)——干凈,或者除掉必要
com文件某種類型可執(zhí)行文件把限定了在64 kb范圍內(nèi)這些簡(jiǎn)單的文件為實(shí)用程序和小的程序。因?yàn)閏om文件經(jīng)常被可執(zhí)行病毒能感染。這類病毒感染疾病擴(kuò)展com。
Cookie Cookies是為了識(shí)別用戶置到你的計(jì)算機(jī)硬盤。網(wǎng)絡(luò)站點(diǎn)使用cookies上于文件的正文的場(chǎng)所.Cookies可以包括的注冊(cè),或者登記信息,或者用戶服務(wù)器收到參數(shù)選擇。當(dāng)包括果子面包在內(nèi),服務(wù)器能用被保管在果子面包的信息來定制的瀏覽器要求給用戶.Cookies的網(wǎng)點(diǎn)能被用來把與將相比,更多的信息聚集在用戶不用他們而可能。
直接執(zhí)行病毒直接的行動(dòng)病毒工作為了裝本身成為記憶使其他的文件立即感染疾病,于是,放下本身。
DOC文件Microsoft Word文檔,這些文件僅僅包括了僅僅用Microsoft Word的很多的更新版本文件文件也包括的文件數(shù)據(jù)小編宏觀的為了把宏指令聯(lián)系起來和文件。這些文件類型的程序設(shè)計(jì)語言有的叫的macros。許多病毒作者使用擴(kuò)展文件。
DOS磁盤操作系統(tǒng)一般地一點(diǎn)也雖然象縮寫微軟磁盤操作系統(tǒng)——在視窗被開發(fā)之前操作系統(tǒng)用盡了微軟公司——的那樣經(jīng)常被使用的計(jì)算機(jī)操作系統(tǒng)。
FAT文件分配表下面微軟磁盤操作系統(tǒng),視窗3.x,9x,并且NT(一些情況在中)FAT象那樣好好地坐落于全部文件的地址都在disk.Viruses上包括,并且惡意的另一個(gè)編的磁盤和商店的引導(dǎo)區(qū),并且通常的使用和擴(kuò)展的磨損能損害FAT.If FAT被破壞,或者自己損壞,操作系統(tǒng)也許不會(huì)把文件置于磁盤。
Internet 防火墻Internet 防火墻在網(wǎng)絡(luò)上妨礙計(jì)算機(jī)和外的計(jì)算機(jī)系統(tǒng)直接交流Internet 防火墻由扮演如果它不依從預(yù)先成形的規(guī)則。例如:病毒騙局全部在網(wǎng)絡(luò)和外的系統(tǒng)不可缺少的東西運(yùn)行.那么 Internet 防火墻軟件之間通過的信息都分析在二之間通過的信息,拒絕接受它的柵欄的角色的計(jì)算機(jī)典型地構(gòu)成
宏指令宏指令是被計(jì)劃在使用象Microsoft Word,Excel或Access.Macros實(shí)行用戶開聯(lián)合file.Microsoft程序設(shè)計(jì)語言給簡(jiǎn)單的最新的宏指令的時(shí)候這樣非常的程序的范圍內(nèi)簡(jiǎn)化反復(fù)的作業(yè),不被制限在文檔.Macros在里的詞范圍內(nèi)的命令的小的系列編程序,并且能是病毒.比如:宏觀的病毒感染疾病
宏病毒宏觀的病毒是惡意的宏指令宏觀的病毒被寫宏觀的程序設(shè)計(jì)語言,附著于文件文件(詞或Excel類似)當(dāng)包括宏觀的病毒的文件或樣板在目標(biāo)應(yīng)用中被開的時(shí)候,病毒跑,帶來其損害,在病毒的擴(kuò)展中復(fù)印本身成為程序結(jié)果的其他的文檔。
儲(chǔ)內(nèi)存病毒在它使其他的文件實(shí)行,感染疾病之后,當(dāng)某條件計(jì)劃運(yùn)行.在形成對(duì)照的時(shí)候,存儲(chǔ)常駐區(qū)的病毒待在記憶里,僅僅當(dāng)感染疾病的應(yīng)用跑的時(shí)候,非存儲(chǔ)常駐區(qū)的病毒積極。
MP3文件MPEG的聲音的層3把歸檔MP3文件是非常壓縮的聲音的軌道,Internet.MP3文件上非常流行編,并且病毒一般不能使文件類型感染.這些文件感染疾病擴(kuò)展MP3。
微軟磁盤操作系統(tǒng)微軟磁盤操作系統(tǒng)在Windows.Windows 3.x,95和98重重地依靠微軟磁盤操作系統(tǒng),能實(shí)行大部分的微軟磁盤操作系統(tǒng)指令之前操作系統(tǒng)微軟公司為IBM(美國國際商用機(jī)器公司)平臺(tái)發(fā)展了。
掃描儀用戶用手工開始的病毒掃描儀最隨叫隨到地掃描儀允許用戶放各種的構(gòu)造,搜尋特定的文件,文件夾或磁盤。
操作系統(tǒng)操作系統(tǒng)通常是能使你與計(jì)算機(jī)記憶,通信和共同的操作的莖的計(jì)件工作管理functions.Examples包括的computer.The操作系統(tǒng)控制:微軟磁盤操作系統(tǒng)相互作用,MacOS——Linux(PC機(jī)用的免費(fèi)UNIX操作系統(tǒng))——安裝窗戶的根本性的軟件98.Also : OS——DOS——
病毒寫寫的病毒在其主人文件數(shù)據(jù)上面復(fù)印其代碼這樣破壞最初的文件.殺毒可能,但是文件不能是殺毒.他通常為了刪除最初的文件,只能用清潔的覆蓋.
嗅探口令為了截獲口令的sniffer的使用他們把網(wǎng)絡(luò)交差起來網(wǎng)絡(luò)能是局部信息網(wǎng)或因特網(wǎng).sniffer能是硬件或軟件.許多sniffers是被動(dòng)的,并且僅僅然后攻擊者必須分析的密碼.記錄下來.正如: Sniffer
共享給網(wǎng)絡(luò)上的其他的計(jì)算機(jī)可以利用的磁盤驅(qū)動(dòng)共同地享有的駕竹用普遍性的指定規(guī)則來把他們自己和其他的硬盤.正如:共享的——UNC——加以區(qū)別
簡(jiǎn)單郵件傳輸協(xié)議簡(jiǎn)單的郵件運(yùn)輸擬定因特網(wǎng)向發(fā)送格式用電子信件方式發(fā)送傳送服務(wù)器之間的電子信件信息。
Sniffer截獲網(wǎng)絡(luò)傳輸?shù)臄?shù)據(jù)報(bào)文的工具。
VBS基本的腳本.Visual寫的Visual Basic是能祈求系統(tǒng)功能任何——開始,使用,關(guān)上下邊的其他的應(yīng)用不用而包括——保護(hù)的程序設(shè)計(jì)語言.VBS編的用戶能在HTML文件中被埋入,規(guī)定經(jīng)過全都滿意的Internet.Since的積極的內(nèi)容不慈祥,用戶應(yīng)該就不明白而改變安全設(shè)定注意鏈接.這些文件類型有擴(kuò)展VBS。
病毒
熱啟動(dòng)再開不第一個(gè)關(guān)上力的計(jì)算機(jī)使用很多的計(jì)算機(jī)上的鈕能加熱的CTL+ALT+DEL或復(fù)位啟動(dòng)機(jī)器.正如:冷起動(dòng)——復(fù)位——
蠕蟲蠕蟲是寄生的那樣反復(fù)的計(jì)算機(jī)程序,但是不同的病毒,不使文件感染.蠕蟲能制作的程序在相同的計(jì)算機(jī)上復(fù)印的其他的計(jì)算機(jī)感染疾病,或者能給其他的計(jì)算機(jī)經(jīng)網(wǎng)絡(luò)活動(dòng).蠕蟲經(jīng)IRC經(jīng)常告訴拷貝擴(kuò)展(因特網(wǎng)中繼對(duì)話)。
Anti-virus Software Anti-virus software scans a computer`s memory and disk drives for viruses. If it finds a virus, the application informs the user and may clean, delete or quarantine any files, directories or disks affected by the malicious code.Also:Anti-virus Scanner
Armored Virus An armored virus tries to prevent analysts from examining its code. The virus may use various methods to make tracing, disassembling and reverse engineering its code more difficult.
ASCII American Standard Code for Information Interchange. Usually refers to coding system that assigns numerical values to characters such as letter, numbers, punctuation, and other symbols.Basic ASCII allows only 7 bits per character (for a total of 128 characters).The first 32 characters are "unprintable" (line feed, form feed, etc.).Extended ASCII adds an additional 128 characters that vary between computers, programs and fonts.Computers use these extra characters for accented letters, graphical haracters or other special symbols.
Attack An attempt to subvert or bypass a system`s security.Attacks may be passive or active.Active attacks attempt to alter or destroy data.Passive attacks try to intercept or read data without changing it.See Also:Brute Force Attack, Denial of Service, Hijacking, Password Attacks, Password Sniffing
Back Door A feature programmers often build into programs to allow special privileges normally denied to users of the program.Often programmers build back doors so they can fix bugs.If hackers or others learn about a back door, the feature may pose a security risk.Also:Trapdoor.
Background Task A task executed by the system but generally remain invisible to the user. The system usually assigns background tasks a lower priority than foreground tasks.Some malicious software is executed by a system as a background task so the user does not realize unwanted actions are occurring.
BIOS Basic Input/Output System.The part of the operating system that identifies the set of programs used to boot the computer before locating the system disk.The BIOS is located in the ROM (Read Only Memory) area of system and is usually stored permanently.
Boot Sector An area located on the first track of floppy disks and logical disks that contain the boot record.Boot sector usually refers to this specific sector of a floppy disk, whereas the term Master Boot Sector usually refers to the same section of a hard disk.
Bug An unintentional fault in a program that causes actions neither the user nor the program author intended.Cavity Virus.A cavity virus overwrites a part of its host file without increasing the length of the file while also preserving the host`s functionality.
Cold Boot To start the computer by cycling the power. A cold boot using a rescue disk (a clean floppy disk with boot instructions and virus scanning capabilities) is often necessary to clean or remove boot sector infectors.See Also:Boot, Warm Boot
COM File A type of executable file limited to 64 kb. These simple files are often used for utility programs and small routines.Because COM files are executable, viruses can infect them.This file type has the extension COM.
Cookie Cookies are blocks of text placed in a file on your computer`s hard disk.Web sites use cookies to identify users who revisit the site.Cookies might contain login or registration information, "shopping cart" information or user preferences.When a server receives a browser request that includes a cookie, the server can use the information stored in the cookie to customize the Web site for the user.Cookies can be used to gather more information about a user than would be possible without them.
Direct Action Virus A direct action virus works immediately to load itself into memory, infect other files, and then to unload itself.
DOC File A Microsoft Word Document File. In the past, these files contained only document data, but with many newer versions of Microsoft Word, DOC files also include small programs called macros.Many virus authors use the macro programming language to associate macros with DOC files.This file type has the extension DOC.
DOS Disk Operating System. Generally any computer operating system, though often used as shorthand for MS-DOS——the operating system used by Microsoft before Windows was developed. FAT File Allocation Table. The under MS-DOS, Windows 3.x, 9x, and NT (in some cases), the FAT is located in the boot sector of the disk and stores the addresses of all the files contained on a disk.Viruses and other malicious programs, as well and normal use and extended wear and tear, can damage the FAT.If the FAT is damaged or corrupt, the operating system may be unable to locate files on the disk.
Firewall A firewall prevents computers on a network from communicating directly with external computer systems. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel.The firewall software analyzes information passing between the two and rejects it if it does not conform to pre-configured rules.Good Times.See:Virus Hoaxes
Macro A macro is a series of instructions designed to simplify repetitive tasks within a program such as Microsoft Word, Excel or Access.Macros execute when a user opens the associated file.Microsoft`s latest macro programming language is simple to use, powerful, and not limited to Word documents.Macros are in mini-programs and can be infected by viruses.See Also:Macro Virus
Macro Virus A macro virus is a malicious macro. Macro viruses are written a macro programming language and attach to a document file (such as Word or Excel). When a document or template containing the macro virus is opened in the target application, the virus runs, does its damage and copies itself into other documents.Continual use of the program results in the spread of the virus.
Memory-resident Virus A memory-resident virus stays in memory after it executes and infects other files when certain conditions are met.In contrast, non-memory-resident viruses are active only while an infected application runs.
MP3 File Moving Picture Experts Group Audio Layer 3 File. MP3 files are highly compressed audio tracks, and are very popular on the Internet.MP3 files are not programs, and viruses cannot infect them.This file type has the extension MP3.
MS-DOS The Microsoft Disk Operating System. The operating system Microsoft developed for the IBM platform before Windows.Windows 3.x, 95 and 98 rely heavily on MS-DOS and can execute most MS-DOS commands.
On-demand Scanner A virus scanner the user starts manually. Most on-demand scanners allow the user to set various configurations and to scan specific files, folders or disks.
Operating System The operating system is usually the underlying software that enables you to interact with the computer.The operating system controls the computer storage, communications and task management functions.Examples of common operating stems include:MS-DOS, MacOS, Linux, Windows 98.Also:OS, DOS
Overwriting Virus An overwriting virus copies its code over its host file`s data, thus destroying the original program.Disinfection is possible, although files cannot be recovered.It is usually necessary to delete the original file and replace it with a clean copy.
Password Sniffing The use of a sniffer to capture passwords as they cross a network. The network could be a local area network, or the Internet itself.The sniffer can be hardware or software.Most sniffers are passive and only log passwords.The attacker must then analyze the logs later.See Also:Sniffer
Shared Drive A disk drive available to other computers on the network. Shared drives use the Universal Naming Convention to differentiate themselves from other drives.See Also:Mapped Drives, UNC
SMTP Simple Mail Transport Protocol. The Internet e-mail delivery format for transmitting e-mail messages between servers.
Sniffer A software program that monitors network traffic.Hackers use sniffers to capture data transmitted via a network.
VBS Visual Basic Script.Visual Basic Script is a programming language that can invoke any system function——including starting, using and shutting down other applications without——user knowledge.VBS programs can be embedded in HTML files and provide active content via the Internet.Since not all content is benign, users should be careful about changing security settings without understanding the implications.This file type has the extension VBS.
Virus A computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission.Some viruses attach to files so when the infected file executes, the virus also executes.Other viruses sit in a computer`s memory and infect files as the computer opens, modifies or creates the files.Some viruses display symptoms, and some viruses damage files and computer systems, but neither symptoms nor damage is essential in the definition of a virus;a non-damaging virus is still a virus.There are computer viruses written for several operating systems including DOS, Windows, Amiga, Macintosh, Atari, and UNIX, and others.McAfee.com presently detects more than 57,000 viruses, Trojans, and other malicious software.(Note:The preferred plural is the English form:viruses)See Also:Boot Sector Infector, File Viruses, Macro virus, Companion Virus, Worm,
Warm Boot Restarting a computer without first turning off the power. Using CTL+ALT+DEL or the reset button on many computers can warm boot a machine.See Also:Cold Boot, Reset
Worm Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files.Worms can create copies on the same computer, or can send the copies to other computers via a network.Worms often spread via IRC (Internet Relay Chat).
翻譯:
ActiveX ActiveX控制是根據(jù)微軟公司(com)組成部分目的的典型的建筑學(xué)的軟件模數(shù)他們接著說:對(duì)軟件無縫的使預(yù)制的模數(shù)用基本軟件package.Modules拉入內(nèi)部的應(yīng)用的功能性能被交換,但是象最初的software.On的部分那樣還出現(xiàn)因特網(wǎng)ActiveX控制能和網(wǎng)頁被連上,ActiveX做依據(jù)的browser.ActiveX控制轉(zhuǎn)動(dòng)網(wǎng)頁卸載了成為象任何別的從server.ActiveX控制被開始的程序都能有完整的系統(tǒng)access.In的大部分的例子似地實(shí)行的軟件頁這接近合法,但是一個(gè)應(yīng)該是惡意的ActiveX應(yīng)用小心。
抗反病毒軟件抗反病毒軟件對(duì)計(jì)算機(jī)記憶和磁盤驅(qū)動(dòng)要求調(diào)查病毒如果它發(fā)現(xiàn)病毒,應(yīng)用把任何文件,文件夾或受惡意的修改。就像抗病毒掃描儀的影響的磁盤通知用戶,可以干凈,刪除,或者隔離
武裝病毒武裝的病毒努力去妨礙分析者核查其代碼病毒可以用各種的方法來做追蹤,分解,逆向工程師其更難的代碼。
ASCII用于信息交換的美國標(biāo)準(zhǔn)代碼通常成把把數(shù)值給特性分配象信,數(shù)字押寶,標(biāo)點(diǎn)符號(hào)和其他的symbols.Basic ASCII 7位/特性(128特性的合計(jì))僅僅認(rèn)為.The的第一個(gè)32特性是這樣的系統(tǒng)電碼化提到“不適合印刷”(換行,換頁,等等).擴(kuò)展ASCII加在計(jì)算機(jī)之間變化的補(bǔ)充性的128特性編,并且,為強(qiáng)調(diào)的信,用圖表示的haracters或其他的特殊的象征使用這些額外的特性。
攻擊破壞,或者繞過系統(tǒng)安全設(shè)置的嘗試也許是改變,或者破壞攻擊為了不改變它。正如:禽獸力量攻擊——有用的否認(rèn)——而攔截,或者讀數(shù)據(jù)試著劫持,口令攻擊。被動(dòng)的攻擊。主動(dòng)攻擊嘗試在嗅氣味口令
后門木馬程序編制員編寫軟件的特點(diǎn)成為了他們能固定漏洞。如果電腦黑客所以認(rèn)為不被給程序。通常程序編制員的用戶的通常的特權(quán)把門考慮進(jìn)行編寫或別的后門監(jiān)聽,特點(diǎn)可以把安全設(shè)定。正如 :地板門擺正位置。
后臺(tái)作業(yè)作業(yè)系統(tǒng)實(shí)行了,但是一般地保持給用戶看不見系統(tǒng)把背景作業(yè)通常分配給與前景作業(yè)。有時(shí)的惡意的軟件系統(tǒng)象背景作業(yè)那樣實(shí)行相比,用戶不理解發(fā)生不必要的行動(dòng)所以更低的優(yōu)先的程度。
BIOS那個(gè)識(shí)別一套的操作系統(tǒng)的部分編的系統(tǒng)。那些用來在確定系統(tǒng)位置。BIOS的地點(diǎn)之前踢計(jì)算機(jī)的基本的輸入/輸出坐落于只讀存儲(chǔ)器(只讀存儲(chǔ)器)系統(tǒng)的地區(qū),并且通常永久地儲(chǔ)備。
引導(dǎo)區(qū)被置于通常包括清空操作記錄。啟動(dòng)部分的軟盤和邏輯性的磁盤的第一個(gè)軌道的地區(qū)提到這軟盤的特定的部門,但是,引導(dǎo)區(qū)通常提到硬盤的相同的一部分。
漏洞當(dāng)另外, 保存主功能性的時(shí)候,是在不引起用戶和程序故障的同時(shí),作者故意留下的。Cavity Virus.A病毒的程序里的非故意的缺點(diǎn)不增加文件的長度而寫在其主文件的部分上面。
冷起動(dòng)開始使力循環(huán)的計(jì)算機(jī)在使用營救磁盤(清潔在搜尋能力的用引導(dǎo)命令和病毒軟盤)的冷起動(dòng)經(jīng)常為了使引導(dǎo)區(qū)清潔.正如:引導(dǎo)——熱啟動(dòng)——干凈,或者除掉必要
com文件某種類型可執(zhí)行文件把限定了在64 kb范圍內(nèi)這些簡(jiǎn)單的文件為實(shí)用程序和小的程序。因?yàn)閏om文件經(jīng)常被可執(zhí)行病毒能感染。這類病毒感染疾病擴(kuò)展com。
Cookie Cookies是為了識(shí)別用戶置到你的計(jì)算機(jī)硬盤。網(wǎng)絡(luò)站點(diǎn)使用cookies上于文件的正文的場(chǎng)所.Cookies可以包括的注冊(cè),或者登記信息,或者用戶服務(wù)器收到參數(shù)選擇。當(dāng)包括果子面包在內(nèi),服務(wù)器能用被保管在果子面包的信息來定制的瀏覽器要求給用戶.Cookies的網(wǎng)點(diǎn)能被用來把與將相比,更多的信息聚集在用戶不用他們而可能。
直接執(zhí)行病毒直接的行動(dòng)病毒工作為了裝本身成為記憶使其他的文件立即感染疾病,于是,放下本身。
DOC文件Microsoft Word文檔,這些文件僅僅包括了僅僅用Microsoft Word的很多的更新版本文件文件也包括的文件數(shù)據(jù)小編宏觀的為了把宏指令聯(lián)系起來和文件。這些文件類型的程序設(shè)計(jì)語言有的叫的macros。許多病毒作者使用擴(kuò)展文件。
DOS磁盤操作系統(tǒng)一般地一點(diǎn)也雖然象縮寫微軟磁盤操作系統(tǒng)——在視窗被開發(fā)之前操作系統(tǒng)用盡了微軟公司——的那樣經(jīng)常被使用的計(jì)算機(jī)操作系統(tǒng)。
FAT文件分配表下面微軟磁盤操作系統(tǒng),視窗3.x,9x,并且NT(一些情況在中)FAT象那樣好好地坐落于全部文件的地址都在disk.Viruses上包括,并且惡意的另一個(gè)編的磁盤和商店的引導(dǎo)區(qū),并且通常的使用和擴(kuò)展的磨損能損害FAT.If FAT被破壞,或者自己損壞,操作系統(tǒng)也許不會(huì)把文件置于磁盤。
Internet 防火墻Internet 防火墻在網(wǎng)絡(luò)上妨礙計(jì)算機(jī)和外的計(jì)算機(jī)系統(tǒng)直接交流Internet 防火墻由扮演如果它不依從預(yù)先成形的規(guī)則。例如:病毒騙局全部在網(wǎng)絡(luò)和外的系統(tǒng)不可缺少的東西運(yùn)行.那么 Internet 防火墻軟件之間通過的信息都分析在二之間通過的信息,拒絕接受它的柵欄的角色的計(jì)算機(jī)典型地構(gòu)成
宏指令宏指令是被計(jì)劃在使用象Microsoft Word,Excel或Access.Macros實(shí)行用戶開聯(lián)合file.Microsoft程序設(shè)計(jì)語言給簡(jiǎn)單的最新的宏指令的時(shí)候這樣非常的程序的范圍內(nèi)簡(jiǎn)化反復(fù)的作業(yè),不被制限在文檔.Macros在里的詞范圍內(nèi)的命令的小的系列編程序,并且能是病毒.比如:宏觀的病毒感染疾病
宏病毒宏觀的病毒是惡意的宏指令宏觀的病毒被寫宏觀的程序設(shè)計(jì)語言,附著于文件文件(詞或Excel類似)當(dāng)包括宏觀的病毒的文件或樣板在目標(biāo)應(yīng)用中被開的時(shí)候,病毒跑,帶來其損害,在病毒的擴(kuò)展中復(fù)印本身成為程序結(jié)果的其他的文檔。
儲(chǔ)內(nèi)存病毒在它使其他的文件實(shí)行,感染疾病之后,當(dāng)某條件計(jì)劃運(yùn)行.在形成對(duì)照的時(shí)候,存儲(chǔ)常駐區(qū)的病毒待在記憶里,僅僅當(dāng)感染疾病的應(yīng)用跑的時(shí)候,非存儲(chǔ)常駐區(qū)的病毒積極。
MP3文件MPEG的聲音的層3把歸檔MP3文件是非常壓縮的聲音的軌道,Internet.MP3文件上非常流行編,并且病毒一般不能使文件類型感染.這些文件感染疾病擴(kuò)展MP3。
微軟磁盤操作系統(tǒng)微軟磁盤操作系統(tǒng)在Windows.Windows 3.x,95和98重重地依靠微軟磁盤操作系統(tǒng),能實(shí)行大部分的微軟磁盤操作系統(tǒng)指令之前操作系統(tǒng)微軟公司為IBM(美國國際商用機(jī)器公司)平臺(tái)發(fā)展了。
掃描儀用戶用手工開始的病毒掃描儀最隨叫隨到地掃描儀允許用戶放各種的構(gòu)造,搜尋特定的文件,文件夾或磁盤。
操作系統(tǒng)操作系統(tǒng)通常是能使你與計(jì)算機(jī)記憶,通信和共同的操作的莖的計(jì)件工作管理functions.Examples包括的computer.The操作系統(tǒng)控制:微軟磁盤操作系統(tǒng)相互作用,MacOS——Linux(PC機(jī)用的免費(fèi)UNIX操作系統(tǒng))——安裝窗戶的根本性的軟件98.Also : OS——DOS——
病毒寫寫的病毒在其主人文件數(shù)據(jù)上面復(fù)印其代碼這樣破壞最初的文件.殺毒可能,但是文件不能是殺毒.他通常為了刪除最初的文件,只能用清潔的覆蓋.
嗅探口令為了截獲口令的sniffer的使用他們把網(wǎng)絡(luò)交差起來網(wǎng)絡(luò)能是局部信息網(wǎng)或因特網(wǎng).sniffer能是硬件或軟件.許多sniffers是被動(dòng)的,并且僅僅然后攻擊者必須分析的密碼.記錄下來.正如: Sniffer
共享給網(wǎng)絡(luò)上的其他的計(jì)算機(jī)可以利用的磁盤驅(qū)動(dòng)共同地享有的駕竹用普遍性的指定規(guī)則來把他們自己和其他的硬盤.正如:共享的——UNC——加以區(qū)別
簡(jiǎn)單郵件傳輸協(xié)議簡(jiǎn)單的郵件運(yùn)輸擬定因特網(wǎng)向發(fā)送格式用電子信件方式發(fā)送傳送服務(wù)器之間的電子信件信息。
Sniffer截獲網(wǎng)絡(luò)傳輸?shù)臄?shù)據(jù)報(bào)文的工具。
VBS基本的腳本.Visual寫的Visual Basic是能祈求系統(tǒng)功能任何——開始,使用,關(guān)上下邊的其他的應(yīng)用不用而包括——保護(hù)的程序設(shè)計(jì)語言.VBS編的用戶能在HTML文件中被埋入,規(guī)定經(jīng)過全都滿意的Internet.Since的積極的內(nèi)容不慈祥,用戶應(yīng)該就不明白而改變安全設(shè)定注意鏈接.這些文件類型有擴(kuò)展VBS。
病毒
熱啟動(dòng)再開不第一個(gè)關(guān)上力的計(jì)算機(jī)使用很多的計(jì)算機(jī)上的鈕能加熱的CTL+ALT+DEL或復(fù)位啟動(dòng)機(jī)器.正如:冷起動(dòng)——復(fù)位——
蠕蟲蠕蟲是寄生的那樣反復(fù)的計(jì)算機(jī)程序,但是不同的病毒,不使文件感染.蠕蟲能制作的程序在相同的計(jì)算機(jī)上復(fù)印的其他的計(jì)算機(jī)感染疾病,或者能給其他的計(jì)算機(jī)經(jīng)網(wǎng)絡(luò)活動(dòng).蠕蟲經(jīng)IRC經(jīng)常告訴拷貝擴(kuò)展(因特網(wǎng)中繼對(duì)話)。

