首页 | 本学科首页   官方微博 | 高级检索  
     检索      

木马分析与防范
引用本文:朱卫扬.木马分析与防范[J].扬州教育学院学报,2009,27(3):36-38.
作者姓名:朱卫扬
作者单位:扬州职业大学,江苏,扬州,225009
摘    要:介绍了计算机木马的传播和伪装方式,指出它通过远程控制窃取密码、操作文件和系统、修改注册表等危害性,从实践角度提出了手工和工具两种检测及清除木马的方法。

关 键 词:木马  端口  注册表

Analysis of Trojan-Horse and Its Prevention
ZHU Wei-yang.Analysis of Trojan-Horse and Its Prevention[J].Journal of Yangzhou College of Education,2009,27(3):36-38.
Authors:ZHU Wei-yang
Institution:zhou Polytechnic College - yang Yangzhou 225009, China)
Abstract:This paper introduces the spread and camouflage means of Trojan Horse in the computer. Then it points out the harmfulness to steal secret codes, operate documents and systems and modify registered forms through the remote control of Trojan Horse. From the practical angle, it offers two ways to examine and eliminate Trojan Horse by hand or by tool.
Keywords:Trojan Horse  port  registered forms
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号