① 请问到哪里可以免费下载计算机方面的英文文献呢
计算机网络方面的英文书籍一般是pdf文件格式。
一般来说,下载成功率比较高的,是通过p2p软件,我经常用的是emule,就是www.verycd.com上下载的。
使用这些下载软件的时候,通常是利用软件的“搜索”功能。比如,你所需要的计算机网络方面的书籍,一般是:computer
network,
network,
computer
net等,或者你到当当网、china-pub等网上书店上,看好了名字,在p2p软件中搜索也行。
通过搜索引擎进行检索也是另一种方式,但在搜索的时候最好加上“.pdf”的后缀名。
谢谢^_^
② 求一篇有关网络虚拟实验室的中英文文献,要中英
论文中英对照,可能有错误,但应该不会很多。
随着计算机、网络技术的不断发展,网络虚拟实验室得到越来越多的应用。 With the computer, the continuous development of network technology, network virtual laboratory to be more and more applications. 介绍了虚拟实验室的基本特点及其体系结构,实现虚拟实验室的四种关键技术: Java、ActiveX、VRML、ASP,最后探讨了虚拟实验室开发过程当中应注意的几个问题。 Introced the basic characteristics of virtual laboratory and its architecture, the realization of virtual laboratory four key technologies: Java, ActiveX, VRML, ASP, the last of the development process of virtual laboratory should pay attention to several problems. 关键词虚拟实验室远程教育现代教育技术迅速崛起的现代教育技术把虚拟实验引入到了实验教学中。 Key words virtual laboratory of modern ecational technology distance ecation the rapid rise of the modern ecational technology into the virtual experiment experimental teaching. 虚拟实验的应用改变了传统的教育模式,使得教与学方式发生了革命性的变化。 Application of virtual experiment to change the traditional mode of ecation and teaching and learning approach makes revolutionary change took place. 目前,用于实验教学的计算机虚拟实验软件非常丰富,加上高校计算机及网络资源,为虚拟实验的开设提供了必要的基础条件。 At present, for the experimental teaching of computer software, rich virtual experiment, together with the Universities computer and network resources for the creation of virtual experiments to provide the necessary basic conditions. 通过网络虚拟实验室,能够通过计算机在网络中模拟一些实验现象,它不仅仅能够提高实验教学效果,更加重要的是对一些缺乏实验条件的学生,通过网络同样能够身临其境地观察实验现象,甚至和异地的学生合作进行实验。 Through the network of virtual labs, through computer simulation in the network a number of experimental phenomena, it is not only to improve the effectiveness of experimental teaching, and more importantly, the lack of experimental conditions on some of the students, through the network to feel the same experimental phenomena observed, students in different places and even co-operation and carry out such experiments. 1 网络虚拟实验室的发展及其特点网络虚拟实验就是在WEB中创建出一个可视化的环境,其中每一个可视化的物体代表一种实验对象。 1 of the development of virtual laboratory network and the characteristics of the network is in the WEB virtual experiment to create a visual environment, a visualization of each of these objects on behalf of an experimental object. 通过鼠标的点击以及拖曳操作,用户可以进行虚拟的实验。 Through mouse clicks and drag and drop operation, users can conct virtual experiments. 网络虚拟实验实现的基础是多媒体计算机技术与网络技术的结合。 Network virtual experiment is based on the realization of multi-media computer technology and network technology. 无论是学生还是教师,都可以自由地、无顾虑地随时进入虚拟实验室操作仪器,进行各种实验。 Whether students or teachers, are free and without hesitation to operate at any time to enter the virtual laboratory apparatus, to carry out various experiments. 为实验类课程的教学改革及远程教育提供了条件和技术支持。 Experimental curriculum reform and teaching conditions for the provision of distance ecation and technical support. 许多国内外从事实验室工作的研究者们在实践中还提出这样一些概念:Digital Lab、MBL(Micro-computer Based Lab),尽管这些名词不统一,但他们的实践从不同的层面实现了虚拟实验室。 Many at home and abroad to engage in laboratory work in practice, the researchers also proposed the concept of such: Digital Lab, MBL (Micro-computer Based Lab), although these terms are not uniform, but they practice at different levels from a virtual experiment Room. 1.1 印地安那州立大学的MBL化学实验室该实验室在给新生开化学实验课时用计算机来辅助做这样一些事,用计算机采集与分析实验数据,用计算机展示实验,在网上发布相关的实验指导材料。 1.1 of the Indiana State University chemical laboratory of the MBL laboratory chemistry experiments to open new classes to help with the computer do something with computer acquisition and analysis of experimental data, using computer experiments show that in the relevant online Experimental guidance material. 1.2 芝加哥伊利诺伊大学数字化有机化学实验室该实验室充分利用网络资源,在网上提供了一系列的实验教学指导:在线实验教材;实验教学时间表;实验测评方法、形式、时间;虚拟实验;相关教学资源的链接等。 1.2 University of Illinois at Chicago, the number of the laboratory of organic chemistry lab full use of network resources, the Internet has provided a series of experimental teaching guide: online experimental materials; experimental teaching timetable; experimental evaluation of methods, forms, time; virtual experiments; related to teaching Links and other resources. 他们还用计算机进行实验教学的教务管理。 They also experiment with computer teaching ecational administration. 1.3 卡罗莱纳州立大学的LAAP(Learn Anytime Anywhere Physics)他们利用Java技术建立了基于Web的探索式虚拟物理实验室,主要有以下几个模块:基于Java Applet的虚拟实验设备和实验设施;相关的实验课程模块;实验学习结果评价模块;协作学习模块。 1.3 Carolina State University LAAP (Learn Anytime Anywhere Physics) using Java technology to build Web-based virtual physics laboratory to explore, mainly in the following moles: Java Applet based virtual laboratory equipment and laboratory facilities; related An experimental course mole; experimental study and the results of the evaluation mole; collaborative learning mole. 虚拟实验室最大的优点是成本低,效率高。 Virtual Laboratory biggest advantage is low cost, high efficiency. 因为“软件即为仪器”,这样就可解决因实验经费不足或高档次、高价位设备缺乏所不能开出的实物实验,同时也不会造成因使用不当,管理不善等因素造成的仪器损坏、元器件丢失等现象。 Because "software is the instrument," and this could be the lack of funds resulting from the experimental or high-grade, high-priced equipment can not be opened by the lack of physical experiments, but also will not lead to a result of improper use caused by such factors as poor management of equipment damage, missing components and so on. 同时虚拟实验还可以模拟实验室中没有的设备,而且还可以不受时空的限制方便地进行实验。 At the same time, virtual experiments can not simulate the laboratory equipment, but also can be exempted from the restrictions of time and space to easily carry out such experiments. 另外,虚拟实验室还应具备一些基本特征:与现实的一致性(或现实的延伸)、高度交互性、实时的信息反馈。 In addition, the virtual laboratory should also have some basic features: the coherence and reality (or an extension of reality), highly interactive, real-time feedback. 2 网络虚拟实验室体系结构网络虚拟实验室应是一个集虚拟实验教学管理系统、实验课教学指导系统,网络实验仿真等为一体的功能强大的网上运行系统。 2 Network architecture of Virtual Laboratory Virtual Laboratory should be a set of virtual experiment management system for teaching, laboratory teaching guidance systems, network simulation and so on into a powerful operating system online. 各部分之间相互联系相互补充,仅具有相对独立性。 Interlinkages between the various parts of each other, only with relative independence. 开发虚拟环境,实现实验仿真应是虚拟实验室建设的核心部分。 The development of a virtual environment, the realization of experimental simulation is a virtual laboratory should be the core of the building. 图1是虚拟实验室体系结构图。 Figure 1 is a virtual laboratory system structure. 3 构建网络虚拟实验室的关键技术目前国内的虚拟实验室研究还处于萌芽阶段,国外已经有很多大学进行了这方面的研究。 3 build a network of key technology of virtual laboratory virtual current laboratory research is still in its infancy, many universities abroad have carried out studies in this area. 总结他们所使用的技术,可以看出大多可以划分下面几类: 3.1 Java技术Java是一个广泛使用的网络编程语言,它是一种新的计算概念。 Summing up their use of technology, we can see that the majority can be divided into the following categories: 3.1 Java technology is a widely used Java web programming language, it is a new computing concept. 首先,作为一种程序设计语言,它简单、不依赖于机器的结构、具有可移植性、安全性、并且提供了并发的机制、具有很高的性能。 First of all, as a programming language, it is simple, is not dependent on the structure of the machine with portability, security, and provides a mechanism for concurrency, high performance. 其次,它最大限度地利用了网络,Java的小应用程序(applet)可在网络上运行而不受CPU和环境的限制。 Secondly, to maximize the use of its network, Java applets for (applet) can be run on the network without restrictions on CPU and the environment. 另外,Java还提供了丰富的类库,使程序设计者可以很方便地建立自己的系统,这一点对于构建网上虚拟实验室系统来说也是非常关键的。 In addition, Java also provides a rich class library, so that process designers can easily build their own systems, this point for building a virtual laboratory system is also very crucial. 3.2 ActiveX控件ActiveX技术允许不同软件开发的组件在网络上可以互相进行操作。 3.2 ActiveX Controls ActiveX technology allows different software components on the network can operate with each other. Ac?鄄tiveX使用了微软的组件对象技术使得本地的组件可以和网络上的组件进行通信,使用ActiveX开发的另一个好处在于它的代码复用性,也就是说在虚拟实验室的开发过程中,一个实验仪器可以在多个实验环境中重复使用,这一点对于持续开发过程尤为重要。 Ac? Juan tiveX use of Microsoft's Component Object technology enables local and network components can be components of the communication, the development of the use of ActiveX Another advantage is that it is code reuse, that is to say in a virtual laboratory development process, an experimental device which can be the environment in a number of experiments re-use, this is particularly important in the process of sustainable development. 这种技术使得一个大的工程项目可以划分成小块的组件,也就相当于把复杂工程简单为一个个组成部分,完成了每个组成部分之后集成起来就可以得到最终的项目。 This technology enables a large project can be divided into small components, it is equivalent to the complexity of the project as a simple component, was completed after each component can be integrated into the final project. 可以开发ActiveX组件的环境有很多,其中开发效率最高和最易上手的是Visual Ba?鄄sic。 ActiveX components can be developed a lot of environment in which to develop the most efficient and most易上手is Visual Ba? Juan sic. 3.3 VRML技术VRML是虚拟实境描述模型语言(Virtual Reality Modeling Language) 的简称。 3.3 VRML technology is VRML Virtual Reality Modeling Language (Virtual Reality Modeling Language) the short title. 它是描述虚拟环境中场景的一种标准,也是在网上实现虚拟现实的关键性技术。 It is described in a virtual environment of a standard scene, but also the Internet to achieve the key technologies of virtual reality. VRML的基本特征包括分布式、交互式、平台无关、三维、多媒体集成、逼真自然等,被成为“第二代WEB”,已经被越来越多的人们所重视。 The basic feature of VRML, including distributed, interactive, platform-independent, three-dimensional, multi-media integration, life-like nature, was a "second-generation WEB", has been more and more people paying attention to. 国际标准化组织1998年1月正式将其批准为国际标准。 International Organization for Standardization in January 1998 officially approved as international standards. VRML是一种建模语言,其基本目标是建立Internet上的交互式三维多媒体,也就是说,它是用来描述三维物体及其行为的,可以构建虚拟境界。 VRML is a modeling language, its basic goal is to establish a three-dimensional Internet, interactive multimedia, in other words, it is used to describe the three-dimensional objects and their behavior, you can build a virtual realm. 用VRML实现与Internet虚拟现实交互有下面几个好处:丰富了媒体表现形式、协同工作角色的可视化管理、改善了协同环境的用户界面、增强了协同环境的交互性。 With the Internet using VRML interactive virtual reality has the following advantages: rich media manifestations, the role of the visual work of management, to improve the collaborative environment of the user interface, enhanced interactive collaborative environment. 可见,将VRML融合到网上虚拟实验室的开发过程中,既可以增强表现力和用户的接受力,又可以实现较好的协同工作虚拟化环境。 Can be seen that the VRML into the development of online virtual laboratory process, can enhance performance and user acceptance, but also work together to achieve a better virtual environment. 3.4 ASP技术ASP(Active Server Pages,动态服务器端网页),内含在Internet Information Server 3.0及其以上版本中,提供一个服务器端的脚本环境,用于产生和执行动态、高效率的网络服务器应用程序。 3.4 ASP technology ASP (Active Server Pages, Dynamic server-side page), including in the Internet Information Server 3.0 and above versions, to provide a server-side scripting environment for the generation and implementation of dynamic and efficient web server applications. ASP不只是动态的网页,它更是当今众多的Web应用程序实作方式之一,它负责整个Web应用程序的控制部分。 ASP pages not only dynamic, it is today a large number of Web applications is one of the ways to make, which is responsible for the entire Web application control part. ASP提供五个内建的对象供使用者调用,即Re?鄄quest对象(取得用户信息)、Response对象(传送信息给用户)、Server对象(提供访问服务器的方法、属性)、Application对象(用于多个使用者在多个网页间共享信息)和Session对象(用于单个使用者在多个网页间共享信息)。 ASP provides a total of five built-in objects for users to call, that is, Re? Juan quest object (to obtain user information), Response object (to send information to the user), Server object (the server to provide access methods, properties), Application object (with in a variety of users to share information between multiple pages) and the Session object (for indivial users to share information between multiple pages). 4 网络虚拟实验室开发过程当中应注意的几个问题计算机软件技术发展到今天,为虚拟实验室开发提供了极大的方便。 4 virtual laboratory network development process should pay attention to several issues of the development of computer software technology to today, for the development of virtual laboratory provides great convenience. 目前开发所需的系统软件或工具均支持面向对象的程序设计。 At present, the development of the necessary system software or tools to support object-oriented programming. 它们都有事件驱动的支持,消息循环的程序设计方法及多媒体操作技术。 They have the support of event-driven news cycle of programming and multimedia skills. 在开发过程当中要注意以下几个问题:事件触发时机的选择,实际操作当中某个按钮按下后并不立即反映,需要延时回应,外部接口的输入信号或其它信息往往是定时触发或随机触发的事件,若为随机触发的事件则可用一定时限内的随机数来取代固定时间。 In the development process should pay attention to the following questions: Event trigger timing, the actual operation of them after a button press does not immediately reflect the need to delay response to the external interface of the input signal or other information from time to time is often triggered or random trigger events, if the random trigger events are available for a certain period of time the random number to replace the fixed time. 事件联锁关系或动态顺序关系可以存放在一张数据库表中描述,修改方便。 Interlocking relationship between events or dynamic order can be stored in a database table is described, modify convenience. 给定相应的条件、控制范围,自动形成数据表,使数据和程序独立。 Given the appropriate conditions, control, data tables automatically, so that an independent data and programs. 模拟声音,要使实验达到逼真,除了模拟控制台实物景象,还要模拟它们实验环境中的各种声音,如汽笛声、按钮按动声、内部机械动作声等。 Analog voice, to achieve the realistic experiment, in addition to the physical simulation of the console scene, but also simulation of their experimental sounds in the environment, such as the whistle sound, the sound button pressed, the internal mechanical action, such as sound. 这样,才能使学生在实验室有身临其境的感觉,全身心地投入学习。 In this way can help students in the laboratory are immersive feeling, to fully participate in the study. 模拟台面各种动作的结果,台面上每个控件的动作都会触发一定的事件。 Simulation results of the table a variety of movements, control the movements of each table will trigger a certain event. 这些事件在实物设备中是靠机械、电子电路等去完成,而现在将这些机械及电子逻辑关系使用计算机软件实现。 These events in the physical devices by mechanical, electronic circuits, such as to complete, and now to the relationship between mechanical and electronic logic using computer software. 故障发生器,在实际工作中除了设备正常情况下的操作,还有各种意外情况,如某些设备故障的情况。 Fault generator, in practical work in addition to equipment operation under normal circumstances, there are a variety of unforeseen circumstances, such as the failure of some equipment. 此时,要求在虚拟系统中也能模拟手柄失灵、仪表信号不显示及自然灾害发生的情况等,即给实验增加一些难度,强化学生实际操作能力。 At this point, the request in a virtual simulation system can also handle failures, instrument signals and do not show the case of natural disasters and so on, that is, to increase the difficulty of the experiment, the actual operation to strengthen the capacity of students. 5 结束语虚拟实验技术在实验教学中具有广阔的应用、发展前景,随着虚拟实验的普及,其优越性会被越来越多的人认识。 5 Conclusion virtual experiment in teaching experiments have broad applications, development prospects, with the popularity of virtual experiments, and its advantages will be more and more people are aware of. 但要使虚拟实验技术真正得到推广应用,关键还是观念的改变,首先是教师观念的改变,除了具有创新精神和能力外,还应有一个科学的投资理念,在实验室建设和发展中,充分考虑投资效益,建设现代化的实验室。 But for the virtual experiment really promote the use of technology, the key is to change the concept, first of all, the concept of change in teachers, in addition to the spirit of innovation and capacity, there should be a scientific concept of investment, construction and development in the laboratory, the full consider the investment returns and building a modern laboratory. 其次要培养一支高素质的实验队伍,不断地进行知识更新,加强学习,重视信息的收集、加工、应用,了解掌握最新技术,促进实验教学发展。 Second, we must cultivate a high-quality experimental team, continually update their knowledge to enhance learning, importance of information collection, processing, application, understand the latest technology, and promote the development of experimental teaching. 虚拟实验的应用和发展,加快了实验室发展和实验教学改革,促进了教育观念的改变。 Application of the virtual experiment and development, to accelerate the development and experimental laboratory teaching reform, the promotion of ecation to change attitudes. 是培养创新人才的新的实验手段。 Is to train innovative talents of the new experimental tools. 虚拟实验在21世纪实验教学中必将占有重要地位,无疑会起到很大的作用。 Virtual experiment experimental teaching in the 21st century will certainly occupy an important position, will undoubtedly play a significant role.
③ 求计算机中英文文献!十万火急!
楼主要加分啊!
Computer network virus and precautions
With the new network technology and application of the continuous rapid development of the computer network should
Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human
More inseparable from the lives of the community's reliance on them will keep growing. With
With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of
Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low
Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus
The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed
Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be
Will become increasingly important.
A computer virus
The definition of computer virus computer virus (Computer Virus) in the "people's republic of China
The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or
Computer program inserted in the damage or destruction of computer data functions, affecting computer use
Self-replication and can a group of computer instructions, or code. "
Second, network virus
With the development of network and the Internet, a wider spread, the greater New harm
The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional
The virus was not classified network virus this concept, because the development of networks, the traditional virus
The network also has a number of characteristics. Today's Internet virus is a broad notion of a
As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as:
"Love the back door", "Panda burning incense."
Third, network virus and the distinction between computer virus
The original common computer virus is nothing more than the devastating formatted hard drive, delete system
With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection
Mutual of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems
The pilot virus and infected executable file virus, in addition to a network virus
These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side
Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer
Source collapse of the network server worm.
Fourth, the network against virus
Network destructive virus, will directly affect the work of the network, ranging from lowering speed video
Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed
Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan,
But this figure is constantly rising year by year. The next few years, the size of the market will reach Security
60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong
Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ
Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows
Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine
For infection, it can spread through the entire network instant, or even within a very short period of time can be infected
Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers
There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda
Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company
All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high
Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease
The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network
More on the computer network the greater the harm caused by the virus.
V. network transmission of the virus Features
1. Infection fast: single machine environment, the virus can only be passed from one computer diskette
To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement
Set against a typical PC network use in normal circumstances, once a computer workstation sick
Drugs, and will be online within 10 minutes in the several hundreds of all infected computers.
2. Proliferation of a wide range: in the network e to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬
Inter spread to thousands of miles away.
3. Dissemination in the form of complex and varied: computer viruses in general through the network "
Station server workstation "channels of communication, but in the form of complex and diverse communication.
4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents
Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work
Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal
The work of a workstation is likely to be on-line by another workstation virus infection. Therefore,
Only workstations in addition to killing viruses, and can not solve the virus harm to the network is.
6, the type of network virus
As the network increasingly developed, the type of network virus has been increasing, generally summed up as
The following categories:
1. Worm
It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network
And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex
A worm virus. The virus used Microsoft's Windows operating system, computer flu
With this virus, will continue to automatically dial-up Internet access and use information in the document or the address
Sharing network spreads, and ultimately undermine the most important user data.
2. Macro Virus
Hong virus is a Storage in the document or template in the Acer computer virus. The prefix
Macro, once open such documents, which Acer will be implemented, then the virus would Acer
Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since
The document will be kept moving "infection" that the Hong virus, and if other users opened the flu
Documents with the virus, the Hong virus will be transferred to his computer.
3. Destructive proceres virus
The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself
Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users
Computer generated destruction. If C formatted disk (Harm.formatC.f), the killer orders (Harm.
Command.Killer).
4. System virus
The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses
The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file,
And through these documents for dissemination. If the CIH virus.
5. Backdoor virus
Backdoor virus prefix is Backdoor. The total of such virus through network -
Sowing, opened the back door to the system to the user and potential safety problems.
6. Bundling machine virus
Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use
Specific proceres will be bundled with a number of applications such as QQ, IE bundled up on the surface
It is normal to see the paper, when users run these bundled virus, will run these applications on the surface
Proceres, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled
Tied QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys).
7. Script virus
The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually
Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information,
Computer user inconvenience caused.
8. Planting proceres virus virus
This virus is of the public will run from the in vivo release of one or several new
Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing
(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag).
9. Joke virus
The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation,
When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact
The virus did not destroy any computer user. Such as: ghost (Joke.Girlghost) virus.
10. Trojan hacking virus
Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special
Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world
User information, hackers virus there is a visual interface to the user's computer remotely
Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users
Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ
News tail Trojan Trojan.QQ3344, there are big Trojan.LMir.PSW.60. Virus Form
A PSW or anything like PWD general said that the virus has stolen password function,
If some hacker programs, such as network枭雄Hack.Nether.Client.
7, the mode of transmission and network anti-virus
Through the above, we can see that e-mail viruses spread Click homepage, users download,
Others implant, implant, and other loopholes through five computer transmission, so long as holding these five
A thoroughfare, we will be able to live better anti-virus network.
计算机网络病毒与防范
随着各种新的网络技术的不断应用和迅速发展, 计算机网络的应
用范围变得越来越广泛, 所起的作用越来越重要, 计算机网络与人类
的生活更加密不可分, 社会对其的依赖程度也会随之不断增长。而随
着计算机技术的不断发展, 病毒也变得越来越复杂和高级, 新一代的
计算机病毒充分利用某些常用操作系统与应用软件的低防护性的弱
点不断肆虐, 最近几年随着因特网在全球的普及, 将含病毒文件附加
在邮件中的情况不断增多, 通过网络传播病毒, 使得病毒的扩散速度
也急骤提高, 受感染的范围越来越广。因此, 计算机网络的安全保护将
会变得越来越重要。
一、计算机病毒
计算机病毒的定义计算机病毒(Computer Virus)在《中华人民共和
国计算机信息系统安全保护条例》中被明确定义, 病毒“指编制或者在
计算机程序中插入的破坏计算机功能或者破坏数据, 影响计算机使用
并且能够自我复制的一组计算机指令或者程序代码”。
二、网络病毒
随着网络和Internet 的发展,一个传播范围更广,危害更大的新型
病毒应运而生.这就是网络病毒。网络病毒是一个新兴的概念, 在传统
的病毒分类里没有网络病毒这个概念, 由于网络的发展, 传统的病毒
也就具有了一些网络的特性。如今的网络病毒是一个广义的概念, 一
般只要是利用网络来进行传播、破坏的都可以被称为网络病毒, 如:
“爱情后门”、“熊猫烧香”等。
三、网络病毒与计算机病毒的区别
原先常见的计算机病毒的破坏性无非就是格式化硬盘, 删除系统
与用户文件、破坏数据库等等。而传播途径也无非是通过遭病毒感染
的软件的互相拷贝, 携带病毒的盗版光盘的使用等, 如感染磁盘系统
区的引导型病毒和感染可执行文件的文件型病毒, 而网络病毒除了具
有普通病毒的这些特性外, 还具有远端窃取用户数据、远端控制对方
计算机等破坏特性, 比如特洛伊木马病毒和消耗网络计算机的运行资
源, 拖垮网络服务器的蠕虫病毒。
四、网络病毒的危害
网络上病毒破坏性大, 将直接影响网络的工作, 轻则降低速度, 影
响工作效率, 重则使网络崩溃, 破坏服务器信息, 使多年工作毁于一
旦。每年由于病毒等网络欺诈行为导致的经济损失高达160 亿多元,
而且这个数字逐年还在不断地攀升。未来几年, 安防市场规模将达到
600 亿元。一位杀毒软件专家指出: “网络病毒更甚于禽流感”。如: “熊
猫烧香”除了通过网站带毒感染用户之外, 此病毒还会通过QQ 最新
漏洞传播自身, 通过网络文件共享、默认共享、系统弱口令、U 盘及窗
体顶端窗体底端移动硬盘等多种途径传播。而局域网中只要有一台机
器感染, 就可以瞬间传遍整个网络, 甚至在极短时间之内就可以感染
几千台计算机, 严重时可以导致网络瘫痪。中毒症状表现为电脑中所
有可执行的.exe 文件都变成了一种怪异的图案, 该图案显示为“熊猫
烧香”, 继而系统蓝屏、频繁重启、硬盘数据被破坏等, 严重的整个公司
局域网内所有电脑会全部中毒。“熊猫烧香”仅半个多月, 变种数已高
达50 多个, 并且其感染用户的数量不断扩大。使得感染“熊猫烧香”病
毒的个人用户已经高达几百万, 企业用户感染数更是成倍上升。网络
上的计算机越多, 网络病毒造成的危害越大。
五、网络病毒传播特点
1.感染速度快: 在单机环境下, 病毒只能通过软盘从一台计算机
带到另一台, 而在网络中则可以通过网络通讯机制迅速扩散。根据测
定, 针对一台典型的PC 网络在正常使用情况, 只要有一台工作站有病
毒, 就可在几十分钟内将网上的数百台计算机全部感染。
2.扩散面广: 由于病毒在网络中扩散非常快, 扩散范围很大, 不但能迅速传染局域网内所有计算机, 还能通过远程工作站将病毒在一瞬
间传播到千里之外。
3.传播的形式复杂多样: 计算机病毒在网络上一般是通过“工作
站服务器工作站”的途径进行传播的, 但传播的形式复杂多样。
4.难于彻底清除: 单机上的计算机病毒有时可通过删除带毒文件
或低级格式化硬盘等措施将病毒彻底清除, 而网络中只要有一台工作
站未能消毒干净就可使整个网络重新被病毒感染, 甚至刚刚完成清除
工作的一台工作站就有可能被网上另一台带毒工作站所感染。因此,
仅对工作站进行病毒杀除, 并不能解决病毒对网络的危害。
六、网络病毒的类型
由于网络越来越发达, 网络病毒的种类也越来越多, 大体归纳为
以下几类:
1.蠕虫病毒
它的传染机理是利用网络进行复制和传播, 传染途径是通过网络
和电子邮件,前缀是Worm。比如近年危害很大的“尼姆达”病毒就是蠕
虫病毒的一种。这一病毒利用了微软视窗操作系统的漏洞, 计算机感
染这一病毒后, 会不断自动拨号上网, 并利用文件中的地址信息或者
网络共享进行传播, 最终破坏用户的大部分重要数据。
2.宏病毒
宏病毒是一种寄存在文档或模板的宏中的计算机病毒。前缀是
Macro, 一旦打开这样的文档, 其中的宏就会被执行, 于是宏病毒就会
被激活, 转移到计算机上, 并驻留在Normal 模板上。从此以后, 所有自
动保存的文档都会“感染”上这种宏病毒, 而且如果其他用户打开了感
染病毒的文档, 宏病毒又会转移到他的计算机上。
3.破坏性程序病毒
破坏性程序病毒的前缀是: Harm。这类病毒的特性是本身具有好
看的图标来诱惑用户点击, 当用户点击病毒时, 病毒便会直接对用户
计算机产生破坏。如格式化C 盘(Harm.formatC.f) 、杀手命令(Harm.
Command.Killer) 等。
4.系统病毒
系统病毒的前缀为:Win32、PE、Win95、W32、W95 等。这些病毒的
一般公有的特性是可以感染windows 操作系统的*.exe 和*.dll 文件,
并通过这些文件进行传播。如CIH 病毒。
5.后门病毒
后门病毒的前缀是Backdoor。该类病毒的共有特性是通过网络传
播, 给系统开后门, 给用户带来安全隐患。
6.捆绑机病毒
捆绑机病毒的前缀是: Binder。这类病毒的特性是病毒作者会使用
特定的捆绑程序将病毒与一些应用程序如QQ、IE 捆绑起来, 表面上
看是正常文件, 当用户运行这些捆绑病毒时, 会表面上运行这些应用
程序, 然后隐藏运行捆绑在一起的病毒, 从而给用户造成危害。如: 捆
绑QQ(Binder.QQPass.QQBin) 、系统杀手(Binder.killsys) 等。
7.脚本病毒
脚本病毒通常是JavaScript 代码编写的恶意代码, 前缀是通常为
Spript, 一般带有广告性质, 会修改您的IE 首页、修改注册表等信息,
造成用户使用计算机不方便。
8.病毒种植程序病毒
这类病毒的公有特性是运行时会从体内释放出一个或几个新的
病毒到系统目录下, 由释放出来的新病毒产生破坏。如冰河播种者
(Dropper.BingHe2.2C) 、MSN 射手(Dropper.Worm.Smibag)等。
9.玩笑病毒
玩笑病毒的前缀是: Joke。也称恶作剧病毒。这类病毒的特性是本身具有好看的图标来诱惑用户点击,
当用户点击这类病毒时, 病毒会做出各种破坏操作来吓唬用户, 其实
病毒并没有对用户电脑进行任何破坏。如: 女鬼( Joke.Girlghost) 病毒。
10.木马黑客病毒
木马病毒其前缀是: Trojan, 黑客病毒前缀名一般为Hack。公有特
性是通过网络或者系统漏洞进入用户的系统并隐藏, 然后向外界泄露
用户信息, 黑客病毒则有一个可视的界面, 能对用户的电脑进行远程
控制。木马、黑客病毒往往是成对出现的, 木马病毒负责侵入用户的电
脑, 而黑客病毒则会通过该木马病毒来进行控制。。一般的木马如QQ
消息尾巴木马Trojan.QQ3344, 还有大Trojan.LMir.PSW.60。病毒名中
有PSW或者什么PWD 之类的一般表示这个病毒有盗取密码的功能,
一些黑客程序如网络枭雄Hack.Nether.Client 等。
④ 璁$畻链烘瘯涓氲捐″栨枃鍙傝冩枃鐚
璁$畻链烘瘯涓氲捐″栨枃鍙傝冿细
[1].Abdellatif,T.andF.Boyer..2009.Hammemet,Tunisia.
[2].Bharti,A.K.andS.K.Dwivedi,E-:U.P.S.R.T.C.钬斺擜CaseStudy.2011:Ka銆
涓鑸镙煎纺濡备笅锛
浣滆.镢椾綔钖岖О[M].鍑虹増绀炬墍鍦ㄥ煄甯:鍑虹増绀惧悕绉,鍑虹増骞翠唤:椤电爜.
绀轰緥锛氶噾澶鍐.𨱒戞不娌荤悊涓庢潈锷涚粨鏋刐M].骞垮窞:骞垮窞浜烘皯鍑虹増绀,2008:50.
镓╁𪾢璧勬枡
链涓昏佺殑鏄镙规嵁杞戒綋鎶婃枃鐚鍒嗕负鍗板埛鍨嬨佺缉寰鍨嬨佹満璇诲瀷鍜屽0镀忓瀷銆
锛1锛夊嵃鍒峰瀷锛氭槸鏂囩尞镄勬渶锘烘湰鏂瑰纺锛屽寘𨰾阈呭嵃銆佹补鍗般佽兑鍗般佺煶鍗扮瓑钖勭嶈祫鏂欍备紭镣规煡鍙鐩存帴銆佹柟渚垮湴阒呰汇
锛2锛夌缉寰鍨嬶细鏄浠ユ劅鍏夋潗鏂欎负杞戒綋镄勬枃鐚锛屽张鍙鍒嗕负缂╁井鑳跺嵎鍜岀缉寰骞崇墖锛屼紭镣规槸浣撶Н灏忋佷究浜庝缭瀛樸佽浆绉诲拰浼犻掋备絾阒呰绘椂椤荤敤阒呰诲櫒銆
⑤ 璇烽梾鍒板摢閲屽彲浠ュ厤璐逛笅杞借$畻链烘柟闱㈢殑鑻辨枃鏂囩尞锻
璁$畻链虹绣缁沧柟闱㈢殑鑻辨枃涔︾睄涓鑸鏄痯df鏂囦欢镙煎纺銆
涓鑸𨱒ヨ达纴涓嬭浇鎴愬姛鐜囨瘆杈冮珮镄勶纴鏄阃氲繃p2p杞浠讹纴鎴戠粡甯哥敤镄勬槸emule锛屽氨鏄www.verycd.com涓娄笅杞界殑銆
浣跨敤杩欎簺涓嬭浇杞浠剁殑镞跺欙纴阃氩父鏄鍒╃敤杞浠剁殑钬沧悳绱⑩濆姛鑳姐傛瘆濡傦纴浣犳墍闇瑕佺殑璁$畻链虹绣缁沧柟闱㈢殑涔︾睄锛屼竴鑸鏄锛歝omputer
network,
network,
computer
net绛夛纴鎴栬呬綘鍒板綋褰撶绣銆乧hina-pub绛夌绣涓娄功搴椾笂锛岀湅濂戒简钖嶅瓧锛屽湪p2p杞浠朵腑鎼灭储涔熻屻
阃氲繃鎼灭储寮曟搸杩涜屾绱涔熸槸鍙︿竴绉嶆柟寮忥纴浣嗗湪鎼灭储镄勬椂鍊欐渶濂藉姞涓娾.pdf钬濈殑钖庣紑钖嶃
璋㈣阿^_^
⑥ 链夊叧璁$畻链虹殑璁烘枃鍙傝冩枃鐚
銆銆闅忕潃璁烘枃鍙戣〃鏁伴噺锻堢垎镣稿纺镄勫为暱锛屾庢牱镓嶈兘阆垮厤璁烘枃淇℃伅杩囱浇锛屽悓镞朵负镰旂┒浜哄憳鎻愪緵涓涓鍜屽叾镰旂┒鏂瑰悜鐩稿叧涓旀湁鏁埚嗳纭镄勫弬钥冩枃鐚锛屾垚涓轰竴涓寰堥吨瑕佺殑闂棰樸备笅闱㈡槸鎴戜负澶у舵帹钻愮殑链夊叧璁$畻链虹殑璁烘枃鍙傝冩枃鐚锛屼緵澶у跺弬钥冦
銆銆链夊叧璁$畻链虹殑璁烘枃鍙傝冩枃鐚涓锛
銆銆[1 ] 榛勬浜,𨱒庝竴鍐.绠$悊淇℃伅绯荤粺[M].淇璁㈢増.楂樼瓑 鏁栾偛 鍑虹増绀,1999
銆銆[2 ] 寮犳捣钘.杞浠跺伐绋嫔艰篬M].绗锲涚増.娓呭崕澶у﹀嚭鐗堢ぞ,2006
銆銆[3 ] 钀ㄥ笀镦,鐜嬬强.鏁版嵁搴撶郴缁熸傝篬M].绗涓夌増.楂樼瓑鏁栾偛鍑虹増绀,2003
銆銆[4 ] 闄嗗姏鏂. 浼佷笟绠$悊 瀛[M].鍝埚皵婊ㄥ伐涓氩ぇ瀛鍑虹増绀,2005
銆銆[5 ] 鐜嫔厠瀹.Java鎶链鍙婂叾搴旂敤[M].楂樼瓑鏁栾偛鍑虹増绀,2007
銆銆[6 ] 閮濈帀榫.JavaEE缂栫▼鎶链痆M].娓呭崕澶у﹀嚭鐗堢ぞ,2008
銆銆[7 ] Marty Hall.Serlet涓嶫SP镙稿绩缂栫▼[M].绗浜岀増.链烘板伐涓氩嚭鐗堢ぞ,2008
銆銆[8 ] 𨱒庡垰.Struts2𨱒冨▉鎸囧崡[M].鐢靛瓙宸ヤ笟鍑虹増绀,2008
銆銆[9 ] 瀛椤崼鐞.绮鹃欻ibernate[M].鐢靛瓙宸ヤ笟鍑虹増绀,2005
銆銆[10] 缃楁椂椋.绮鹃歋pring[M].鐢靛瓙宸ヤ笟鍑虹増绀,2005
銆銆链夊叧璁$畻链虹殑璁烘枃鍙傝冩枃鐚浜岋细
銆銆[1]. Abdellatif, T. and F. Boyer. A node allocation system for deploying JavaEE systems on Grids. 2009. Hammemet, Tunisia.
銆銆[2]. Bharti, A.K. and S.K. Dwivedi, E-Governance in Public Transportation: U.P.S.R.T.C.——A Case Study. 2011: Kathman, Nepal. p. 7-12.
銆銆[3]. ChangChun, S.Z.C.S., et al., A Novel Two-stage Algorithm of Fuzzy C-Means Clustering. 2010: 涓锲藉悏鏋楅暱鏄. p. 85-88.
銆銆[4]. Changchun, Z.Z.H.Q., Simulation of 3-C Seismic Records In 2-D TIM. 1991: 涓锲藉寳浜. p. 489-493.
銆銆[5]. CHINA, G.C.O.M., The trust model based on consumer recommendation in B-C e-commerce. 2011: 涓锲婀栧寳姝︽眽. p. 214-217.
銆銆[6]. ENGINEERING, W.C.H.X., H.T.S.H. PROPAGATION and XINXIANG, A C BAND SYSTEM FOR IONOSPHERIC SCINTILLATION OBSERVATION. 1991: 涓锲藉寳浜. p. 470-476.
銆銆[7]. Henriksson, K., K. Nordlund and J. Wallenius, Simulating model steels:An analytical bond-order potential for Fe-C. 2008: 涓锲藉寳浜. p. 138.
銆銆[8]. Jiansen, Y., et al., Suspension K&C Characteristics and the Effect on Vehicle Steering. 2010: 涓锲藉悏鏋楅暱鏄. p. 408-411.
銆銆[9]. Jilin, W.G.D.O., C.W.S.D. Changchun and China, Realization and Optimization of Video Encoder Based on TMS320C6455 DSPs. 2010: 涓锲藉悏鏋楅暱鏄. p. 312-317.
銆銆[10]. Juan, C., et al., Semi-physical simulation of an optoelectronic tracking servo system based on C MEX S functions. 2010: 涓锲藉悏鏋楅暱鏄. p. 46-49.
銆銆链夊叧璁$畻链虹殑璁烘枃鍙傝冩枃鐚涓夛细
銆銆[1] 闄埚ぉ娌.Struts Hibernate Spring闆嗘垚寮鍙慬M].鐢靛瓙宸ヤ笟鍑虹増绀,2007
銆銆[2] 𨱒庡垰.鐤镫侫jax[M].鐢靛瓙宸ヤ笟鍑虹増绀,2009
銆銆[3] 鏂藉瘨娼.鍖昏嵂绠$悊浣撶郴镄勭爷绌祢J].绂忓缓鐢佃剳.2006(4)锛144-145
銆銆[4] 𨱒庡钩.鏅鸿兘绠$悊绯荤粺镄勮捐′笌瀹炵幇[J].璁$畻链虹郴缁熷簲鐢.1999(3)锛44-45 链.2003(4)锛31-33
銆銆[6] 榄忕埍鏋濄佸紶鏂囧缓銆佽档镵樸寮犵幉銆佷箰 娑涖佽档浜戠剷.钻鍝佸垎绫荤爷绌祢J].鍝埚皵婊ㄥ尰绉戝ぇ绛夊︽牎瀛︽姤.2005(3)锛89-91
銆銆[7] 杩炵嚂楣.JSP鎶链瀹炵幇鍖昏嵂绠$悊绯荤粺[J].绂忓缓鐢佃剳.2004(9)锛63-64
銆銆[8] 𨱒ㄨ缘.Spring娲诲︽椿鐢╗J].闀挎槬甯堣寖瀛﹂櫌瀛︽姤(镊铹剁戝︾増).2005(10)锛93-96
銆銆[9] 锻ㄥ简鏁忋佹锋櫒娉.SHH寮鍙戝簲娉ㄦ剰浠涔圼J].鐞嗗伐楂樻暀镰旂┒.2006(4)锛119-121
銆銆[10] 闄堜纻.濡备綍瀹炵幇瑙勮寖镄勪腑鍖昏嵂鍒嗙被绠$悊[J].榛戦緳姹熶腑鍖昏嵂鏁栾偛瀛﹂櫌瀛︽姤.2006(7)锛6-7