有關電腦病毒英文文獻

General 更新 2024年11月25日

  下面這篇是下面是小編給大家帶來的一份關於計算機病毒的英文文獻和中文翻譯,希望對你有幫助。

  COMPUTER VIRUSES

  What are computer viruses?

  According to Fred Cohen‟s well-known definition, a computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a ***possibly evolved*** copy of itself. Note that a program does not have to perform outright damage ***such as deleting or corrupting files*** in order to be called a “virus”. However, Cohen uses the terms within his definition ***e.g. “program” and “modify”*** a bit differently from the way most anti-virus researchers use them, and classifies as viruses some things which most of us would not consider viruses.

  Computer viruses are bits of code that damage or erase information, files, or software programs in your computer, much like viruses that infect humans, computer viruses can spread, and your computer can catch a virus when you download an infected file from the Internet or copy an infected file from a diskette. Once the viruses is embedded into your computer‟s files, it can immediately start to damage or destroy information, or it can wait for a particular date or event to trigger its activity. What are the main types of viruses?

  Generally, there are two main classes of viruses. The first class consists of the file Infectors which attach themselves to ordinary program files. These usually infect arbitrary .COM and/or .EXE programs, though some can infect any program for which execution is requested, such as .SYS,.OVL,.PRG,&.MNU files.

  File infectors can be either direct action or resident. A direct-action virus selects one or more other programs to infect each other time the program which contains it is executed ,and thereafter infects other programs when “they” are executed ***as in the case of the Jerusalem*** or when certain other conditions are fulfilled. The Vienna is an example of a direct-action virus. Most other viruses are resident.

  The second class is system or boot-record infectors: those viruses, which infect executable code, found in certain system areas on a disk that are not ordinary files. On DOS systems, there are ordinary boot-sector viruses, which infect only the DOS boot sector on diskettes. Examples include Brain, Stoned, Empire, Azusa, and Michelangelo. Such viruses are always resident viruses.

  Finally, a few viruses are able to infect both ***the Tequila virus is one example***. There are often called “multipartite” viruses, though there has been criticism of this name; another name is “boot-and -file” virus.

  File system or cluster viruses ***e.g. Dir-II*** are those that modify directory table entries so that the virus is loaded and executed before the desired program is. Note that the program itself is not physically altered; only the directory entry is. Some consider these infectors to be a third category of viruses, while others consider them to be a sub-category of the file infectors. What are macro viruses?

  Many applications provide the functionality to create macros. A macro is a series of commands to perform some application-specific task. Macros are designed to makelife easier, for example, to perform some everyday tasks like text-formatting or spreadsheet calculations.

  Macros can be saved as a series of keystrokes ***the application record what keys you press***; or they can be written in special macro languages ***usually based on real programming languages like C and BASIC***. Modern applications combine both approaches; and their advanced macro languages are as complex as general purpose programming languages. When the macro language allows files to be modified, it becomes possible to create macros that copy themselves from one file to another. Such self-replicating macros are called macro viruses.

  Most macro viruses run under Word for Windows. Since this is a very popular word processor, it provides an effective means for viruses to spread. Most macro viruses are written using the macro language WordBasic. WordBasic is based on the good old BASIC programming language. However, it has many ***hundreds of*** extensions ***for example, to deal with documents: edit, replace string, obtain the name of the current document, open new window, move cursor, etc.***. What is a Trojan horse program?

  A type of program that is often confused with viruses is a „Trojan horse‟ program. This is not a virus, but simply a program ***often harmful*** that pretends to be something else.

  For example, you might download what you think is a new game; but when you run it, it deletes files on your hard drive. Or the third time you start the game, the program E-mail your saved passwords to another person.

  Note: simply download a file to your computer won‟t activate a virus or Trojan horse; you have to execute the code in the file to trigger it. This could mean running a program file, or opening a Word/Excel document in a program ***such as Word or Excel*** that can execute any macros in the document. What kind of files can spread viruses?

  Viruses have the potential to infect any type of executable code, not just the files that are commonly called “program files”. For example, some viruses infect executable code in the boot sector of floppy disk or in system areas of hard drives. Another type of virus, known as a “macro” virus, can infect word processing and spreadsheet documents that use macros. And it‟s possible for HTML documents containing JavaScript or other types of executable code to spread viruses or other malicious code. Since viruses code must be executed to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, .etc., as well as plain text in .txt files. For example, just viewing picture files won‟t infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file which the computer will actually try to execute. How do viruses spread?

  The methodology of virus infection was pretty straightforward when first computer viruses such as Lehigh and Jerusalem started appearing. A virus is a small piece of computer code, usually form several bytes to a few tens of bytes, that can do, well, something unexpected. Such viruses attach themselves to executable files— programs,

  so that the infected program, before proceeding with whatever tasks it is supposed to do, calls the virus code. One of the simplest ways to accomplish that is to append the virus code to the end of the file, and insert a command to the beginning of the program file that would jump right to the beginning of the virus code. After the virus is finished, it jumps back to the point of origination in the program. Such viruses were very popular in the late eighties. The earlier ones only knew how to attach themselves to .Com files, since structure of a .COM file is much simpler than that of an .EXE file—yet another executable file format invented for MS-DOS operating system. The first virus to be closely studied was the Lehigh virus. It attached itself to the file that was loaded by the system at boot time—COMMAND.COM. the virus did a lot of damage to its host, so after three-four replications it was no longer usable. For that reason, the virus never managed to escape the university network.

  When you execute program code that‟s infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network. And the newly infected programs will try to infect yet more programs.

  When you share a copy of an infected file with other computer users, running the file may also infect their computer; and files from those computers may spread the infection to yet more computers.

  If your computer if infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk will try to infect still more floppies.

  Some viruses, known as „multipartite‟ viruses, and spread both by infecting files and by infecting the boot areas of floppy disks. What do viruses do to computers?

  Viruses are software programs, and they can do the same things as any other program running on a computer. The accrual effect of any particular virus depends on how it was programmed by the person who wrote the virus.

  Some viruses are deliberately designed to damage files or otherwise interfere with your computer‟s operation, while other don‟t do anything but try to spread themselves around. But even the ones that just spread themselves are harmful, since they damage files and may cause other problems in the process of spreading.

  Note that viruses can‟t do any damage to hardware: they won‟t melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.

  Modern viruses can exist on any system form MS DOS and Window 3.1 to MacOS, UNIX, OS/2, Windows NT. Some are harmless, though hard to catch. They can play a jingle on Christmas or reboot your computer occasionally. Other are more dangerous. They can delete or corrupt your files, format hard drives, or do something of that sort. There are some deadly ones that can spread over networks with or without a host, transmit sensitive information over the network to a third party, or even mess with financial data on-line.

  What‟s the story on viruses and E-mail? You can‟t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code ***i.e., JavaScript in HTML message*** or message that include an executable file attachment ***i.e., an encoded program file or a Word document containing macros***. In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. There‟s no special hazard in files attached to Usenet posts or E-mail messages: they‟re no more dangerous than any other file. What can I do to reduce the chance of getting viruses from E-mail?Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file. If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature. My personal feeling is that if an executable file shows up unexpectedly attached to an E-mail, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you. The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it. Some General Tips on Avoiding Virus Infections Install anti-virus software from a well-known, reputable company. UPDATE it regularly, and USE it regularly. New viruses come out every single day; an a-v program that hasn‟t been updated for several months will not provide much protection against current viruses. In addition to scanning for viruses on a regular basis, install an „on access‟ scanner ***included in most good a-v software packages*** and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file. Virus scans any new programs or other files that may contain executable code before you run or open them, no matter where they come from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections. Anti-virus programs aren‟t very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or „dubious‟ sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren‟t well-known or don‟t have a good reputation, and executable files unexpectedly received as attachments to E-mail. Be extremely careful about accepting programs or other flies during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse problems. And if any other family members ***especially younger

  What‟s the story on viruses and E-mail? You can‟t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code ***i.e., JavaScript in HTML message*** or message that include an executable file attachment ***i.e., an encoded program file or a Word document containing macros***. In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. There‟s no special hazard in files attached to Usenet posts or E-mail messages: they‟re no more dangerous than any other file. What can I do to reduce the chance of getting viruses from E-mail?Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file. If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature. My personal feeling is that if an executable file shows up unexpectedly attached to an E-mail, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you. The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it. Some General Tips on Avoiding Virus Infections Install anti-virus software from a well-known, reputable company. UPDATE it regularly, and USE it regularly. New viruses come out every single day; an a-v program that hasn‟t been updated for several months will not provide much protection against current viruses. In addition to scanning for viruses on a regular basis, install an „on access‟ scanner ***included in most good a-v software packages*** and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file. Virus scans any new programs or other files that may contain executable code before you run or open them, no matter where they come from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections. Anti-virus programs aren‟t very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or „dubious‟ sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren‟t well-known or don‟t have a good reputation, and executable files unexpectedly received as attachments to E-mail. Be extremely careful about accepting programs or other flies during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse problems. And if any other family members ***especially younger

  What‟s the story on viruses and E-mail? You can‟t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code ***i.e., JavaScript in HTML message*** or message that include an executable file attachment ***i.e., an encoded program file or a Word document containing macros***. In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. There‟s no special hazard in files attached to Usenet posts or E-mail messages: they‟re no more dangerous than any other file. What can I do to reduce the chance of getting viruses from E-mail?Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file. If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature. My personal feeling is that if an executable file shows up unexpectedly attached to an E-mail, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you. The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it. Some General Tips on Avoiding Virus Infections Install anti-virus software from a well-known, reputable company. UPDATE it regularly, and USE it regularly. New viruses come out every single day; an a-v program that hasn‟t been updated for several months will not provide much protection against current viruses. In addition to scanning for viruses on a regular basis, install an „on access‟ scanner ***included in most good a-v software packages*** and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file. Virus scans any new programs or other files that may contain executable code before you run or open them, no matter where they come from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections. Anti-virus programs aren‟t very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or „dubious‟ sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren‟t well-known or don‟t have a good reputation, and executable files unexpectedly received as attachments to E-mail. Be extremely careful about accepting programs or other flies during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse problems. And if any other family members ***especially younger What‟s the story on viruses and E-mail?

  You can‟t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code ***i.e., JavaScript in HTML message*** or message that include an executable file attachment ***i.e., an encoded program file or a Word document containing macros***. In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. There‟s no special hazard in files attached to Usenet posts or E-mail messages: they‟re no more dangerous than any other file.

  What can I do to reduce the chance of getting viruses from E-mail?

  Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file.

  If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature.

  My personal feeling is that if an executable file shows up unexpectedly attached to an E-mail, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you.

  The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it. Some General Tips on Avoiding Virus Infections

  Install anti-virus software from a well-known, reputable company. UPDATE it regularly, and USE it regularly.

  New viruses come out every single day; an a-v program that hasn‟t been updated for several months will not provide much protection against current viruses.

  In addition to scanning for viruses on a regular basis, install an „on access‟ scanner ***included in most good a-v software packages*** and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file.

  Virus scans any new programs or other files that may contain executable code before you run or open them, no matter where they come from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections.

  Anti-virus programs aren‟t very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or „dubious‟ sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren‟t well-known or don‟t have a good reputation, and executable files unexpectedly received as attachments to E-mail.

  Be extremely careful about accepting programs or other flies during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse problems. And if any other family members ***especially youngerones*** use the computer, make sure they know not to accept any files while using chat. Do regular backups. Some viruses and Trojan horse programs will erase or corrupt files on your hard drive and a recent backup may be the only way to recover your data.

  Ideally, you should back up your entire system on a regular basis. If this isn‟t practical, at least backup files you can‟t afford to lose or that would be difficult to replace: documents, bookmark files, address books, important E-mail, etc. Dealing with Virus Infections

  First, keep in mind “Nick‟s First Law of Computer Virus Complaints”:

  “Just because your computer is acting strangely or one of your programs doesn‟t work right, this does not mean that your computer has a virus.”

  If you haven‟t used a good, up-to-date anti-virus program on your computer, do that first. Many problems blamed on viruses are actually caused by software configuration errors or other problems that have nothing to do with a virus.

  If you do get infected by a virus, follow the direction in your anti-virus program for cleaning it. If you have backup copies of the infected files, use those to restore the files. Check the files you restore to make sure your backups weren‟t infected. for assistance, check the web site and support service for your anti-virus software. Note: in general, drastic measures such as formatting your hard drive or using FDISK should be avoided. They are frequently useless at cleaning a virus infection, and may do more harm than good unless you‟ re very knowledgeable about the effects of the particular virus you‟re dealing with.

  中文翻譯:

  計算機病毒

  什麼是計算機病毒?按照Fred Cohen的廣為流傳的定義,計算機病毒是一種侵入其他計算機程式中的計算機程式,他通過修改其他的程式從而將***也可能是自身的變形***的複製品嵌入其中。注意一個程式之所以成為“病毒”,並非一定要起徹底的破壞作用***如刪除或毀壞檔案***。然而,Cohen在他的定義***即“程式”和“修改”***中使用的“病毒”這個術語與大多數反病毒研?a href='//' target='_blank'>咳嗽筆褂玫?ldquo;病毒”術語有些差別,他把一些我們多數人認為不是病毒的東西也歸類為病毒。計算機病毒是一些能破壞或刪除計算機中的資訊、檔案或程式的程式碼。正如感染人體的病毒一樣,計算機病毒能夠擴散。當你的計算機從網際網路上下載一個被感染的檔案,或者從磁碟上覆制一個被感染的檔案時,你的計算機就會染上病毒。而一旦病毒進入到你的計算機檔案中,它就能馬上破壞或摧毀其中的資訊,或者等到某個特殊的日期或事件來臨時才觸發其破壞活動。個人計算機病毒主要有哪些型別?一般來說,主要存在著兩類計算機病毒。第一類由檔案感染型病毒組成,他們將自身依附在普通的程式檔案上。這些病毒通常感染任意的.COM和/或EXE檔案,儘管有些也感染具有執行功能的檔案,如.SYS,.OVL,.PRG和.MNU檔案. 檔案感染型病毒又可分為“立即執行型”和“駐留型”。立即執行型病毒在含有它的程式每次執行是都對其他的一個或多個檔案進行感染,而駐留型病毒在被感染的程式第一次執行時先將自己隱藏在記憶體中的某個地方,以後當其他程式執行或當某些其他程式特定條件滿足時就對它們進行感染***就像耶路撒冷病毒一樣***。維也納病毒是立即執行型病毒的一個例子,大多數其他病毒則是駐留型病毒。第二類病毒是系統病毒或引導區記錄感染型病毒,這些感染可執行程式碼的病毒出現在磁碟的某些系統區中,而不是普通檔案中。在DOS系統中,常見的引導扇區病毒和主引導記錄病毒,前者只感染DOS引導扇區,後者感染硬碟的主引導記錄和軟盤的DOS引導扇區。第二類病毒的例子包括大腦病毒、大麻病毒、帝國病毒、Azusa以及米開郎基羅病毒等,此類病毒通常為駐留型病毒。另外,有些病毒能感染上述兩種物件***如蒸餾酒病毒就是一個例子***,這些病毒常稱為“多成分”病毒***儘管這個名字曾遭到過批評***,它們的另一個名字是“引導區和檔案型”病毒。檔案系統型病毒或“簇”病毒***如Dir-II病毒***是那種修改檔案目錄表項並且在檔案裝入、執行前就被裝入和執行的病毒。注意,程式本身實際上並沒有被修改,只是目錄項被修改。有些人把這種感染型病毒看作是第三類病毒,而另一些人把它看作是檔案感染型病毒的子類。什麼是巨集病毒?許多應用程式都提供了建立巨集的功能。巨集是一個完成特定應用任務的命令序列。設計巨集的目的是使諸如文字格式化或電子表格計算這樣的日常工作更為簡單。巨集可以儲存成一系列擊鍵***即應用程式記錄你按了哪些鍵***,或者它們能夠用某些特殊的巨集語言像通用程式設計語言一樣複雜。當巨集語言允許檔案被修改時,就有可能建立能將自身從一個檔案複製到另一個檔案上的巨集。這種具有自複製功能的巨集稱作巨集病毒。

  大多數的巨集病毒都是在Windows的Word軟體中執行的,因為Word是一種流行的字處理器,它為病毒的擴散提供了有效的途徑。大部分的巨集病毒是用WordBasic巨集語言編寫的。WordBasic基於以前的效能良好的BASIC程式語言,然而它有很多***幾百種***擴充套件功能***如下列檔案處理功能:編輯、替換字串、獲取當前文件的名字、開啟一個新的視窗、移動游標等***。 什麼是特洛伊木馬程式?

  通常與病毒想混淆的一種程式是特洛伊木馬程式.。它不是病毒,僅僅是扮作其他東西的程式***常常是有害的***。

  例如,你可能下載了你認為是新遊戲的東西,但當你執行它時,它刪除了你硬碟上的檔案。或者當你第三次執行該遊戲時,該程式把你儲存了的密碼傳送給其他人。 注意:僅僅把一個檔案下載到你計算機不會啟用病毒或特洛伊木馬程式。你必須執行檔案中的程式碼才能出觸發它。這意味著執行一個程式檔案或開啟一個可以執行文件中的巨集的程式***如Word或Excel***中的Word/Excel文件。 哪些檔案可以傳播計算機病毒?

  計算機病毒有感染任何可執行程式碼的潛力,不僅僅是通常叫做“程式檔案”的檔案。例如,某些計算機病毒感染軟盤引導區或硬碟系統區域的可執行程式碼。另外有一種叫做“巨集”

  的計算機病毒,可以感染使用巨集的字處理程式和電子表格程式。包括JavaScript和其他可執行型別程式碼的HTML文件也可能傳播計算機病毒或其他惡意程式碼。 因為計算機病毒程式碼必須被執行才能實現任何感染,所以被計算機當作純資料的檔案是安全的。這包括.gif、.jpg、.mp3、.wav等圖形和聲音檔案,也包括以.txt為副檔名的簡單文字檔案。例如,只檢視圖片不會使計算機感染病毒。病毒程式碼必須存在於一個形式中,像計算機實際上可執行的.exe程式檔案或Word和.doc檔案。

  計算機病毒是如何傳播的?

  當初的病毒***如Lehigh and Jerusalem病毒***開始出現的時候,病毒感染的的方法是非常直截了當的。一個病毒是一小段計算機程式碼,通常是幾個到幾十個位元組,它們能做一些意想不到的事情。比如,這些病毒將自身依附到可執行檔案***即程式***上面,這樣,被感染的程式在執行它自身的任務前首先呼叫病毒程式碼。實現這種目的的一個最簡單的方法是將病毒程式碼附加檔案的尾部,並且在程式檔案的開頭處插入一條命令,使得控制正好能跳到病毒程式碼的開始處,在病毒程式碼被執行完以後,控制又跳回到程式的初始點。這種病毒在80年代後期很常見。早期的病毒只知道附加到.COM檔案上,因為他的結構比MS-DOS作業系統的另一種可執行檔案格式——.EXE檔案更簡單。第一個被人們深入研究的病毒是Lehigh病毒,它把自身附加到啟動時由系統裝入的檔案COMMAND.COM中。病毒對宿主程式能帶來很多破壞,因為這些程式在經過三、四次複製以後就不可再使用。正因如此,病毒無法從大學的網路上消除乾淨。 當你執行一個感染了病毒的程式程式碼時,病毒程式也將進行並試圖感染本計算機過通過網路相連的其他計算機上的其他程式。最新感染的程式將試圖感染更多的程式。

  當你與其他計算機使用者共享一個感染檔案的拷貝時,執行該檔案也可以感染他們的計算機。並且,這些計算機中的檔案也可能把病毒傳染給更多的計算機。 如果你的餓計算機已經感染了引導區病毒,該病毒試圖把自身的拷貝寫到軟盤的

  系統區域。然後,感染了的軟盤可能感染用它們引導的其他計算機,而硬碟上的病毒拷貝將試圖感染更多的軟盤。一些病毒,也叫做“多部分”病毒,既可以通過感染可以通過感染軟盤的引導扇區來傳播。計算機病毒對計算機做什麼?病毒是軟體程式,它所做的事情與計算機上執行的任何其他程式所做的事情相同。任何一個特別病毒的實際效果取決於編寫病毒的程式設計師是如何編寫的。有些病毒有意設計為損壞檔案和妨礙計算機的執行,也有一些病毒只傳播自己而不做其他任何事情。但即便只傳播自己的病毒也是有害的,因為它們在傳播過程中損壞檔案,還可能引起其他問題。注意病毒不會對硬體造成任何損壞:它們不會徹底損壞你的CPU,也不會燒壞你的硬碟,引起你的顯示器爆炸等。關於病毒將物理上破壞你的計算機的警告通常是惡作劇,不是合理的病毒警告。現代病毒能夠存在於從MS DOS 、Windows 3.1到MacOS、UNIX、OS/2、Windows NT等各種系統上。有些儘管難以發現,但卻是無害的,它們知識偶爾在聖誕節產生叮噹聲或重新啟動你的系統;另一些病毒卻是有害的,它們能夠刪除或破壞你的檔案、格式化硬碟或者做一些其他的事情;還有一些是致命的病毒,它們能隨或不隨宿主程式在網上傳播,通過網路向第三方式從敏感的資訊,或者甚至搞亂即時財經資料。關於病毒和電子郵件有什麼誤解?僅僅閱讀一個純文字的電子郵件或Usenet郵件不可能得到一個病毒。你必須警惕的是那些包含了可執行程式碼的程式設計訊息***例如一個HTML訊息中的JavaScript***或包含一個可執行檔案附件的訊息***例如一個編碼程式檔案或包含巨集的Word文件***。要啟用病毒或特洛伊木馬程式,你的計算機必須執行某種程式碼。這可能是附在電子郵件的程式、從因特網下載的Word文件或從軟盤上接受的某些東西。附加在Usenet郵件或電子郵件訊息的檔案並不特別危險:它們並不比其他檔案更危險。怎樣減少從電子郵件感染病毒的機會?像對待任何其他新檔案一樣小心對待可能包含可執行程式碼的任一檔案附件:把附件儲存到磁碟上,在執行該檔案之前,先用更新過的病毒掃描檢查它。如果你的電子郵件或新軟體有能力自動執行JavaScript、Word巨集或其他包括在訊息中或附加在訊息中的可執行程式碼,建議關閉這一功能。如果一個電子郵件令人意外地出現一個可執行檔案,除非你確實核實了它是什麼、從誰那裡來、為什麼要發給你,否則刪除它。最近爆發的美麗殺病毒就是一個活生生的範例,說明當你接收到帶附加檔案過文件時要特別小心。只因為一個電子郵件來自你信任的某人,並不意味著該檔案就是安全的或假定的傳送者與此有任何關係。避免病毒感染的一些普通技巧?安裝著名公司的防病毒軟體,定期升級定期使用。新的計算機病毒每天都可能到來。幾個月不升級的病毒軟體面對當前的病毒不能提供什麼保護。要定期掃描病毒,除此之外安裝“訪問時”掃描程式***大部分好的防病毒軟體包中都有***,並把它們配置為每次開機時自動啟動。這將通過每次訪問可執行檔案就自動檢查病毒來保護你的系統。

  在開啟或執行一個新程式或其他包含可執行程式碼的檔案之前,先進行病毒掃描,無論它們來自哪裡。也有出售的軟盤和CD-ROM光碟傳播病毒的情況。防病毒程式不能很好地檢查特洛伊木馬程式,所以當開啟來自不知道的或“不確定的”源的二進位制檔案和Word/Excel文件是要特別小心。這包括:二進位制新聞組的郵件、來自不著名或良好聲譽的Web/ftp網站的下載、收到意外的作為電子郵件附件的可執行檔案。在聯網聊天時接收到的程式其他檔案要特別小心:這似乎是人們感染計算機病毒或惹上特洛伊木馬麻煩的更普遍的途徑之一。如果任何一個家庭成員***特別是年輕人***使用了計算機,一定要讓他們知道聊天時不能接收任何檔案。定期備份。某些病毒或特洛伊木馬程式會刪除和破壞硬碟上的檔案,而最近的備份也許是恢復資料的唯一途徑。理想的情況是,定期備份整個系統。如果做不到,至少要備份不能承受丟失或難以替代的檔案:文件、書籤檔案、地址薄、重要的電子郵件等。處理病毒感染首先,謹記“計算機病毒症的尼克第一定律”:“僅僅因為你的計算機表現奇怪或一個程式不能正常工作,這並不意味著你的計算機有了病毒。”如果你的計算機沒有使用好的、升級過的防病毒程式,先做這件事吧。許多歸咎於病毒的問題實際上是由軟體配置錯誤或其他與病毒無關的問題引起的。如果你被計算機病毒感染了,按照你恢復的檔案的說明來清除它。如果備份了被感染的檔案,用防病毒軟體來恢復它。檢查你恢復的檔案確保你的備份沒有被感染。要尋求幫助,請檢視網站及防病毒軟體的支援服務。注意:一般來說,應該避免使用像格式化硬碟或用FDISK這樣的過激措施。這常常對清除病毒感染無效,並且弊大於利,除非你對處理的病毒非常瞭解。

有關電腦病毒英文文獻
有關計算機病毒文章
相關知識
有關電腦病毒英文文獻
有關電腦病毒英文文獻
有關電腦病毒和程序的七點知識
有關電腦病毒知識有哪些
有關電腦病毒程式碼
有關電腦病毒的知識
有關電腦病毒的電影
電腦病毒英文文章有哪些
關於電腦病毒的論文
關於常見電腦病毒的論文