Computer virus 计算机专业英语论文.doc
《Computer virus 计算机专业英语论文.doc》由会员分享,可在线阅读,更多相关《Computer virus 计算机专业英语论文.doc(9页珍藏版)》请在三一办公上搜索。
1、Computer virusAbstract: A computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A tr
2、ue virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.Viruses can increase
3、their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproducti
4、ve ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit s
5、ecurity vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware ha
6、ve symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.Key Words: Computer virus、virus、Malware.Introduction section:The first academic work on the theory of computer viruses (
7、although the term computer virus was not invented at that time) was done by John von Neumann in 1949 who held lectures at the University of Illinois about the Theory and Organization of Complicated Automata. The work of von Neumann was later published as the Theory of self-reproducing automata. In h
8、is essay von Neumann postulated that a computer program could reproduce.In 1972 Veith Risak published his article Selbstreproduzierende Automaten mit minimaler Informationsbertragung (Self-reproducing automata with minimal information exchange).The article describes a fully functional virus written
9、in assembler language for a SIEMENS 4004/35 computer system.In 1980 Jrgen Kraus wrote his diplom thesis Selbstreproduktion bei Programmen (Self-reproduction of programs) at the University of Dortmund.In his work Kraus postulated that computer programs can behave in a way similar to biological viruse
10、s.In 1984 Fred Cohen from the University of Southern California wrote his paper Computer Viruses - Theory and Experiments.It was the first paper to explicitly call a self-reproducing program a virus; a term introduced by his mentor Leonard Adleman.An article that describes useful virus functionaliti
11、es was published by J. B. Gunn under the title Use of virus functions to provide a virtual APL interpreter under user control in 1984.The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been
12、 programmed to randomly dial phone numbers until it hit a modem that is answered by another computer. It then attempted to program the answering computer with its own program, so that the second computer would also begin dialing random numbers, in search of yet another computer to program. The progr
13、am is assumed to spread exponentially through susceptible computers.The actual term virus was first used in David Gerrolds 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmai
14、l the man who wants to turn him off.The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. Creeper used the ARPANET to infect DEC PDP-10 computers run
15、ning the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper.A program called Elk Cloner was the first computer virus to appear in
16、the wild that is, outside the single computer or lab where it was created.Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on
17、a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning Elk Cloner: The program with a personality.The first PC virus in the wild was a boot sector virus dubbed Brain, created in 1986 by the Farooq Alvi Brothers in Lahore,
18、Pakistan, reportedly to deter piracy of the software they had written.Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some v
19、iruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been lef
20、t in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years.Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS,
21、 modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBSs.Macro viruses have become
22、 common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macin
23、tosh computers. Although most of these viruses did not have the ability to send infected email messages, those viruses which did take advantage of the Microsoft Outlook COM interface.Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro vi
24、ruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents.A virus may also send a web address link as an instant message to all the contacts on an infected machine. I
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Computer virus 计算机专业英语论文 计算机专业 英语论文
链接地址:https://www.31ppt.com/p-2329939.html