陇东学院学报
隴東學院學報
롱동학원학보
JOURNAI OF LONGDONG UNIVERSITY
2011年
6期
33-36
,共4页
特洛伊木马%木马防范%木马查杀%木马编程
特洛伊木馬%木馬防範%木馬查殺%木馬編程
특락이목마%목마방범%목마사살%목마편정
Trojan horse%Trojan defenses%finding and killing Trojans%Trojan programming Multiple Positive Solutions of Forth-Order Two-Point Boundary Value Problem
随着计算机技术的发展,木马作为网络入侵的一种常用工具,对计算机网络信息安全构成的威胁越来越大.本文研究了木马实现技术,并对木马的防范与查杀技术进行了深入的分析,基于VC++6.0平台设计了采用反向链接技术的“端口反弹”型木马,该木马种植起来较容易,并对其提出了相应的木马查杀工具,能有效地检测和清除该木马,有助于木马程序的研究和防范.
隨著計算機技術的髮展,木馬作為網絡入侵的一種常用工具,對計算機網絡信息安全構成的威脅越來越大.本文研究瞭木馬實現技術,併對木馬的防範與查殺技術進行瞭深入的分析,基于VC++6.0平檯設計瞭採用反嚮鏈接技術的“耑口反彈”型木馬,該木馬種植起來較容易,併對其提齣瞭相應的木馬查殺工具,能有效地檢測和清除該木馬,有助于木馬程序的研究和防範.
수착계산궤기술적발전,목마작위망락입침적일충상용공구,대계산궤망락신식안전구성적위협월래월대.본문연구료목마실현기술,병대목마적방범여사살기술진행료심입적분석,기우VC++6.0평태설계료채용반향련접기술적“단구반탄”형목마,해목마충식기래교용역,병대기제출료상응적목마사살공구,능유효지검측화청제해목마,유조우목마정서적연구화방범.
As the development of the computer technology techniques, which as a common tool ot network intrusion, is becoming a growing threat to information safety technology for computer network. Trojan implementation techniques are studied, and detecting as well as killing Trojans are deeply analyzed. Basing on the platform of VC + + 6.0 and using reverse ling technology ; Port recall Trojan horse is studied and designed and easy to plant. In the end, corresponding killing Trojans tool is designed which can effectively detect and eliminate the Trojan. This paper is very helpful to study and defense Trojans programs.