200分求翻译,用软件的请珍惜自己的时间,自觉离开.

[复制链接]
查看12 | 回复12 | 2008-3-25 16:51:38 | 显示全部楼层 |阅读模式
200 fen is asked and translated, one that is with software please treasure one's own time, leave consciously.Put a price on someone's head to divide: 200 - Leaving the question finishes having18 days and 0 hours SummaryWith the increase year by year of the global safe incident, guarantee to calculate the security has already aroused the attention from common people, can predict, with the constant popularization, deepening that the computer, network use, taking precautions against the computer virus will pay close attention to more and more by various countries. This text has introduce production and development of the computer virus briefly, has discussed the attack principle of the computer virus and attacked the way. And the virus measures the way and virus embodiment, strick precaution countermeasure and method attacked to the computer virus, regard eliminating the hostile webpage as the example to explain! Analyse in depth the complexity of the virus from infection tactics of the virus, discuss the infection technology of the virus in terms of file, memory and network,etc.. Offer some daily and effective recovery step and method to computer repair to hit virus at the same time.Key word: Computer virus, infecting, taking precautions against
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
Along with global security incident's yearly increase, guaranteed that the computation safe has aroused common people's interest, may foresee, along with the computer, the network utilization popularizes unceasingly, thoroughly, will guard against the computer virus to receive various countries to take seriously more and more. This article introduced briefly computer virus' production and the development, discussed computer virus' attack principle and the forms of defensive action. As well as the virus detection mode and the viral example, to the computer virus attack's guard countermeasure and the method, take eliminate the malicious homepage to carry on the explanation as the example! From virus's infection strategy thorough analysis virus's complexity, from angle discussion virus's and so on document, memory and network infection technologies. Meanwhile has provided some commonly used and the effective restoration step and the method to the virus's computer recovering. key words: Computer virus, infection, guard~~~~
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
The reward points: 200 - from the end of the issue have 17 days 0 hours Abstract With the global security incidents has risen over the years to ensure that the calculation of security has attracted the world's attention, it is foreseeable, with the computer, Internet, the use of ever-growing popularity, in-depth and guard against computer viruses will be more and more countries are highly valued. This paper introduces a computer virus production and development, discussed the principle of computer virus attacks and attacks. Virus and virus detection methods and examples of computer virus attacks and countermeasures, and methods to eliminate the malicious Web page as an example to explain! From virus infection in-depth analysis of the virus strategy of the complexity of the document, such as memory and network perspective virus infection techniques. At the same time the virus in the computer repair work of a number of commonly used and effective recovery steps and methods. Keyword: computer virus, infection, prevention
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
Take off to wantIncrease year by year along with the global safe affairs, insure the calculation safety has already caused the concern of the people of this world, can foresee, along with calculator,the network usage of continuously universal,thorough, guard against the calculator virus will be high among all countries more and more value.This text synopsis introduced the creation and development of the calculator virus, discussing the attack principle of the calculator virus and attackstoning a way.And the virus examination method and virus solid example, attackstone to the calculator virus of guard against the counterplan and method, take exterminating the malice web page as an example to carry on explain in detail!The complexity of the strategically thorough analytical virus from the infection of the virus, discussion from the angles such as document,memory and network etc.s the infection technique of the virus.In the meantime to medium the calculator repair work of the virus provided some in common use but valid instauration steps and method. Key word:Calculator virus,infect,guard against
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
With the global security incidents has risen over the years to ensure that the calculation of security has attracted the world's attention, it is foreseeable, with the computer, Internet, the use of ever-growing popularity, in-depth and guard against computer viruses will be more and more countries are highly valued. This paper introduces a computer virus production and development, discussed the principle of computer virus attacks and attacks.以及病毒检测方式和病毒实例,对计算机病毒攻击的防范对策和方法,以消灭恶意网页为例进行讲解! From virus infection in-depth analysis of the virus strategy of the complexity of the document, such as memory and network perspective virus infection techniques.同时对中病毒的计算机修复工作提供了一些常用而有效的恢复步骤和方法。 Keyword: computer virus, infection, prevention随着全球安全事件的逐年增多,确保计算安全已引起世人的关注,可以预见,随着计算机、网络运用的不断普及、深入,防范计算机病毒将越来越受到各国的高度重视。本文简要介绍了计算机病毒的产生和发展,讨论了计算机病毒的攻击原理和攻击方式。以及病毒检测方式和病毒实例,对计算机病毒攻击的防范对策和方法,以消灭恶意网页为例进行讲解!从病毒的感染策略上深入分析病毒的复杂性,从文件、内存和网络等角度讨论病毒的感染技术。同时对中病毒的计算机修复工作提供了一些常用而有效的恢复步骤和方法。 关键字:计算机病毒、感染、防范With the global security incidents has risen over the years to ensure that the calculation of security has attracted the world's attention, it is foreseeable, with the computer, Internet, the use of ever-growing popularity, in-depth and guard against computer viruses will be more and more countries are highly valued. This paper introduces a computer virus production and development, discussed the principle of computer virus attacks and attacks. Virus and virus detection methods and examples of computer virus attacks and countermeasures, and methods to eliminate the malicious Web page as an example to explain! From virus infection in-depth analysis of the virus strategy of the complexity of the document, such as memory and network perspective virus infection techniques. At the same time the virus in the computer repair work of a number of commonly used and effective recovery steps and methods. Keyword: computer virus, infection, prevention.
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
Along with global security incident's yearly increase, guaranteed that the computation safe has aroused common people's interest, may foresee, along with the computer, the network utilization popularizes unceasingly, thoroughly, will guard against the computer virus to receive various countries to take seriously more and more. This article introduced briefly computer virus' production and the development, discussed computer virus' attack principle and the forms of defensive action. As well as the virus detection mode and the viral example, to the computer virus attack's guard countermeasure and the method, take eliminate the malicious homepage to carry on the explanation as the example! From virus's infection strategy thorough analysis virus's complexity, from angle discussion virus's and so on document, memory and network infection technologies. Meanwhile has provided some commonly used and the effective restoration step and the method to the virus's computer recovering. key words: Computer virus, infection, guard
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
Increases year by year along with the global security event, guarantees the computation safely to arouse common people's interest, may foresee, along with computer, network utilization unceasing popularization, thorough, will guard against the computer virus more and more to receive the various countries to take highly.This article introduced briefly computer virus' production and the development, discussed computer virus' attack principle and the forms of defensive action.As well as the viral examination way and the viral example, to the computer virus attack guard countermeasure and the method, take eliminate the malicious homepage to carry on the explanation as the example! From virus's infection strategy thorough analysis virus's complexity, from angle discussion virus's and so on document, memory and network infection technologies.Meanwhile has provided some commonly used and the effective restoration step and the method to the virus's computer recovering.Key words: Computer virus, infection, guard
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
Along with global security incident's yearly increase, guaranteed that the computation safe has aroused common people's interest, may foresee, along with the computer, the network utilization popularizes unceasingly, thoroughly, will guard against the computer virus to receive various countries to take seriously more and more. This article introduced briefly computer virus' production and the development, discussed computer virus' attack principle and the forms of defensive action. As well as the virus detection mode and the viral example, to the computer virus attack's guard countermeasure and the method, take eliminate the malicious homepage to carry on the explanation as the example! From virus's infection strategy thorough analysis virus's complexity, from angle discussion virus's and so on document, memory and network infection technologies. Meanwhile has provided some commonly used and the effective restoration step and the method to the virus's computer recovering关键字:Computer virus, infection, guard
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
As the global security incidents has risen over the years to ensure that the calculation of security has attracted the world's attention, it is foreseeable, with the computer, Internet, the use of ever-growing popularity, in-depth and guard against computer viruses will be more and more countries are highly valued. This paper introduces a computer virus production and development, discussed the principle of computer virus attacks and attacks. Virus and virus detection methods and examples of computer virus attacks and countermeasures, and methods to eliminate the malicious Web page as an example to explain! From virus infection in-depth analysis of the virus strategy of the complexity of the document, such as memory and network perspective virus infection techniques. At the same time the virus in the computer repair work of a number of commonly used and effective recovery steps and methods. Keyword: computer virus, infection, prevention.随着全球安全事件的逐年增多,确保计算安全已引起世人的关注,可以预见,随着计算机、网络运用的不断普及、深入,防范计算机病毒将越来越受到各国的高度重视。本文简要介绍了计算机病毒的产生和发展,讨论了计算机病毒的攻击原理和攻击方式。以及病毒检测方式和病毒实例,对计算机病毒攻击的防范对策和方法,以消灭恶意网页为例进行讲解!从病毒的感染策略上深入分析病毒的复杂性,从文件、内存和网络等角度讨论病毒的感染技术。同时对中病毒的计算机修复工作提供了一些常用而有效的恢复步骤和方法。 关键字:计算机病毒、感染、防范=Along with global security incident's yearly increase, guaranteed that the computation safe has aroused common people's interest, may foresee, along with the computer, the network utilization popularizes unceasingly, thoroughly, will guard against the computer virus to receive various countries to take seriously more and more. This article introduced briefly computer virus' production and the development, discussed computer virus' attack principle and the forms of defensive action. As well as the virus detection mode and the viral example, to the computer virus attack's guard countermeasure and the method, take eliminate the malicious homepage to carry on the explanation as the example! From virus's infection strategy thorough analysis virus's complexity, from angle discussion virus's and so on document, memory and network infection technologies. Meanwhile has provided some commonly used and the effective restoration step and the method to the virus's computer recovering. key words: Computer virus, infection, guard
回复

使用道具 举报

千问 | 2008-3-25 16:51:38 | 显示全部楼层
Along with the global security incidents' yearly increase, guarantees the computation safely to arose to common people's interests. May foresee, along with the computer, the network utilization popularizes decreasingly, throughly, will guard against the computer virus to receive various countries to take it more and more seriously. This article introduced briefly that computer virus' production and the development, discussions about computer virus' attack principle and the forms of defensive action. As well as the virus detection mode and the viral. Example, to the computer virus attacks' guard, countermeasure and the method take over and eliminate the malicious homepage to carry on the explanation! From virus's infection strategy thorough analysis virus' complexity, from angle discussion virus' and so on document, memory and network infection technologies. Meanwhile has provided some commonly used and the effective restoration step and the method to the virus's computer recovering.我劲力了。。。
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

主题

0

回帖

4882万

积分

论坛元老

Rank: 8Rank: 8

积分
48824836
热门排行