• <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>
    • 軟件測試技術
    • 軟件測試博客
    • 軟件測試視頻
    • 開源軟件測試技術
    • 軟件測試論壇
    • 軟件測試沙龍
    • 軟件測試資料下載
    • 軟件測試雜志
    • 軟件測試人才招聘
      暫時沒有公告

    字號: | 推薦給好友 上一篇 | 下一篇

    計算機病毒(中英對照)

    發布: 2008-2-18 13:45 | 作者: 希賽網 | 來源: 希賽網 | 查看: 113次 | 進入軟件測試論壇討論

    領測軟件測試網

    COMPUTER VIRUS


       
      It’s March 14,11:55 PM.A group of business partners are putting the finishing touches on an important report.After celebrating the completion of their efforts they identify a previously unnoticed typo.At 12:05 AM they turn the computer back on only to be greeted with a message saying“Beware the Ides of March.”[1] The hard drive spins furiously and the report is deleted by a computer virus.
      Computer viruses are just one example of what is commonly referred to as malicious code or malicious programs.Malicious programs are created to perform a series of harmful actions on a computer system.Examples of some actions include file deletion,file corruption,data theft,and the less harmful but equally annoying practical joke.These programs often remain dormant and hidden until an activation event occurs.Examples of activation events are program execution and specific access dates such as March 15,system reboot,and file access.When the predetermined activation event occurs,the malicious program begins its task.In the example above,this task was the deletion of all files in the computer system.
      Theory behind Viruses
      To better understand what a virus can do,it is helpful to understand how a virus performs its task.Fig. 18-4 contains a flow chart describing the basic actions of a virus.Each action identified in the figure is numerically labeled for explanatory purpose only.The order in which these actions are performed is indicated both pictorially,in Fig. 18-4 and in the discussion which follows.While the order of these actions may vary with each virus,the general process remains unchanged—perform an undesirable task and infect other programs and operating systems.


      For this discussion two terms are defined:virus activation and virus execution.Virus activation will refer to the initiation of the virus.Virus execution,however,will refer to the initiation of the portion of the virus that performs the possibly harmful activity the code not directly concerned with infecting a system.[2] Thus,virus execution must be preceded by activation,but activation may not necessarily lead to execution.
      Once an infected program is executed or an infected operating system performs a task,the virus is activated.The virus will first determine whether it should be executed.In the event that it should not be executed,it will attempt to locate and identify other susceptible programs,disks,or systems.Any such item will then be infected.After determining that all susceptible items carry a copy of the virus,the virus will stop and allow normal operations to proceed.If the virus meets all of its internal conditions to execute,it will do so.Upon completion of execution,the virus may either reset its conditions or remove itself.The virus will complete and allow normal computation to continue.While this process may seem time consuming and obvious to the user,it is not[3].Computers operate so quickly nowadays that this process may go easily unnoticed,and often does.

    NOTES
    [1]Ides of March指刺殺古羅馬獨裁者愷撒(Julius Caesar)的預示日(3月15日),即一個不吉利的日子。
    [2]句中,由that引出的定語從句修飾它前面的portion;the code...是介詞賓語to the initiation的補足語,中間被定語從句隔開。
    [3]While引出的是讓步狀語從句。

    KEYWORDS
    typo     非正式的打印錯
    malicious code    惡意代碼
    malicious program   惡意程序
    activation event   激活事件
    system reboot    系統重新引導

    EXERCISES
    1.Multiple choices.
    (1)Computer viruses are            
       a.useful programs       b.malicious code
       c.malicious programs    d.harmful programs
    (2)Virus program consists of            
       a.two parts      b.three parts
       c.four parts     d.five parts
    (3)The harmful actions performed by viruses include            
       a.data theft          b.practical joke
       c.file corruption     d.file deletion
    (4)The virus execution is            
       a.the virus activation
       b.the code not directly concerned with infecting a system
      c.the initiation of the portion of the virus
       d.the code directly concerned with infecting a system
    (5)The virus is activated when            
       a.an infected program is executed
       b.a computer is accessing a mailbox through the Internet
       c.a computer is in shutdown status
       d.an infected operating system performs a task
    (6)Objects that are susceptible from the viruses are            
       a.CPU         b.disks
       c.systems     d.programs
    (7)A virus program often remains            
       a.dormant     b.open
       c.hidden      d.awaked
    (8)If a virus does not begin its activity,it            
       a.stops its activity
       b.performs its activity
       c.updates its execution condition
       d.finds the infect programs after updating its execution condition

    2.True/False.
    (1)            Viruses can cause programs crashing or entire hard disk deleting.
    (2)            Some one died as the result of a computer virus.
    (3)            Before performing any actions you’d better treat all files and programs with virus check software.
    (4)            An infected computer may lose its data.
    (5)            In reality the viruses and their destructive capabilities have been grossly exaggerated by people.


    答案:
    1.
    (1)b,c,d     (2)a        (3)a,b,c,d   (4)b,c
    (5)a,b,d     (6)b,c,d   (7)a,c         (8)c,d
    2.
    (1)t          (2)f   。3)t   
    (4)t      。5)t


    翻譯:

    計算機病毒
       
      3月14日晚11時55分,一群商業伙伴正在對一個重要報告進行最后的修飾,在慶祝他們完成使命之后,他們認出一個以前未注意到的打印錯誤。上午12時5分,他們再把計算機打開,不料面前呈現一條消息“當心不吉利的日子”,硬盤飛快地轉動,隨即該報告被計算機病毒刪除了。
        計算機病毒正是通常所說的惡意代碼或惡意程序的一個例子。惡意程序的編寫是對計算機系統實施一系列傷害動作的。例如文件的刪除,文件的毀壞,數據的竊取以及傷害不大但完全令人討厭的玩笑。這些程序往往處于休眠和隱藏狀態,直到一個激活事件產生。激活事件的例子是程序的執行和專門發作日期,如3月15日,系統自舉和文件讀寫。當預先確定的激活事件發生時,惡意程序便開始工作。在上面例子中,這一工作就是刪除計算機系統中的所有文件。
        病毒背后的理論
        為了更好地知道病毒能做什么,了解病毒如何完成它的任務是有幫助的。圖18-4所示是描述病毒基本動作的流程圖。為了說明圖中每個動作,都用數字標出。這些動作完成的順序可用圖18-4所示的圖示方式指明,也可在下面討論。雖然這些動作的順序可能對每種病毒都不同,但一般過程保持不變一一完成一個不希望的任務并且傳染給其他程序和操作系統。
        根據這種討論定義了兩個術語:病毒激活和病毒發作。病毒激活是指病毒啟動,而病毒發作是指可能造成危害動作的病毒部分的啟動,該代碼不直接去感染一個系統。因此,病毒發作之前必須激活,但激活不一定導致發作。
        一旦受感染的程序被執行或者受感染的操作系統完成一項任務,病毒就會被激活。該病毒首先確定它應該在什么地方被執行,萬一它不被執行,它將力圖尋找并確認其他易受感染的程序、磁盤或系統。任何類似的對象將被感染。在確定易受感染的對象得到一份病毒的復制品之后,該病毒將停止并且讓正常操作繼續進行。如果滿足了所有的內部執行條件,病毒就發作。發作完成以后,該病毒要么恢復其狀態,要么自行刪除。該病毒將結束并允許繼續正常運算。這一過程可能看起來是費時的并且對用戶來說是很明顯的,其實不然。當今計算機的運算如此之快,以至這一過程很容易不被注意并經常如此。

    文章來源于領測軟件測試網 http://www.kjueaiud.com/


    關于領測軟件測試網 | 領測軟件測試網合作伙伴 | 廣告服務 | 投稿指南 | 聯系我們 | 網站地圖 | 友情鏈接
    版權所有(C) 2003-2010 TestAge(領測軟件測試網)|領測國際科技(北京)有限公司|軟件測試工程師培訓網 All Rights Reserved
    北京市海淀區中關村南大街9號北京理工科技大廈1402室 京ICP備2023014753號-2
    技術支持和業務聯系:info@testage.com.cn 電話:010-51297073

    軟件測試 | 領測國際ISTQBISTQB官網TMMiTMMi認證國際軟件測試工程師認證領測軟件測試網

    老湿亚洲永久精品ww47香蕉图片_日韩欧美中文字幕北美法律_国产AV永久无码天堂影院_久久婷婷综合色丁香五月

  • <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>