论文部分内容阅读
网络系统漏洞主动泄密通过互联网破解对方的电脑密码,或利用系统漏洞,直接进入对方的电脑,偷窃秘密情报,这种“黑客行为”已经成为最常见、最有效的情报窃取方法。网络操作系统的安全漏洞表现在以下几个方面:以操作系统为对象,利用软件非法获取信息。如特洛伊木马术是一种人为地隐藏在软件中的恶意程序,该软件在完成预定任务的同时执行非法任务,而使用者却浑然不知;以操作系统为对象,利用软件阻碍计算机系统的正常运行。如隐藏于软件中的
Network system loopholes Active leak Through the Internet to crack each other’s computer password, or use the system loopholes, direct access to the other side of the computer, theft of secret information, this “hacking behavior” has become the most common and most effective way to steal information. Network operating system security vulnerabilities in the following areas: the operating system as the object, the use of software to obtain illegal information. Such as Trojan horse is a kind of artificially hidden malicious software in the program, the software in the completion of scheduled tasks while performing illegal tasks, but users do not know; to the operating system as the object, the use of software to block the normal operation of the computer system . As hidden in the software