登陆注册
27082000000073

第73章 Computer Security(3)

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compaq and IBM developed to secure their own networks in the mid-eighties, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with ****** packet filters and dial-back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a Web site’s true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become ****** and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every internet-connected computer contains the equivalent of a firewall. Even then, centralized management of internet policy may make firewalls a permanent addition to corporate networking.

【New Words】

subway

地道,地铁

totality

全体,总数

magnitude

大小,数量,量级

infrastructure

下部构造,基础下部组织

minuscule

草写小字,极小的

burgeon

嫩芽,萌芽

rudimentary

根本的,未发展的

permanent

永久的,持久的

9.2 Computer Viruses

Most viruses can also replicate themselves. All computer viruses are manmade. A ****** virus that can make a copy of it over and over again is relatively easy to produce. Even such a ****** virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security system.

The technical details of CIH’s infection mechanism are intriguing for the virus researcher; its payload is what sets it apart from other viruses. The payload consists of two parts, both of which are triggered when the right conditions are met. As the payload is a part of the infection mechanism, it is not triggered until the virus is resident in memory. The trigger condition is met when a file which has an EXE extension, but which is not a suitable host, is opened on the trigger date.

The first part of the payload code to trigger is what has given CIH the world’s sudden attention. Flash ROM technology has existed for several years. Having BIOS “flash able”, by storing it in such a chip, has allowed the basic bootstrap procedure and I/O routines of the PC to be rewritten by software. Early EPROM technologies allowed reprogramming the BIOS, but required the chip to be removed, erased under ultraviolet light and reprogrammed in dedicated hardware.

The second part of the load is common. It overwrites the first 2048 sectors (1MB) of each hard disk in the system with random data from memory. Anything overwritten in such a manner will be difficult or impossible to recover. The virus looks for further disks indefinitely and the machine -- despite running the hard disk continuously -- is unresponsive to user input.

PE files are executables used by Windows XP and Windows NT. APE file consists of a DOS executable, usually just a stub that indicates the program should be run under Windows, a PE header section and several data objects. These objects can contain executable code, information on imported and exported functions, data or relocation information. Each object following the PE header must be aligned within the file to start on a boundary that is an even power of two, between 512 bytes and 64KB.

同类推荐
  • 双语学习丛书-艺术人生

    双语学习丛书-艺术人生

    流淌心灵的隽语,记忆的箴言,在双语的世界里,感受英语学习的乐趣,体会英语学习的奥妙,提高英语学习的能力!丛书包括:爱的交融、财富精英、成长课堂、醇香母爱、父爱如山、故乡情怀、节日趣闻、快乐心语、浪漫往昔等故事。
  • 美国名家短篇小说赏析(初级)

    美国名家短篇小说赏析(初级)

    本书精选了十二位美国文学巨匠的12篇美国短篇小说的精华之作,每篇文章前有简短的引言,文中还附有编者的评注和分析及作者简介。
  • 舌尖上的英语

    舌尖上的英语

    本书由我们的资深专业外教团队,秉承只做经典英语口语理念,倾力打造最纯正、最精美、最有味道的美食英语口语。每一个对话片段,都是真实的美食英语场景,每一句话,都是经典口语句。
  • 用耳朵听最优美的讲演

    用耳朵听最优美的讲演

    本系列图书精选的各类故事、散文、演讲、时文及名著片段,均用词精准简洁,语句流畅优美,将引领你进入趣、情、爱与理的博大世界,使你更加充满信心地去追求梦想。这里有嘻嘻哈哈的幽默故事,有体会幸福与生活的感悟故事,有帮你战胜挫折的勇气故事,有闪烁着人性光辉的美德故事,有发人深省的智慧故事,也有在成长路上给你动力的哲理故事。相信本系列图书能为你展现一个美丽新世界并使您的英语学习更上一层楼。
  • 有些路,只能一个人走

    有些路,只能一个人走

    本书精选了众多励志小故事,让我们在这些美文中开始一段心灵的旅行,去发现最好的自己,屏弃内心的杂念,给灵魂喘息的机会。人生变幻,目前的困境只是暂时的,偶尔一两次的失败并不代表什么,挺起胸膛,还有更长的路要走。打破禁锢,开放自我,充分相信自己的未来充满阳光,不断超越自己,发现最好的自己,踏上更高、更广阔的舞台!
热门推荐
  • 破魔录

    破魔录

    天才沦为废材不要紧,被人耻笑羞辱不要紧!更要命是摊上了一个疯癫师傅,成天逼着练功、寻宝、找魔典!哪料妖魔当真出来了!值此间,人族已是狼烟四起、战火纷飞!天龙族人又未觉醒。这救万民于水火的任务还得落在他身上。世人都道他辛苦,还好身边有美女!世人都说他很累,还好怀中有宝贝!翩翩废少终于走上强者之路,成为盖世英雄!爹娘当以他为傲,可是……什么?!他不是亲生,是天外飞来的?!
  • 梦幻攻略系统

    梦幻攻略系统

    本书情节很单一系统流小说熟悉的味道,熟悉的感觉,就是主角获得系统,随后征服各路,走上人生巅峰,完成自己幻想的小说将会经历的世界有:《寄生兽》《蜘蛛侠3》《东京食尸鬼》《斩赤红之瞳》《成龙历险记》《约会大作战》先到这吧,毕竟是个新人就这么点都够我想好久了!
  • 魔妃来袭:三流大小姐

    魔妃来袭:三流大小姐

    她是集万千宠爱于一身将军府上天才大小姐,一夕之间,身份被夺,修为被毁,沦落三流低等武者!八年后,她携带傲娇仙宠,逆天来袭,拳打渣爹恶姨,脚踩白莲花!强势夺回原来的一切!顺便拐带霸气傻王一枚!可是……一朝傻王变魔王!成了香饽饽?!管她狂蜂浪蝶,敢抢本小姐的男人,本小姐揍的你亲妈都不认识!
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 飞凤还朝

    飞凤还朝

    她出身将门,本是镇国公府嫡长女,是个待嫁准新娘。却不料一封战报,她丢弃嫁衣,披甲上阵,领军出征,暗杀,暗算,是友,是敌。各种明枪暗箭,防不胜防。敌国皇子对她一见倾心,以城池为聘,许她为后。她毅然回绝,她战西夷,灭夜郎,平南夷,血染白衣,尸堆成山,名场疆域。沤心沥血,五年征战,凯旋回朝。金殿逼婚,她气的口吐鲜血,语出惊人。独臂王爷当殿求娶,许她一生一世,是真心,是假意,且拭目以待。八年暗恋,看独臂王爷如何抱的美人归。本书前段说女将军铁血沙场,叱咤风云,后面回归宁静,享受王爷独宠。
  • Forever余吻未了

    Forever余吻未了

    “什么,向我求婚??没有搞错吧,我们才认识几天呐!”魔女的目光简直比火光还要耀眼。“是的,你只要回答yes或no!”怎么这样啊!给人考虑的机会都没有,不过这个冷酷的小子挺让人着迷的。到底是答应还是不答应呢?为什么他会这么快就像魔女求婚呢?一定有隐情!发现面色苍白的她坐在角落里,他一个箭步跑过去紧紧抱住了她,他的心跳声和微弱的气息传遍他的全身。感谢上帝!她还活着的事实足以让他感激万分。这个女人,尹秀安,除了她之外他已经别无他求。“对不起。真的很对不起,让你经历这么糟糕的事情。”他轻轻吻着她脸上的伤痕呢喃道,漆黑又狭窄的房间里洒落着光线。
  • 异世之最强武神

    异世之最强武神

    地球华夏青年穿越异界,意外获得机缘,融合万千血脉,成就最强武神!
  • 弃女农妃

    弃女农妃

    穿越而来发现身下有个孩子,还是“她”刚生下来的。身无分文,没有屋舍,她就伐木建房;山林找食,劳动换吃,孩子也饿不死;手艺丰富,也能开店赚钱,买田种地;新技术带动,竟也能致富。看着日渐帅气的儿子,再看看眼前和儿子一个模子刻出来的男人,安夏挑挑眉,坦言道:“你长的和我儿子可真像啊,记忆中,我丢过一个儿子,该不会是阁下吧?”男人挑眉道:“你确定你生的出来?”当单亲穷妈变身全国首富,再次踏进那个曾经丢弃自己的家,有时如何的一番场景呢?当曾经嘲笑辱骂她的人对她跪地求饶,他们应该没有想到会有那么一天吧?
  • 我为山贼

    我为山贼

    年轻的孙定安从小有个愿望,就是有一天不再四处流浪,衣来伸手,饭来张口,不用劳作就能有享不尽的财富。后来孙定安的愿望实现了一半,他当了一名光荣的山贼,不在四处流浪。