首页
登录
职称英语
[audioFiles]audio_ezf_m_0097(20102)[/audioFiles]
[audioFiles]audio_ezf_m_0097(20102)[/audioFiles]
游客
2023-11-13
59
管理
问题
选项
答案
What Is a Trojan Horse?
Trojan horse attacks pose one of the most serious threats to computer security. This passage will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today’s computer world, a Trojan horse is defined as a "malicious, security- breaking program that is disguised as something benign" such as a movie or game. An example of a Trojan horse was the infamous "Love Bug". If this apparent love letter was opened, it would cause a lot of problems, such as sending itself to everybody on your email address book or erasing or modifying your files, and downloading another Trojan horse program designed to steal your passwords so as to take over your computer and "remote control" it.
解析
转载请注明原文地址:http://tihaiku.com/zcyy/3184630.html
相关试题推荐
[audioFiles]2012q3/audio_ezfm_109_20129[/audioFiles]TheEnglishPro
[audioFiles]2012q3/audio_ezfm_073_20129[/audioFiles]Inadditiontothesege
[audioFiles]2013q2/audio_ezfm_110_20131[/audioFiles]Tipsto
[audioFiles]audio_ezfm_0137(20105)[/audioFiles]
[audioFiles]audio_ezf_m_0026(20101)[/audioFiles]Di
[audioFiles]audio_ezf_m_0380(20101)[/audioFiles]
[audioFiles]2013q2/audio_ezfm_071_20132[/audioFiles]
CartoonArtist[audioFiles]2013q2/audio_ezfj_005_20133[/audioFiles]
Drama[audioFiles]2013q2/audio_ezfj_004_20133[/audioFiles]
ChoosingaCollegeinAmerica[audioFiles]2013q2/audio_ezfj_001_20133[/audioFile
随机试题
Afterthebirthofmysecondchild,Igotajobatarestaurant.Havingworked
Americanconsumerslikeconvenienceverymuch.Duringthelast50years,the
[originaltext]Pianosarenormallyfoundinbuildingforobviousreasons.Howeve
[originaltext]W:I’mgoingtothesupermarkettopickupfoodanddrinkforSat
小学体育《乒乓球正手推挡球》
根据有效市场假说理论,下列说法正确的是()。A.在有效率的市场中,资源配置更为合
学生学会写“石”字,有助于写“磊”字。这种迁移属于()A.具体迁移 B.
“很黄很暴力”事件成了2008年初国内最受关注的网络事件.仅仅因为在接受央视采访
商业银行应在收到征信服务中心的复核通知之日起()个工作日内给予回复。A.3
案例二: 一般资料:求助者,女性,27岁,本科学历,公司职员。 案例介绍:求
最新回复
(
0
)