首页 | 官方网站   微博 | 高级检索  
     

特洛伊木马防范技术探析
引用本文:杨恩镇,向来生.特洛伊木马防范技术探析[J].网络安全技术与应用,2010(10):29-31,28.
作者姓名:杨恩镇  向来生
作者单位:山东师范大学,山东250014
摘    要:特洛伊木马作为黑客常用的一种攻击工具,对计算机网络安全构成严重威胁。深入地研究木马技术,对防范木马攻击具有重要意义。本文介绍了木马的定义和功能及其工作原理,重点分析了木马的种植方式和隐藏技术,并对木马攻击提出了相应的清除方法和防范措施。

关 键 词:特洛伊木马  隐藏技术  网络安全  防范措施

The Analysis on Prevention technology to the Trojan horse
Yang Enzhen,Xiang Laisheng.The Analysis on Prevention technology to the Trojan horse[J].Net Security Technologies and Application,2010(10):29-31,28.
Authors:Yang Enzhen  Xiang Laisheng
Affiliation:Shandong Normal University,Shandong,250014,China
Abstract:Trojan horse is used as a commonly attack tools by hackers,which poses a serious threat to computer network security.We can control the Trojan horse from the research of Trojan horses.The paper introduces the definition and function of Trojan horse and its working principle,analyzes the planting techniques and the concealing technology of Trojan horse,and gives the appropriate removal methods and preventive measures for those typical Trojan horse attack.
Keywords:Trojan horse  concealing technology  Network Security  Guarding measures
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号