登陆注册
27082000000073

第73章 Computer Security(3)

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compaq and IBM developed to secure their own networks in the mid-eighties, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with ****** packet filters and dial-back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a Web site’s true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become ****** and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every internet-connected computer contains the equivalent of a firewall. Even then, centralized management of internet policy may make firewalls a permanent addition to corporate networking.

【New Words】

subway

地道,地铁

totality

全体,总数

magnitude

大小,数量,量级

infrastructure

下部构造,基础下部组织

minuscule

草写小字,极小的

burgeon

嫩芽,萌芽

rudimentary

根本的,未发展的

permanent

永久的,持久的

9.2 Computer Viruses

Most viruses can also replicate themselves. All computer viruses are manmade. A ****** virus that can make a copy of it over and over again is relatively easy to produce. Even such a ****** virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security system.

The technical details of CIH’s infection mechanism are intriguing for the virus researcher; its payload is what sets it apart from other viruses. The payload consists of two parts, both of which are triggered when the right conditions are met. As the payload is a part of the infection mechanism, it is not triggered until the virus is resident in memory. The trigger condition is met when a file which has an EXE extension, but which is not a suitable host, is opened on the trigger date.

The first part of the payload code to trigger is what has given CIH the world’s sudden attention. Flash ROM technology has existed for several years. Having BIOS “flash able”, by storing it in such a chip, has allowed the basic bootstrap procedure and I/O routines of the PC to be rewritten by software. Early EPROM technologies allowed reprogramming the BIOS, but required the chip to be removed, erased under ultraviolet light and reprogrammed in dedicated hardware.

The second part of the load is common. It overwrites the first 2048 sectors (1MB) of each hard disk in the system with random data from memory. Anything overwritten in such a manner will be difficult or impossible to recover. The virus looks for further disks indefinitely and the machine -- despite running the hard disk continuously -- is unresponsive to user input.

PE files are executables used by Windows XP and Windows NT. APE file consists of a DOS executable, usually just a stub that indicates the program should be run under Windows, a PE header section and several data objects. These objects can contain executable code, information on imported and exported functions, data or relocation information. Each object following the PE header must be aligned within the file to start on a boundary that is an even power of two, between 512 bytes and 64KB.

同类推荐
  • 《21世纪大学英语》配套教材.口语.3

    《21世纪大学英语》配套教材.口语.3

    本系列教材是普通高等教育国家级重点教材《21世纪大学英语》的配套系列教材,包括《阅读》、《口语》和《词汇》三种,每一种分一、二、三册,供大学非英语专业的基础英语课堂教学和练习使用。《阅读》以提高学生的阅读能力为目的。第一册和第二册每册十单元。每一单元介绍一种阅读技能,并带针对性训练。各单元还配有三篇快速阅读,旨在通过反复训练以帮助学生掌握阅读技能,提高阅读速度。第三册以介绍文学名著为主,通过对各种不同文体和风格的文字进行讲解与分析,以增强学生对文学作品的欣赏能力。
  • 《新编大学英语③》词汇突破记忆

    《新编大学英语③》词汇突破记忆

    本书根据《新编大学英语③》(浙江大学编著,外语教学与研究出版社出版)教材编写,包含课内阅读和课后阅读的所有词汇、词组,并给出同义、反义、考点、例句、辨析。编写本书的目的是提倡学生在句子中记忆单词,以便快速突破词汇关。书中每个单元都有同步测试题,书后有词汇自测题三套,供学生自我检查用。对于使用《新编大学英语③》教材的学生,本书不失为一本有助于强化理解、联想记忆、方便实用的学习辅导书。
  • 玩转生活英语

    玩转生活英语

    本书是一本涵盖日常生活的英语口语书籍。全书信息量丰富,趣味性强,适合不同英语阶段的学习者使用。本书在内容编排上为了帮助读者巩固和提高英语能力,专门设计了“跟我练”栏目,保证能活学活用。
  • 聆听花开的声音

    聆听花开的声音

    本书遵循语言学习的自然规律,将英语学习的知识点贯穿在阅读中,并逐一详解,使英语能力在潜移默化中得到槔升……
  • 愿我们每个人都被世界温柔以待

    愿我们每个人都被世界温柔以待

    本书为中英双语读物。精巧的故事、有趣的翻译、地道的英文,让读者既能体味微型小说里人性的丰富复杂,又能深层次地品读英文语言的特色表达与艺术之美,是文学爱好者和英语学习者的必备读物。《愿我们每个人都被世界温柔以待》选取30篇巧思佳构、打动人心的故事,让你在阅读时体会爱情、亲情、友情中不经意的温暖。
热门推荐
  • 这是写给她的一本书

    这是写给她的一本书

    这是一部关于早恋的书,这是一部描写青春的书,这是一部作者都不知道类型的书,而我只是简单的想用文字来书写这个故事。——请君莫思归
  • 重生之都市无上天尊

    重生之都市无上天尊

    【火爆爽文】星空巅峰强者陈羽,历经大战后自爆而亡,却重生回到高三时期,从此扮猪吃老虎,一路牛逼到巅峰。这一生,没有遗憾,只有璀璨。这一世,没有隐忍,只有无敌。ps:新书《无敌医神都市纵横》起航,热血火爆,无敌爽文,请大家多多支持!
  • 杀手出击,废材九小姐

    杀手出击,废材九小姐

    本书讲述的是一位现代杀手穿越到古代后发生的种种古怪的事,也让这个冷血无情的女主有了感情,发现了爱情。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 40岁男人必读书

    40岁男人必读书

    男人的成功,中年是关键:40多岁正是男人人生中最容易创造奇迹的美好时期。众多的机遇,他们更有优势把握;成功的硕果,他们更有资格摘取,以中年的睿智和成熟,以丰富的经历与经验,40多岁。男人一定可以创造出属于自己的天空。
  • 被遗弃的爱:蓝雨石

    被遗弃的爱:蓝雨石

    因为儿时的一场误会,改变了所有人的命运,却又注定遗失了当初的约定……蓝雨石,被遗弃的爱!像魔咒一样,印证着……那些爱与被爱的日子,却真实地发生过,被印证的是我们的爱,从没改变!言若:世界突然加速运转,超脱了我的控制。(夏惜若是妹妹,血缘至亲。)
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 带着现代回古代

    带着现代回古代

    一个叫做贝小茜的女孩子穿越回了古代,在古代,同样也是在五个月时间完成十个任务。不然挑战失败,虽然没有惩罚,但是如果成功了就可以考上自己心爱的大学?一系列的困难,她都选择迎难而上,在朋友的帮助下,神秘人的指导下,自己家人的支持下,她完成任务了吗?我们一起回到古代,开启古风之旅,一起吧!
  • 大道逆天行

    大道逆天行

    潜龙腾渊,鳞爪飞扬;乳虎啸谷,百兽震惶。一荒芜小镇走出的少年,持三尺长刀,伴倾世红颜,修无极天道,成五界之主。
  • 学生口才学习手册

    学生口才学习手册

    我们青少年常常要参加许多文化娱乐活动,我们只有懂得了表演,才能够积极参考各种活动,才能够欣赏各种活动。