登陆注册
27082000000073

第73章 Computer Security(3)

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compaq and IBM developed to secure their own networks in the mid-eighties, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with ****** packet filters and dial-back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a Web site’s true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become ****** and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every internet-connected computer contains the equivalent of a firewall. Even then, centralized management of internet policy may make firewalls a permanent addition to corporate networking.

【New Words】

subway

地道,地铁

totality

全体,总数

magnitude

大小,数量,量级

infrastructure

下部构造,基础下部组织

minuscule

草写小字,极小的

burgeon

嫩芽,萌芽

rudimentary

根本的,未发展的

permanent

永久的,持久的

9.2 Computer Viruses

Most viruses can also replicate themselves. All computer viruses are manmade. A ****** virus that can make a copy of it over and over again is relatively easy to produce. Even such a ****** virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security system.

The technical details of CIH’s infection mechanism are intriguing for the virus researcher; its payload is what sets it apart from other viruses. The payload consists of two parts, both of which are triggered when the right conditions are met. As the payload is a part of the infection mechanism, it is not triggered until the virus is resident in memory. The trigger condition is met when a file which has an EXE extension, but which is not a suitable host, is opened on the trigger date.

The first part of the payload code to trigger is what has given CIH the world’s sudden attention. Flash ROM technology has existed for several years. Having BIOS “flash able”, by storing it in such a chip, has allowed the basic bootstrap procedure and I/O routines of the PC to be rewritten by software. Early EPROM technologies allowed reprogramming the BIOS, but required the chip to be removed, erased under ultraviolet light and reprogrammed in dedicated hardware.

The second part of the load is common. It overwrites the first 2048 sectors (1MB) of each hard disk in the system with random data from memory. Anything overwritten in such a manner will be difficult or impossible to recover. The virus looks for further disks indefinitely and the machine -- despite running the hard disk continuously -- is unresponsive to user input.

PE files are executables used by Windows XP and Windows NT. APE file consists of a DOS executable, usually just a stub that indicates the program should be run under Windows, a PE header section and several data objects. These objects can contain executable code, information on imported and exported functions, data or relocation information. Each object following the PE header must be aligned within the file to start on a boundary that is an even power of two, between 512 bytes and 64KB.

同类推荐
  • Le Mort d'Arthur

    Le Mort d'Arthur

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 课外英语-七彩音符寂静之声(双语版)

    课外英语-七彩音符寂静之声(双语版)

    本书收录了世界经典英文歌曲,其中包括脍炙人口的圣诞夜、往日情怀、说你,说我等,每首歌曲都有中英文歌词、语言点解析及注释赏析。
  • 用耳朵听最优美的讲演

    用耳朵听最优美的讲演

    本系列图书精选的各类故事、散文、演讲、时文及名著片段,均用词精准简洁,语句流畅优美,将引领你进入趣、情、爱与理的博大世界,使你更加充满信心地去追求梦想。这里有嘻嘻哈哈的幽默故事,有体会幸福与生活的感悟故事,有帮你战胜挫折的勇气故事,有闪烁着人性光辉的美德故事,有发人深省的智慧故事,也有在成长路上给你动力的哲理故事。相信本系列图书能为你展现一个美丽新世界并使您的英语学习更上一层楼。
  • 生活英语会话想说就会说

    生活英语会话想说就会说

    看到26个字母就鸭梨山大?还是在死磕“哑巴英语”?别担心,本书将生活和英语结合起来,让您在生活中轻轻松松学习英语。其中内容涉及生话英语交流中的各种典型场景。从爱情婚姻、生活起居、购物天地,食全食美、家庭理财、医院就医、家庭汽车、谈天说地和社会问题等方面来展现生活休闲过程中的各种真实情景,所选题材齐全,语言简洁明快,易学好记,实用性强。
  • 课外英语-美国总统演讲选萃(上)(双语版)

    课外英语-美国总统演讲选萃(上)(双语版)

    美国总统,大牌人物,品读他们就职的演讲词,能更深入感受领袖风采。
热门推荐
  • 抗日战争的细节

    抗日战争的细节

    东京,靖国神社,密密麻麻的灵牌中,供奉着一个叫东宫铁男的关东军大佐;虽然只是一个中下级军官,但头号战犯东条英机、日本前首相岸信介都专程给他献过花圈。1928年6月4日凌晨5点23分,东北军大元帅张作霖的专列从北京行至皇姑屯路段,一声巨响,列车被炸上了天。200米开外按下起爆钮的那个日本兵,就是时任关东军沈阳守备队第四中队长的东宫铁男。他身边的神田泰之助,也在爆炸的瞬间按下了快门,因紧张而表情扭曲的东宫被历史定格。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 一袭红衣染尽天下

    一袭红衣染尽天下

    待我着一袭红衣,取你大好江山时,你眼里可会有我?
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 天行末世

    天行末世

    “少年,我看你骨骼惊奇,是个修仙的奇才呐,有没有兴趣跟着我来一段说走就走的末世修仙旅啊?”“包吃包住吗?我不要工资的!”“包啊,全球想住哪住哪。吃的就地取材什么狼妖啊虎兽啊蒸着吃烤着吃绝对比那些进化者的待遇还要好,干不干啊,小伙子。”“干了,能不能先预先给点吃的啊?”“跟小爷走,外面多的是。”云天行乐呵呵看着眼前不到十二岁的小后生。
  • 我的神级女友

    我的神级女友

    爷想征服女人,可女人从不把爷当爷们。爷长的太勾魂,男人都把爷当梦中情人。爷有个神女友,每天都想着法儿的折腾爷。要不是宠她,爷至于每天穿超短裙当服务员吗?谁说爷是人妖的?给爷滚粗来!
  • 狂傲帝君暗卫妃

    狂傲帝君暗卫妃

    现代女警顾雪若,一招抓贼被砸死,魂穿异地,何去何从?上官府大小姐上官雪若,一朝睁眼,身是魂非。上官雪若:“如果早知道最后是这样的结局,那么从一开始我会让我们在一起”即墨长卿:我很少后悔什么事情,却后悔从一开始没像九弟那般真心实意的对你”即墨孤鸿:“如果不是我,你或许会有更好的结局,但是怎么办?我不能忍受站在你身边的是别人。”她以为,她爱他,但是他更爱的,是她背后的一切。她以为,他不爱他,却在她身陷险境之时一命换她之生。他以为,他爱她,所以放弃一切,只为成全她的童话,却在一个托大里失去了她。如果,所有的爱,只是为了这场皇位之争的白热化,那么,请让我独自一人,浪迹天涯。
  • 刑侦密码

    刑侦密码

    如果犯罪成为一种艺术,那能破解它的方法,唯有鉴赏艺术……线索以离奇的方式展开,结局却是悬疑四起。‘八宗档案’的背后到底隐藏着什么秘密,是凶险还是雨过天晴?很多时候,命运就像一个巨大的漩涡,当你发现他的时候,却早已深陷其中,无法自拔了……刑侦密码之‘八宗档案’敬请期待~!
  • 女演员尊严之路

    女演员尊严之路

    当青春遇见迷茫,当生活遭遇困境,是选择坚强逆转还是选择随波浊流?本剧阐述了一位女演员在演艺生崖中历经伤痛,体验了人性的现实与虚伪,最后才学会了独立,懂的了勇敢与坚强,领误到了作为一个女人,演艺圈的女人,只有靠自己才可能创造属于自身的价值,只有靠自己不懈的努力才可能最终取得成功,也才能得到作为一个女人,一个女演员应有的尊重,获取自己想要的人生的故事。影视圈内最真实的写照,黑幕重重,寻求光明的突破口,人性的扭曲与改变,善良与邪恶的对比反衬.....
  • 天映情缘

    天映情缘

    馆晟,羽淑原来我们只有在互相不晓身份之下才能互相依存。一位是仙界万池仙宫的二皇子,一位是魔族凌寒之境的三小姐。永远不会相遇的二人皆因一场大战,双双落入凡间。结为夫妻,男耕女织的生活甜蜜无比。前提却是一人失去所有记忆,一人失去法力离家出走。——————————————————————————你愿再等一万年吗?我们看似和好如初,实则分崩离析。以后不必再见了。