摘要
介绍了计算机木马的传播和伪装方式,指出它通过远程控制窃取密码、操作文件和系统、修改注册表等危害性,从实践角度提出了手工和工具两种检测及清除木马的方法。
This paper introduces the spread and camouflage means of Trojan Horse in the computer. Then it points out the harmfulness to steal secret codes, operate documents and systems and modify registered forms through the remote control of Trojan Horse. From the practical angle, it offers two ways to examine and eliminate Trojan Horse by hand or by tool.
出处
《扬州教育学院学报》
2009年第3期36-38,共3页
Journal of Yangzhou College of Education
关键词
木马
端口
注册表
Trojan Horse
port
registered forms