摘要
该文探讨了木马技术的工作原理和工作方式,分析了经典木马的启动方式、连接方式、运行方式、传播方式、AAV方式等技术。然后进一步分析了木马技术在云计算环境下的最新发展趋势及新的特征。并通过实例来阐明木马犯罪的危害性和严重性。最后该文呼吁加大针对利用木马技术违法犯罪的打击和防范力度。
This paper introduces the classic techniques of Trojan horse which includes the way to auto run,connection,run,spread,and anti anti-virus. Then,it introduces the latest tendency towards the environment of cloud computing. Further more,to expound the harmfulness and serious of Trojan crime by living examples. At last,it appeals that more measures should be established to reduce Trojan crime.
出处
《信息网络安全》
2011年第6期44-47,共4页
Netinfo Security
关键词
木马原理
信息安全
网络犯罪
Trojan horse
information security
cyber crime