登陆注册
3765300000073

第73章 Computer Security(3)

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compaq and IBM developed to secure their own networks in the mid-eighties, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with simple packet filters and dial-back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a Web site’s true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become simple and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every internet-connected computer contains the equivalent of a firewall. Even then, centralized management of internet policy may make firewalls a permanent addition to corporate networking.

【New Words】

subway

地道,地铁

totality

全体,总数

magnitude

大小,数量,量级

infrastructure

下部构造,基础下部组织

minuscule

草写小字,极小的

burgeon

嫩芽,萌芽

rudimentary

根本的,未发展的

permanent

永久的,持久的

9.2 Computer Viruses

Most viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of it over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security system.

The technical details of CIH’s infection mechanism are intriguing for the virus researcher; its payload is what sets it apart from other viruses. The payload consists of two parts, both of which are triggered when the right conditions are met. As the payload is a part of the infection mechanism, it is not triggered until the virus is resident in memory. The trigger condition is met when a file which has an EXE extension, but which is not a suitable host, is opened on the trigger date.

The first part of the payload code to trigger is what has given CIH the world’s sudden attention. Flash ROM technology has existed for several years. Having BIOS “flash able”, by storing it in such a chip, has allowed the basic bootstrap procedure and I/O routines of the PC to be rewritten by software. Early EPROM technologies allowed reprogramming the BIOS, but required the chip to be removed, erased under ultraviolet light and reprogrammed in dedicated hardware.

The second part of the load is common. It overwrites the first 2048 sectors (1MB) of each hard disk in the system with random data from memory. Anything overwritten in such a manner will be difficult or impossible to recover. The virus looks for further disks indefinitely and the machine -- despite running the hard disk continuously -- is unresponsive to user input.

PE files are executables used by Windows XP and Windows NT. APE file consists of a DOS executable, usually just a stub that indicates the program should be run under Windows, a PE header section and several data objects. These objects can contain executable code, information on imported and exported functions, data or relocation information. Each object following the PE header must be aligned within the file to start on a boundary that is an even power of two, between 512 bytes and 64KB.

同类推荐
  • 玩遍欧美就这么Easy!用汉语拼音说畅行无阻的英语

    玩遍欧美就这么Easy!用汉语拼音说畅行无阻的英语

    本书分为11章,共72个话题。分别为:和英美人交流、在英美乘坐交通工具、在英美体验生活、在英美工作、在英美学习、在英美就餐、在英美购物、在英美就医、在英美住宿、在英美旅行、在英美恋爱。内容丰富,涉及日常生活中的方方面面,且对每一章的话题都进行了细分,方便学习者针对具体的场景自由学习。
  • 爱默生精选散文集

    爱默生精选散文集

    R.W.爱默生编写的《爱默生精选散文集(英文版)》散发着乐观主义和自信的气息,每一句话都自成一体,蕴涵着作家的哲思。他名言警句般的文字,深沉而有气势,只有饱满温润的灵魂,才可以渗透爱默生的思想内核,抵达他所追求的普遍真理。穿过岁月的尘埃,爱默生的文字总能直指人的内心深处,仿佛熠熠生辉的晨星,带给我们行动的勇气。
  • 幸福从心开始

    幸福从心开始

    本书收录了数十篇经典的英语美文,内容涉及生活、爱情、理想、亲情等方面,从不同的角度帮助你找到打开幸福大门的钥匙。书中选用的文章体裁多样,有语句优美的散文,像一道道清泉沁润你的心田;有感人至深的叙事文,让你领略人生的风景;也有世界权威研究中心的研究成果报告,让你的生活更加科学。
  • 翻开就能用 商务外贸英语

    翻开就能用 商务外贸英语

    本书收录了10个与本单元密切相关的单词。汇集了20个与对话相关的短语,包含上一部分的单词。经典、贴切、鲜活的两段对话。网罗了10到20个使用频率最高的句子,分门别类,增加读者的句式储备量。在英语学习的同时,增加一些与话题相关的小知识。活跃学习气氛。
  • 美丽英文:最美的风景在路上(旅行卷)(套装共6册)

    美丽英文:最美的风景在路上(旅行卷)(套装共6册)

    《美丽英文:最美的风景在路上(旅行卷)》(套装共6册)包括《美丽英文:致十年后的自己》《美丽英文:遇见成功的自己》《美丽英文:世界上最美的情书》《美丽英文:那些激励我前行的睿思》《美丽英文:那些触动我心扉的故事》《美丽英文:快乐是自找的》。在这里,世界级的大师用发人深省的哲理语言,从不同的角度告诉我们,应如何面对生活、品味情感、看待世间百态、抓住未来的人生。那些岁月如歌的光阴,那些浮生若梦的幻影,是一篇篇难以忘却的经典故事,它们有的激励人心、感人肺腑,有的美轮美奂、令人深思。本套书还精选了各个时代世界杰出名人的情书,包括诗人、作家、音乐家、思想家、政治家等,世上最热烈的情感也就莫过于此。
热门推荐
  • 甜宠小青梅:傲娇竹马在隔壁!

    甜宠小青梅:傲娇竹马在隔壁!

    甜心恶魔横空出世,作为家里唯一一棵女苗苗,爹娘宠,哥哥宠,恨不得给她摘星星摘月亮。“哥哥,这是什么啊?”懵懂的她手里捧着一张粉色信纸。他淡淡一瞥,伸手抢了过来,毫不犹豫地撕掉,“这叫情书,影响小孩身心健康,尤其是低龄儿童。”他生平的几次打架都是为她,他却淡淡回答:“保护低龄儿童,人人有责。” 江校草的日常吐槽: “腿短,胸小,脑子还笨,真不知道你是从哪得来的勇气支撑你活到现在的。” “笨手笨脚的跟个猪一样,还想学人家谈恋爱?” 【1v1】【甜度++++++】【宠宠宠】【黑客少女苏同学x电竞大神江同学】
  • 快穿之打脸金手指

    快穿之打脸金手指

    天道崩乱,秩序不存,涌现了一批逆天的人生赢家,无数炮灰的白骨垒成他们的成神之路——恩爱夫妻转眼家破人亡;魔法天才落得横死异乡;当红明星可怜半生瘫痪;豪门千金无辜身败名裂;一代明君惨遭谋朝篡位;书中女主却被女配逆袭……天道表示:TAT谁来帮帮我?女主:我们有100%的打脸技巧!【情节虚构,请勿模仿】
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 大功德簿

    大功德簿

    赌徒杨艺穿越来到异界,手持大功德簿翻云覆雨。什么?没有功法?不要紧,可以积攒功德来换取啊……杨艺:功德能不能换美女?大功德簿:当然可以。杨艺:那还有什么不能换的?快告诉我,我好心理有个准备。大功德簿:除了小命不能换,其他什么都好说。杨艺:这么说,我就懂了……只要老子不挂掉,有朝一日便可冲上云霄!
  • 无限之刺客

    无限之刺客

    狂虻之灾、生化变异物种、丧尸、万兽包围、与波斯军队战斗……一个完全由死亡游戏组成的诡异恐怖的空间……他本是一个极品宅男,却无意中进入到这个空间,为了生存、为了回到现实世界,他必须穿梭于各个恐怖游戏或电影中,面对种种险境他和他的同伴将如何应对……最终,他们是命丧游戏还是重见光明……
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 武神升级系统

    武神升级系统

    吴浩峰痴迷游戏,却意外车祸身亡,再次醒来,竟然穿越到了异界大陆,让他欣喜若狂的是他竟然带着前世的游戏系统一起穿越了,游戏里的升级方法,系统商店,任务系统等等这些,都可以使用,于是乎他从冥魔宗的一名外门弟子,排除万难,一路高歌,直到人生巅峰!
  • 老王走了,留下一堆苦难

    老王走了,留下一堆苦难

    当我们还没有翻开自己生命的帘子,血液就注定了我们生命的全部,将全部交给罪恶,那一年那一月那一日那一时那一分那一秒。我们都渴望着,世界就在足下。而面对后天的后天,经岁月浇筑成的版图,才是痕迹的回音。一代人,活在梦里,不知时日如何飞走。一代人,活在昨天,不知是谁告诉他们可以离开自己的肉体。一代人,活在今天,不知过去留给了历史无数的遗憾。一代人,活在明天,不知期望其实就是捉弄自己的双手。
  • 你向着骄阳我向着你

    你向着骄阳我向着你

    初见被他的篮球砸伤,看着他的身影向自己走来,却没有道歉的意思。凌风:“是球动的手。”向阳看着凌风捡球的背影,有些不甘。走上前去,踹了他一脚。第一次见面,两人双双负伤,向阳对凌风的影响极差,凌风觉得这个女孩有个性。第二次见面,凌风搂着向阳,向向阳的前男友沈鑫宣示主权。三人的纠葛就此结下。向阳和沈鑫是年段有名的尖子生。凌风是老师眼中头疼的45分学生,实际上凌风是因为某些事情,隐藏起了自己的实力。两个人在对付渣男、被他人误解等事件中,逐渐成长,逐渐了解彼此,并心生爱意。高考前“你想去哪个学校?”‘嗯,省内的A大。““巧了,我也想去那里。”“毕业后的那个晚上,我在学校旁边小公园进门处的喷泉那里等你。我有事要和你说。”“好,不许放我鸽子。“向阳一口答应。“不会。“可是高考结束后的那个晚上,向阳喂饱了蚊子、打了无数电话也没等来凌风,三年后,凌风回国。和向阳在舞会上再见。当年究竟是谁放了谁的鸽子?那年的爱意是否还能说出口?
  • 中华诗词名句鉴赏(中华古文化经典丛书)

    中华诗词名句鉴赏(中华古文化经典丛书)

    本书搜集了大量的中华诗词中的经典名句,并配有解析,如“一日不见,如三秋兮”、“树欲静而风不止”、“英雄一入狱,天地亦悲秋”等。荟萃了流传久远、脍炙人口、有欣赏和实用价值的名言佳句两千多条,编选的典籍从孔子整理的《诗经》到民国时期的著作,历两千多年。一书在手,尽览中国诗文词曲千古绝唱;开卷有益,领略宠中华民族文化千年辉煌。注释准确疏通词义,言简意赅,权威考证。鉴赏精辟,深入浅出,优美精当,陶冶情操。