Font Size: a A A

Analysis And Prevention Of Malicious Code

Posted on:2008-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:W ShenFull Text:PDF
GTID:2178360242477065Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, computers and network bring us not only productivity but also security problems. Malicious Code is one of these problems. Because Malicious Code widely spread, They are very dangerous. They can damage data, even computer hardware. So, it is important to study better Malicious Code technique.Malicious Code include Computer Virus,Worms,Trojan Horse,Logic Bombs,Malicious Mobile Code,Backdoor, etc. The techniques Malicious Code using affection, trigger, destruction and the cryptography technique.The article discussed Malicious Code technique, include signature code, check sum, software emulation, etc. After studying the working principle of malicious code and the existing detection and prevention technology on the basis of the basis of their own experience, A summary of the malicious code prevention rules...
Keywords/Search Tags:Malicious Code, Trojan Horse, Malicious Mobile Code, Pretention
PDF Full Text Request
Related items